
Dan Tang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j15]Dan Tang, Jianping Man, Liu Tang, Ye Feng, Qiuwei Yang:
WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection. Ad Hoc Networks 102: 102145 (2020) - [j14]Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Xiong Li, Joel J. P. C. Rodrigues:
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Gener. Comput. Syst. 106: 347-359 (2020) - [j13]Dan Tang, Rui Dai, Liu Tang, Xiong Li:
Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis. Hum. centric Comput. Inf. Sci. 10: 6 (2020) - [j12]Dan Tang:
The Study on the Influence of Terms of Trade on Regional Inflation - Based on the Mixed NKPC Model Under the Opening Economy Condition. J. Adv. Comput. Intell. Intell. Informatics 24(4): 461-467 (2020) - [j11]Cheng Zhang, Bo Ou, Dan Tang:
An improved VLC mapping method with parameter optimization for reversible data hiding in JPEG bitstream. Multim. Tools Appl. 79(27-28): 19045-19062 (2020) - [j10]Sijia Zhan
, Dan Tang, Jianping Man, Rui Dai, Xiyin Wang:
Low-Rate DoS Attacks Detection Based on MAF-ADM. Sensors 20(1): 189 (2020) - [c16]Zhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen:
An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm. ICCCN 2020: 1-9
2010 – 2019
- 2019
- [j9]Feng Xiao, Di Fan, Dan Tang:
A Fast Recovery Method for Single Disk Failure Based on EVENODD. Int. J. Netw. Secur. 21(3): 392-401 (2019) - [j8]Di Fan, Feng Xiao, Dan Tang:
A New Erasure Code Decoding Algorithm. Int. J. Netw. Secur. 21(3): 522-529 (2019) - [j7]Rui Zhang, Shenghong He, Xinghua Yang, Xiaoyun Wang, Kai Li, Qiyun Huang, Zhuliang Yu
, Xichun Zhang, Dan Tang, Yuanqing Li
:
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries. IEEE Trans. Biomed. Eng. 66(1): 89-100 (2019) - [c15]Yudong Yan, Dan Tang, Sijia Zhan, Rui Dai, Jingwen Chen, Ningbo Zhu:
Low-Rate DoS Attack Detection Based on Improved Logistic Regression. HPCC/SmartCity/DSS 2019: 468-476 - [c14]Dongshuo Zhang, Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Ningbo Zhu:
PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack. HPCC/SmartCity/DSS 2019: 1163-1170 - [c13]Daiwei Li, Tianrui Li, Haiqing Zhang, Abdelaziz Bouras, Xi Yu, Dan Tang:
A Fitted Fuzzy-rough Method for Missing Data Imputation. ISKE 2019: 74-81 - 2018
- [j6]Dan Tang, Yaqiang Wang, Haopeng Yang:
Array Erasure Codes with Preset Fault Tolerance Capability. Int. J. Netw. Secur. 20(1): 193-200 (2018) - [c12]Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man:
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. ICICS 2018: 92-104 - [c11]Xiaoxue Wu, Dan Tang, Liu Tang, Jianping Man, Sijia Zhan, Qin Liu:
A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1358-1363 - 2016
- [j5]Lifeng Wang, Jingjing Ma, Yan Huang, Dan Tang, Qing-An Huang:
Passive Wireless Hermetic Environment Monitoring System for Spray Painting Workshop. Sensors 16(8): 1207 (2016) - [c10]Chuan Zhang, Yun Peng
, Sheng Li, Ping Zhou, Alvaro Munoz
, Dan Tang, Yingchun Zhang:
Spatial characterization of innervation zones under electrically elicited M-wave. EMBC 2016: 121-124 - [c9]Bangli Liu, Hui Yu
, Xiaolong Zhou, Dan Tang, Honghai Liu
:
Combining 3D joints Moving Trend and Geometry property for human action recognition. SMC 2016: 332-337 - 2014
- [j4]Xindan Li, Dan Tang, Yongjin Wang, Xuewei Yang
:
Optimal processing rate and buffer size of a jump-diffusion processing system. Ann. Oper. Res. 217(1): 319-335 (2014) - [j3]Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Collaborative Detection Method for LDoS Attacks. J. Networks 9(10): 2674-2681 (2014) - [j2]Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Detection Method based on AEWMA Algorithm for LDoS attacks. J. Networks 9(11): 2981-2986 (2014) - 2013
- [c8]Yanjuan Geng, Liangqing Zhang, Dan Tang, Xiufeng Zhang, Guanglin Li:
Pattern recognition based forearm motion classification for patients with chronic hemiparesis. EMBC 2013: 5918-5921 - 2012
- [c7]Wen Su, Longbing Zhang, Dan Tang, Xiang Gao:
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing. HPCC-ICESS 2012: 509-515 - 2011
- [i1]Yungang Bao, Jinyong Zhang, Yan Zhu, Dan Tang, Yuan Ruan, Mingyu Chen, Jianping Fan:
HMTT: A Hybrid Hardware/Software Tracing System for Bridging Memory Trace's Semantic Gap. CoRR abs/1106.2568 (2011) - 2010
- [j1]Xiang Gao, Yunji Chen, Huandong Wang, Dan Tang, Weiwu Hu:
System Architecture of Godson-3 Multi-Core Processors. J. Comput. Sci. Technol. 25(2): 181-191 (2010) - [c6]Yiding Wang, Xiaojing Wang, Dan Tang:
Secret Image Sharing Based on Array Codes. APWCS 2010: 113-117 - [c5]Huandong Wang, Xiang Gao, Yunji Chen, Dan Tang, Weiwu Hu:
A multi-FPGA based platform for emulating a 100m-transistor-scale processor with high-speed peripherals (abstract only). FPGA 2010: 283 - [c4]Dan Tang, Yungang Bao, Weiwu Hu, Mingyu Chen:
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance. HPCA 2010: 1-12
2000 – 2009
- 2009
- [c3]Huandong Wang, Dan Tang, Xiang Gao, Yunji Chen:
An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMP. NAS 2009: 215-218 - 2008
- [c2]Dan Tang, Xiaojing Wang:
Image Encryption Based on Bivariate Polynomials. CSSE (6) 2008: 193-196 - 2004
- [c1]Hai Jin, Dan Tang, Yongkun Zhang, Hao Chen:
SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff. IPDPS 2004
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-05 23:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint