default search action
Cong Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Qi Ran, Cong Tang, Song Han, Han Liang, Ya-Juan Xue, Kang Chen:
Seismic Noise Attenuation Using Variational Mode Decomposition and the Schroedinger Equation. IEEE Trans. Geosci. Remote. Sens. 62: 1-12 (2024) - [j15]Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024) - [c25]Cong Tang, Kalina Pashkevich:
Exploring Ecological Value and Innovative Transformation of Traditional Packaging. HCI (18) 2024: 301-313 - [c24]Yinuo Chen, Lu Cao, Hong Chen, Liang Zou, Cong Tang, Junyu Wang:
A 23.8-bit ENOB, ±5V Input Range Readout Circuit for High Precision Sensor Applications with 173.7dB-FoM. ISCAS 2024: 1-5 - [c23]Yinuo Chen, Liang Zou, Cong Tang, Hong Chen, Junyu Wang:
A 172.5dB-FoM Hybrid CT/DT Incremental Σ∆Modulator for Direct Current-to-Digital Conversion. ISCAS 2024: 1-5 - 2023
- [j14]Tingfu Du, Chunchun Gao, Shuaiyao Lu, Qianlan Liu, Yun Yang, Wenhai Yu, Wenjie Li, Yongqiao Sun, Cong Tang, Junbin Wang, Jiahong Gao, Yong Zhang, Fangyu Luo, Ying Yang, Yun-Gui Yang, Xiaozhong Peng:
Differential Transcriptomic Landscapes of SARS-CoV-2 Variants in Multiple Organs from Infected Rhesus Macaques. Genom. Proteom. Bioinform. 21(5): 1014-1029 (2023) - [c22]Tao Jiang, Junjiang He, Tao Li, Wenbo Fang, Wenshan Li, Cong Tang:
An Attack Entity Deducing Model for Attack Forensics. ICONIP (15) 2023: 340-354 - [c21]Wenlue Song, Hanyuan Wu, Hongwei Meng, Yifu Bian, Cong Tang, Jiaqi Xi, Haogang Zhu:
A Blockchain Based Fund Management System for Construction Projects - A Comprehensive Case Study in Xiong'an New Area China. SDS 2023: 28-33 - [i1]Wenlue Song, Hanyuan Wu, Hongwei Meng, Evan Bian, Cong Tang, Jiaqi Xi, Haogang Zhu:
A Blockchain based Fund Management System for Construction Projects - A Comprehensive Case Study in Xiong'an New Area China. CoRR abs/2308.12834 (2023) - 2022
- [j13]Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - [j12]Cong Tang, Shu-Yu He, Wan-Huan Zhou:
Settlement-based framework for long-term serviceability assessment of immersed tunnels. Reliab. Eng. Syst. Saf. 228: 108801 (2022) - 2021
- [b1]Cong Tang:
Parametric studies and data development of two-dimensional cellular structures and crystals at different length scales. Liverpool John Moores University, UK, 2021 - [c20]Lan Zhang, Cong Tang:
RPM: Local Differential Privacy based Inventory Forecasting. BigCom 2021: 106-113 - 2020
- [j11]Cong Tang, Li-Yun Fu, Wenyong Pan, Qingqing Li, Jianping Huang:
Optimized Pseudo-Padé Fourier Migrator in Terms of Propagation Angles. IEEE Access 8: 32054-32065 (2020) - [j10]Hongtao Wang, Cong Tang, Tao Xu, Ting Li, Linfeng Xu, Hongwei Yue, Peng Chen, Junhua Li, Anastasios Bezerianos:
An Approach of One-vs-Rest Filter Bank Common Spatial Pattern and Spiking Neural Networks for Multiple Motor Imagery Decoding. IEEE Access 8: 86850-86861 (2020) - [j9]Cong Tang, Jingru Sun, Yichuang Sun, Mu Peng, Nianfei Gan:
A General Traffic Flow Prediction Approach Based on Spatial-Temporal Graph Attention. IEEE Access 8: 153731-153741 (2020) - [j8]Hongtao Wang, Tao Xu, Cong Tang, Hongwei Yue, Chuangquan Chen, Linfeng Xu, Zian Pei, Jiajun Dong, Anastasios Bezerianos, Junhua Li:
Diverse Feature Blend Based on Filter-Bank Common Spatial Pattern and Brain Functional Connectivity for Multiple Motor Imagery Detection. IEEE Access 8: 155590-155601 (2020) - [j7]Jingru Sun, Mu Peng, Fang Liu, Cong Tang:
Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding. Complex. 2020: 8815315:1-8815315:13 (2020) - [c19]Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au:
PGC: Decentralized Confidential Payment System with Auditability. ESORICS (1) 2020: 591-610 - [c18]Cong Tang, Jingru Sun, Yichuang Sun:
Dynamic Spatial-Temporal Graph Attention Graph Convolutional Network for Short-Term Traffic Flow Forecasting. ISCAS 2020: 1-5 - [c17]Hong Zhang, Lan Zhang, Lan Xu, Xiaoyang Ma, Zhengtao Wu, Cong Tang, Wei Xu, Yiguo Yang:
A Request-level Guaranteed Delivery Advertising Planning: Forecasting and Allocation. KDD 2020: 2980-2988
2010 – 2019
- 2019
- [j6]Xucheng Liu, Ting Li, Cong Tang, Tao Xu, Peng Chen, Anastasios Bezerianos, Hongtao Wang:
Emotion Recognition and Dynamic Functional Connectivity Analysis Based on EEG. IEEE Access 7: 143293-143302 (2019) - [j5]Jing Guo, Cong Tang, Glynn Rothwell, Lisa Li, Yun-Che Wang, Qingxiang Yang, Xuejun Ren:
Welding of High Entropy Alloys - A Review. Entropy 21(4): 431 (2019) - [j4]Shaoshuai ZhuanSun, Jun-an Yang, Cong Tang:
Unconventional Jamming Scheme for Multiple Quadrature Amplitude Modulations. IEICE Trans. Commun. 102-B(10): 2036-2044 (2019) - [j3]Juan Wang, Bowen Pan, Cong Tang, Qun Ding:
Construction Method and Performance Analysis of Chaotic S-Box Based on Fireworks Algorithm. Int. J. Bifurc. Chaos 29(12): 1950158:1-1950158:11 (2019) - [c16]Hongwei Meng, Evan Bian, Cong Tang:
Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third Parties. SDS 2019: 266-271 - 2018
- [j2]Yuan Jiang, Xian Qi Lin, Cong Tang, Tiedi Zhang:
Frequency reconfigurable filtering power divider with a single varactor. IEICE Electron. Express 15(5): 20180022 (2018) - [j1]Yunjun Zhan, Tengda Dai, Jiejun Huang, Yusen Dong, Fawang Ye, Cong Tang:
Double iterative optimal dictionary learning-based SAR image filtering method. Signal Image Video Process. 12(4): 783-790 (2018) - 2017
- [c15]Wei Xin, Tao Zhang, Chengjian Hu, Cong Tang, Chao Liu, Zhong Chen:
On Scaling and Accelerating Decentralized Private Blockchains. BigDataSecurity/HPSC/IDS 2017: 267-271 - 2015
- [c14]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879 - [c13]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347 - 2012
- [c12]Wei Xin, Cong Tang, Tao Yang, Huiping Sun, Zhong Chen:
Towards privacy-preserving RFID-based location-based services. FSKD 2012: 2827-2831 - [c11]Lifang Huang, Hongwei Meng, Cong Tang, Wenlue Song:
DIFO: Discovering faulty OBUs in VANETs. FSKD 2012: 2914-2918 - [c10]Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena:
Estimating age privacy leakage in online social networks. INFOCOM 2012: 2836-2840 - 2011
- [c9]Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 - [c8]Cong Tang, Keith W. Ross, Nitesh Saxena, Ruichuan Chen:
What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook. DASFAA Workshops 2011: 344-356 - 2010
- [c7]Yong Deng, Zhonghai Wu, Cong Tang, Huayou Si, Hu Xiong, Zhong Chen:
A Hybrid Movie Recommender Based on Ontology and Neural Networks. GreenCom/CPSCom 2010: 846-851 - [c6]Anmin Xie, Cong Tang, Nike Gui, Zhuhua Cai, Jian-bin Hu, Zhong Chen:
An Adjacency Matrixes-Based Model for Network Security Analysis. ICC 2010: 1-5 - [c5]Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena, Keith W. Ross:
On the Privacy of Peer-Assisted Distribution of Security Patches. Peer-to-Peer Computing 2010: 1-10
2000 – 2009
- 2009
- [c4]Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen:
Evaluating Network Security With Two-Layer Attack Graphs. ACSAC 2009: 127-136 - [c3]Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen:
SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. ICNS 2009: 296-302 - [c2]Zhuhua Cai, Ruichuan Chen, Jianqiao Feng, Cong Tang, Zhong Chen, Jian-bin Hu:
A holistic mechanism against file pollution in peer-to-peer networks. SAC 2009: 28-34 - [c1]Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen:
Securing key issuing in peer-to-peer networks. SAC 2009: 84-85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint