Остановите войну!
for scientists:
default search action
Bowen Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Yipeng Ding, Yiqun Peng, Bowen Tang, Jiaxuan Cao, Minhao Ding:
Improved Linear Chirplet Transform and Singular Value Decomposition Joint Algorithm for Motion Target Tracking. IEEE Internet Things J. 11(8): 13383-13392 (2024) - [j8]Bowen Tang, Zhangming Niu, Xiaofeng Wang, Junjie Huang, Chao Ma, Jing Peng, Yinghui Jiang, Ruiquan Ge, Hongyu Hu, Luhao Lin, Guang Yang:
Automated molecular structure segmentation from documents using ChemSAM. J. Cheminformatics 16(1): 29 (2024) - [c5]Bowen Tang, Jing Zhang, Long Yan, Qian Yu, Lu Sheng, Dong Xu:
Data-Free Generalized Zero-Shot Learning. AAAI 2024: 5108-5117 - [i6]Bowen Tang, Long Yan, Jing Zhang, Qian Yu, Lu Sheng, Dong Xu:
Data-Free Generalized Zero-Shot Learning. CoRR abs/2401.15657 (2024) - [i5]Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou:
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models. CoRR abs/2403.00878 (2024) - 2023
- [j7]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4477-4490 (2023) - [j6]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 827-840 (2023) - [c4]Bowen Tang, Xinrong Yan, Ming Chu:
Balance Control for Inverted Pendulum System via SGCMG. ICIRA (8) 2023: 120-129 - [i4]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. CoRR abs/2302.00947 (2023) - 2022
- [j5]Bowen Tang, Xiaohai He, Xiaohong Wu, Honggang Chen, Shuhua Xiong:
Sequential Enhancement for Compressed Video Using Deep Convolutional Generative Adversarial Network. Neural Process. Lett. 54(6): 5351-5370 (2022) - [j4]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
Making Information Hiding Effective Again. IEEE Trans. Dependable Secur. Comput. 19(4): 2576-2594 (2022) - [c3]Lili Sun, Chenggang Wu, Zhe Wang, Yan Kang, Bowen Tang:
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines. COMPSAC 2022: 757-766 - [i3]Xu Wang, Yi Jin, Yigang Cen, Tao Wang, Bowen Tang, Yidong Li:
LighTN: Light-weight Transformer Network for Performance-overhead Tradeoff in Point Cloud Downsampling. CoRR abs/2202.06263 (2022) - [i2]Lichen Jia, Bowen Tang, Chenggang Wu, Zhe Wang, Zihan Jiang, Yuanming Lai, Yan Kang, Ning Liu, Jingfeng Zhang:
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods. CoRR abs/2208.14191 (2022) - 2021
- [i1]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. CoRR abs/2107.08367 (2021) - 2020
- [j3]Bowen Tang, Skyler T. Kramer, Meijuan Fang, Yingkun Qiu, Zhen Wu, Dong Xu:
A self-attention based message passing neural network for predicting molecular lipophilicity and aqueous solubility. J. Cheminformatics 12(1): 15 (2020)
2010 – 2019
- 2019
- [j2]Bowen Tang, Ju Tang, Yilu Liu, Fuping Zeng:
Comprehensive Evaluation and Application of GIS Insulation Condition Part 1: Selection and Optimization of Insulation Condition Comprehensive Evaluation Index Based on Multi-Source Information Fusion. IEEE Access 7: 88254-88263 (2019) - [j1]Bowen Tang, Yuanzhang Sun, Siying Wu, Keli Gao, Xianglian Yan, Fuping Zeng:
Comprehensive Evaluation and Application of GIS Insulation Condition Part 2: Construction and Application of Comprehensive Evaluation Model Considering Universality and Economic Value. IEEE Access 7: 129127-129135 (2019) - [c2]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. USENIX Security Symposium 2019: 1239-1256 - 2017
- [c1]Zhiwen Wang, Pengtao Wang, Lianyuan Jiang, Bowen Tang, Canlong Zhang, Zhenghuan Hu:
Analysis of Influencing Factors of Shooting Rate Based on Trajectory Prediction of the Basketball. WISA 2017: 176-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint