default search action
Yi Tang 0001
Person information
- affiliation: Guangzhou University, Department of Mathematics, China
- affiliation (former): Zhongshan University, Department of Mathematics, Guangzhou, China
- affiliation (PhD 2003): Sun Yat-sen University, Department of Mathematics, Guangzhou, China
Other persons with the same name
- Yi Tang — disambiguation page
- Yi Tang 0002 — Tsinghua Univerisity, Department of Computer Science and Technology, Beijing, China
- Yi Tang 0003 — Yunnan Minzu University, School of Mathematics and Computer Science, Kunming, China (and 2 more)
- Yi Tang 0004 — State University of New York at Buffalo, Department of Computer Science and Engineering, Center of Excellence for Document, NY, USA
- Yi Tang 0005 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore (and 3 more)
- Yi Tang 0006 — Beijing University of Civil Engineering and Architecture, Key Laboratory for Urban Geomatics / Key Laboratory for Architectural Heritage Fine Reconstruction & Health Monitoring, Beijing, China
- Yi Tang 0007 — Hunan First Normal University, College of Mathematics and Computational Science, Changsha, China
- Yi Tang 0008 — Shenzhen University, College of Information Engineering, Shenzhen Key Laboratory of Advanced Machine Learning and Applications, China
- Yi Tang 0009 — Southeast University, School of Electrical Engineering, Nanjing, China
- Yi Tang 0010 — University of Utah, Department of Electrical and Computer Engineering,
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j8]Pengwei Zhan, Liming Wang, Yi Tang:
Website fingerprinting on early QUIC traffic. Comput. Networks 200: 108538 (2021) - 2019
- [j7]Yewang Chen, Lida Zhou, Yi Tang, Jai Puneet Singh, Nizar Bouguila, Cheng Wang, Hua-zhen Wang, Ji-Xiang Du:
Fast neighbor search by using revised k-d tree. Inf. Sci. 472: 145-162 (2019) - 2018
- [j6]Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin Chen, Jian Shen, Yi Tang:
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain. IEEE Access 6: 20632-20640 (2018) - [j5]Yuli Yang, Rui Liu, Yongle Chen, Tong Li, Yi Tang:
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection. IEEE Access 6: 37644-37652 (2018) - [j4]Jian Shen, Ziyuan Gui, Sai Ji, Jun Shen, Haowen Tan, Yi Tang:
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106: 117-123 (2018) - [j3]Tong Li, Wenbin Chen, Yi Tang, Hongyang Yan:
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. Secur. Commun. Networks 2018: 9641273:1-9641273:6 (2018) - 2016
- [j2]Yi Tang, Xiaolei Zhang, Ji Zhang:
Private Indexes for Mixed Encrypted Databases. Trans. Large Scale Data Knowl. Centered Syst. 23: 100-123 (2016) - 2004
- [j1]Jiming Liu, Xiaolong Jin, Yi Tang:
Multi-agent collaborative service and distributed problem solving. Cogn. Syst. Res. 5(3): 191-206 (2004)
Conference and Workshop Papers
- 2022
- [c15]Weilin Yang, Zhonghui Du, Yonghui Wu, Yi Tang:
Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks. TrustCom 2022: 1249-1254 - 2018
- [c14]Xiaotong Lin, Jiaxi Wu, Yi Tang:
Generating Misleading Labels in Machine Learning Models. ICA3PP (2) 2018: 160-174 - [c13]Jiaxi Wu, Xiaotong Lin, Zhiqiang Lin, Yi Tang:
A Security Concern About Deep Learning Models. SciSec 2018: 199-206 - 2015
- [c12]Yi Tang, Manjia Lin:
EQPO: Obscuring Encrypted Web Traffic with Equal-Sized Pseudo-Objects. Inscrypt 2015: 227-245 - 2014
- [c11]Yi Tang, Ji Zhang, Xiaolei Zhang:
Constructing Private Indexes on Encrypted Data for Outsourced Databases. FDSE 2014: 71-85 - 2012
- [c10]Quan Zhou, Fu Gui, Deqin Xiao, Yi Tang:
Trusted architecture for farmland wireless sensor networks. CloudCom 2012: 782-787 - 2010
- [c9]Yi Tang, Yuanyuan Wu, Quan Zhou:
AASC: Anonymizing network addresses based on subnet clustering. WCNIS 2010: 672-676 - 2006
- [c8]Yi Tang, Jun Yun, Quan Zhou:
A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases. IAT 2006: 564-570 - [c7]Yi Tang:
Sharing Session Keys in Encrypted Databases. ICEBE 2006: 47-54 - [c6]Yi Tang, Xiangning Dong:
Anting: An Adaptive Scanning Method for Computer Worms. Web Intelligence 2006: 926-932 - [c5]Yi Tang, Jun Yun:
A Method for Reducing False Hits in Querying Encrypted Databases. CEC/EEE 2006: 22 - 2005
- [c4]Yi Tang, Liankuan Zhang:
Adaptive Bucket Formation in Encrypted Databases. EEE 2005: 116-119 - [c3]Yi Tang, Liankuan Zhang:
INFO: An Improving Strategy for Searching the Small World Networks. Web Intelligence 2005: 54-57 - 2004
- [c2]Yi Tang, Jiming Liu, Xiaolong Jin:
Aggregating Local Behaviors Based Upon a Discrete Lagrange Multiplier Method. IAT 2004: 413-416 - 2003
- [c1]Yi Tang, Jiming Liu, Xiaolong Jin:
Agent Compromises in Distributed Problem Solving. IDEAL 2003: 35-42
Informal and Other Publications
- 2021
- [i1]Pengwei Zhan, Liming Wang, Yi Tang:
Website Fingerprinting on Early QUIC Traffic. CoRR abs/2101.11871 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint