default search action
Dan Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Hao Wu, Dan Tang, Yuan Cai, Chaowen Zheng:
Research on Early Fault Identification of Cables Based on the Fusion of MTF-GAF and Multi-Head Attention Mechanism Features. IEEE Access 12: 81853-81866 (2024) - [j47]Dan Tang, Hongbo Cao, Jiliang Zhang, Zheng Qin, Wei Liang, Xiaopu Ma:
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane. Comput. Networks 252: 110666 (2024) - [j46]Dan Tang, Zhiqing Zheng, Chao Yin, Bing Xiong, Zheng Qin, Qiuwei Yang:
FTODefender: An efficient flow table overflow attacks defending system in SDN. Expert Syst. Appl. 237(Part B): 121460 (2024) - [j45]Boru Liu, Dan Tang, Jingwen Chen, Wei Liang, Yufeng Liu, Qiuwei Yang:
ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN. Expert Syst. Appl. 254: 124356 (2024) - [j44]Xiaocai Wang, Dan Tang, Ye Feng, Zheng Qin, Bing Xiong, Yufeng Liu:
An LDoS attack detection method based on FSWT time-frequency distribution. Expert Syst. Appl. 256: 125006 (2024) - [j43]Haiqing Zhang, Xi Yu, Tianrui Li, Daiwei Li, Dan Tang, Lei He:
Noise-aware and correlation analysis-based for fuzzy-rough feature selection. Inf. Sci. 659: 120047 (2024) - [j42]Jing He, Le Tang, Dan Tang, Ping Wang, Li Cai:
SGNNRec: A Scalable Double-Layer Attention-Based Graph Neural Network Recommendation Model. Neural Process. Lett. 56(2): 136 (2024) - [j41]Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. J. Supercomput. 80(3): 4248-4285 (2024) - [j40]Dan Tang, Zhiqing Zheng, Keqin Li, Chao Yin, Wei Liang, Jiliang Zhang:
FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN. IEEE Trans. Netw. Sci. Eng. 11(3): 2524-2536 (2024) - [c27]Yinan Xu, Sa Wang, Dan Tang, Ninghui Sun, Yungang Bao:
PathFuzz: Broadening Fuzzing Horizons with Footprint Memory for CPUs. DAC 2024: 69:1-69:6 - [c26]Kaifan Wang, Jian Chen, Yinan Xu, Zihao Yu, Zifei Zhang, Guokai Chen, Xuan Hu, Linjuan Zhang, Xi Chen, Wei He, Dan Tang, Ninghui Sun, Yungang Bao:
XiangShan: An Open-Source Project for High-Performance RISC-V Processors Meeting Industrial-Grade Standards. HCS 2024: 1-25 - [i2]Xu-Hao Chen, Si-Peng Hu, Hong-Chao Liu, Boran Liu, Dan Tang, Di Zhao:
Research on LLM Acceleration Using the High-Performance RISC-V Processor "Xiangshan" (Nanhu Version) Based on the Open-Source Matrix Instruction Set Extension (Vector Dot Product). CoRR abs/2409.00661 (2024) - 2023
- [j39]Dan Tang:
Blockchain-Driven Supply Chain's Financing and Coordination Strategy under Nash Bargaining Scheme. Complex. 2023: 9670398:1-9670398:18 (2023) - [j38]Dan Tang, Jiangying Wei:
Prediction and Characteristic Analysis of Enterprise Digital Transformation Integrating XGBoost and SHAP. J. Adv. Comput. Intell. Intell. Informatics 27(5): 780-789 (2023) - [j37]Yinan Xu, Zihao Yu, Kaifan Wang, Huaqiang Wang, Jiawei Lin, Yue Jin, Linjuan Zhang, Zifei Zhang, Dan Tang, Sa Wang, Kan Shi, Ninghui Sun, Yungang Bao:
Functional Verification for Agile Processor Development: A Case for Workflow Integration. J. Comput. Sci. Technol. 38(4): 737-753 (2023) - [j36]Dan Tang, Dongshuo Zhang, Zheng Qin, Qiuwei Yang, Sheng Xiao:
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks. J. Netw. Comput. Appl. 213: 103597 (2023) - [j35]Yinan Xu, Zihao Yu, Dan Tang, Ye Cai, Dandan Huan, Wei He, Ninghui Sun, Yungang Bao:
Toward Developing High-Performance RISC-V Processors Using Agile Methodology. IEEE Micro 43(4): 98-106 (2023) - [j34]Dan Tang, Siyuan Wang, Siqi Zhang, Zheng Qin, Wei Liang, Sheng Xiao:
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics. IEEE Trans. Cogn. Commun. Netw. 9(6): 1721-1733 (2023) - [j33]Dan Tang, Xiyin Wang, Xiong Li, Pandi Vijayakumar, Neeraj Kumar:
AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 273-287 (2023) - [j32]Dan Tang, Yudong Yan, Chenjun Gao, Wei Liang, Wenqiang Jin:
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables. IEEE Trans. Inf. Forensics Secur. 18: 3143-3157 (2023) - [j31]Dan Tang, Chenjun Gao, Xinmeng Li, Wei Liang, Sheng Xiao, Qiuwei Yang:
A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. IEEE Trans. Netw. Sci. Eng. 10(4): 1952-1963 (2023) - [j30]Dan Tang, Zhiqing Zheng, Xiaocai Wang, Sheng Xiao, Qiuwei Yang:
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN. IEEE Trans. Netw. Serv. Manag. 20(3): 3686-3698 (2023) - [j29]Dan Tang, Chenjun Gao, Wei Liang, Jiliang Zhang, Keqin Li:
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN. IEEE Trans. Netw. Serv. Manag. 20(4): 5073-5084 (2023) - [j28]Dan Tang, Siyuan Wang, Boru Liu, Wenqiang Jin, Jiliang Zhang:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. IEEE Trans. Serv. Comput. 16(5): 3373-3384 (2023) - [c25]Zihan Huang, Jin Jin, Chaolong Zhang, Zhijie Xu, Yuanping Xu, Chao Kong, Qin Wen, Dan Tang:
Quantization and Deployment Study of Classification Models for Embedded Platforms. ICAC 2023: 1-6 - [c24]Yijie Zhang, Yan Gao, Dan Tang, Qiong Zeng:
MEGP: Dual feature extraction network for Chinese medical entity recognition. ISAIMS 2023: 1029-1035 - 2022
- [j27]Dan Tang, Yudong Yan, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. Clust. Comput. 25(2): 1373-1392 (2022) - [j26]Dan Tang, Xiyin Wang, Yudong Yan, Dongshuo Zhang, Huan Zhao:
ADMS: An online attack detection and mitigation system for LDoS attacks via SDN. Comput. Commun. 181: 454-471 (2022) - [j25]Dan Tang, Qingyu Xiong, Hongpeng Yin, Zhiqin Zhu, Yanxia Li:
A novel sparse representation based fusion approach for multi-focus images. Expert Syst. Appl. 197: 116737 (2022) - [j24]Wei Shi, Dan Tang, Sijia Zhan, Zheng Qin, Xiyin Wang:
An approach for detecting LDoS attack based on cloud model. Frontiers Comput. Sci. 16(6): 166821 (2022) - [j23]Dan Tang, Jingwen Chen, Xiyin Wang, Siqi Zhang, Yudong Yan:
A new detection method for LDoS attacks based on data mining. Future Gener. Comput. Syst. 128: 73-87 (2022) - [j22]Dan Tang, Yudong Yan, Siqi Zhang, Jingwen Chen, Zheng Qin:
Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN. IEEE J. Sel. Areas Commun. 40(1): 428-444 (2022) - [j21]Dan Tang, Siqi Zhang, Yudong Yan, Jingwen Chen, Zheng Qin:
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm. IEEE Trans. Serv. Comput. 15(6): 3471-3484 (2022) - [c23]Yinan Xu, Zihao Yu, Dan Tang, Guokai Chen, Lu Chen, Lingrui Gou, Yue Jin, Qianruo Li, Xin Li, Zuojun Li, Jiawei Lin, Tong Liu, Zhigang Liu, Jiazhan Tan, Huaqiang Wang, Huizhe Wang, Kaifan Wang, Chuanqi Zhang, Fawang Zhang, Linjuan Zhang, Zifei Zhang, Yangyang Zhao, Yaoyang Zhou, Yike Zhou, Jiangrui Zou, Ye Cai, Dandan Huan, Zusong Li, Jiye Zhao, Zihao Chen, Wei He, Qiyuan Quan, Xingwu Liu, Sa Wang, Kan Shi, Ninghui Sun, Yungang Bao:
Towards Developing High Performance RISC-V Processors Using Agile Methodology. MICRO 2022: 1178-1199 - 2021
- [j20]Dan Tang, Siqi Zhang, Jingwen Chen, Xiyin Wang:
The detection of low-rate DoS attacks using the SADBSCAN algorithm. Inf. Sci. 565: 229-247 (2021) - [j19]Dan Tang, Xintian Zhuang:
Financing a capital-constrained supply chain: factoring accounts receivable vs a BCT-SCF receivable chain. Kybernetes 50(8): 2209-2231 (2021) - [j18]Dan Tang, Liu Tang, Wei Shi, Sijia Zhan, Qiuwei Yang:
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN. Mob. Networks Appl. 26(4): 1705-1722 (2021) - [j17]Dan Tang, Hongliang Cai:
A Novel Decoding Method for the Erasure Codes. Secur. Commun. Networks 2021: 8755697:1-8755697:12 (2021) - [j16]Dan Tang, Ye Feng, Siqi Zhang, Zheng Qin:
FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack. IEEE Trans. Reliab. 70(3): 1143-1157 (2021) - [c22]Siyuan Wang, Dan Tang, Yu Liu, Jingwen Chen, Yudong Yan, Jiayi Zhang:
LDoS Attack Detection using PSO and K-means Algorithm. CSCWD 2021: 317-322 - [c21]Xinmeng Li, Nengguang Luo, Dan Tang, Zhiqing Zheng, Zheng Qin, Xinxiang Gao:
BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network. ISPA/BDCloud/SocialCom/SustainCom 2021: 300-307 - [c20]Dan Tang, Dongshuo Zhang, Huan Zhao, Dashun Liu, Yudong Yan, Jingwen Chen:
Work in Progress: Network Attack Detection Towards Smart Factory. RTAS 2021: 485-488 - [c19]Boru Liu, Dan Tang, Yudong Yan, Zhiqing Zheng, Shihan Zhang, Jiangmeng Zhou:
TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM. TrustCom 2021: 678-685 - [c18]Xinmeng Li, Kai Zheng, Dan Tang, Zheng Qin, Zhiqing Zheng, Shihan Zhang:
LDoS Attack Detection Based on ASNNC-OFA Algorithm. WCNC 2021: 1-6 - 2020
- [j15]Dan Tang, Jianping Man, Liu Tang, Ye Feng, Qiuwei Yang:
WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection. Ad Hoc Networks 102: 102145 (2020) - [j14]Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Xiong Li, Joel J. P. C. Rodrigues:
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Gener. Comput. Syst. 106: 347-359 (2020) - [j13]Dan Tang, Rui Dai, Liu Tang, Xiong Li:
Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis. Hum. centric Comput. Inf. Sci. 10: 6 (2020) - [j12]Dan Tang:
The Study on the Influence of Terms of Trade on Regional Inflation - Based on the Mixed NKPC Model Under the Opening Economy Condition. J. Adv. Comput. Intell. Intell. Informatics 24(4): 461-467 (2020) - [j11]Cheng Zhang, Bo Ou, Dan Tang:
An improved VLC mapping method with parameter optimization for reversible data hiding in JPEG bitstream. Multim. Tools Appl. 79(27-28): 19045-19062 (2020) - [j10]Sijia Zhan, Dan Tang, Jianping Man, Rui Dai, Xiyin Wang:
Low-Rate DoS Attacks Detection Based on MAF-ADM. Sensors 20(1): 189 (2020) - [c17]Zhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen:
An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm. ICCCN 2020: 1-9 - [c16]Xiaocai Wang, Qiuwei Yang, Zichao Xie, Zhiqing Zheng, Yudong Yan, Dan Tang:
Low-rate DoS Attack Detection Based on WPD-EE Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2020: 384-391
2010 – 2019
- 2019
- [j9]Feng Xiao, Di Fan, Dan Tang:
A Fast Recovery Method for Single Disk Failure Based on EVENODD. Int. J. Netw. Secur. 21(3): 392-401 (2019) - [j8]Di Fan, Feng Xiao, Dan Tang:
A New Erasure Code Decoding Algorithm. Int. J. Netw. Secur. 21(3): 522-529 (2019) - [j7]Rui Zhang, Shenghong He, Xinghua Yang, Xiaoyun Wang, Kai Li, Qiyun Huang, Zhuliang Yu, Xichun Zhang, Dan Tang, Yuanqing Li:
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries. IEEE Trans. Biomed. Eng. 66(1): 89-100 (2019) - [c15]Yudong Yan, Dan Tang, Sijia Zhan, Rui Dai, Jingwen Chen, Ningbo Zhu:
Low-Rate DoS Attack Detection Based on Improved Logistic Regression. HPCC/SmartCity/DSS 2019: 468-476 - [c14]Dongshuo Zhang, Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Ningbo Zhu:
PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack. HPCC/SmartCity/DSS 2019: 1163-1170 - [c13]Daiwei Li, Tianrui Li, Haiqing Zhang, Abdelaziz Bouras, Xi Yu, Dan Tang:
A Fitted Fuzzy-rough Method for Missing Data Imputation. ISKE 2019: 74-81 - 2018
- [j6]Dan Tang, Yaqiang Wang, Haopeng Yang:
Array Erasure Codes with Preset Fault Tolerance Capability. Int. J. Netw. Secur. 20(1): 193-200 (2018) - [c12]Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man:
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. ICICS 2018: 92-104 - [c11]Xiaoxue Wu, Dan Tang, Liu Tang, Jianping Man, Sijia Zhan, Qin Liu:
A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1358-1363 - 2016
- [j5]Lifeng Wang, Jingjing Ma, Yan Huang, Dan Tang, Qing-An Huang:
Passive Wireless Hermetic Environment Monitoring System for Spray Painting Workshop. Sensors 16(8): 1207 (2016) - [c10]Chuan Zhang, Yun Peng, Sheng Li, Ping Zhou, Alvaro Munoz, Dan Tang, Yingchun Zhang:
Spatial characterization of innervation zones under electrically elicited M-wave. EMBC 2016: 121-124 - [c9]Bangli Liu, Hui Yu, Xiaolong Zhou, Dan Tang, Honghai Liu:
Combining 3D joints Moving Trend and Geometry property for human action recognition. SMC 2016: 332-337 - 2014
- [j4]Xindan Li, Dan Tang, Yongjin Wang, Xuewei Yang:
Optimal processing rate and buffer size of a jump-diffusion processing system. Ann. Oper. Res. 217(1): 319-335 (2014) - [j3]Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Collaborative Detection Method for LDoS Attacks. J. Networks 9(10): 2674-2681 (2014) - [j2]Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Detection Method based on AEWMA Algorithm for LDoS attacks. J. Networks 9(11): 2981-2986 (2014) - 2013
- [c8]Yanjuan Geng, Liangqing Zhang, Dan Tang, Xiufeng Zhang, Guanglin Li:
Pattern recognition based forearm motion classification for patients with chronic hemiparesis. EMBC 2013: 5918-5921 - 2012
- [c7]Wen Su, Longbing Zhang, Dan Tang, Xiang Gao:
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing. HPCC-ICESS 2012: 509-515 - 2011
- [i1]Yungang Bao, Jinyong Zhang, Yan Zhu, Dan Tang, Yuan Ruan, Mingyu Chen, Jianping Fan:
HMTT: A Hybrid Hardware/Software Tracing System for Bridging Memory Trace's Semantic Gap. CoRR abs/1106.2568 (2011) - 2010
- [j1]Xiang Gao, Yunji Chen, Huandong Wang, Dan Tang, Weiwu Hu:
System Architecture of Godson-3 Multi-Core Processors. J. Comput. Sci. Technol. 25(2): 181-191 (2010) - [c6]Yiding Wang, Xiaojing Wang, Dan Tang:
Secret Image Sharing Based on Array Codes. APWCS 2010: 113-117 - [c5]Huandong Wang, Xiang Gao, Yunji Chen, Dan Tang, Weiwu Hu:
A multi-FPGA based platform for emulating a 100m-transistor-scale processor with high-speed peripherals (abstract only). FPGA 2010: 283 - [c4]Dan Tang, Yungang Bao, Weiwu Hu, Mingyu Chen:
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance. HPCA 2010: 1-12
2000 – 2009
- 2009
- [c3]Huandong Wang, Dan Tang, Xiang Gao, Yunji Chen:
An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMP. NAS 2009: 215-218 - 2008
- [c2]Dan Tang, Xiaojing Wang:
Image Encryption Based on Bivariate Polynomials. CSSE (6) 2008: 193-196 - 2004
- [c1]Hai Jin, Dan Tang, Yongkun Zhang, Hao Chen:
SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff. IPDPS 2004
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-29 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint