Chunming Tang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
New construction of optimal ZCZ sequence sets with inter-set zero cross-correlation zone.
Cryptogr. Commun., January, 2024

Towards Compact Identity-based Encryption on Ideal Lattices.
IACR Cryptol. ePrint Arch., 2024

2023
Round-Efficient Secure Inference Based on Masked Secret Sharing for Quantized Neural Network.
Entropy, February, 2023

Z-complementary pairs with flexible lengths and large zero odd-periodic correlation zones.
Adv. Math. Commun., 2023

Research on Semantic segmentation co-evolutionary method for Automated Driving Haze Images.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

Res BCDU-SCB Net: A Lung CT Image Segmentation based on SC-BLSTM.
Proceedings of the 8th International Conference on Biomedical Signal and Image Processing, 2023

2022
New constructions of optimal subsystem codes.
Comput. Appl. Math., December, 2022

Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation.
Entropy, 2022

Design and Generalization of Enterprise Knowledge Graph.
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022

2021
PLSMS model for restoration of the details concealed by light sources in nighttime hazed image.
Signal Image Video Process., 2021

2020
Reflection removal on the windshield during nighttime driving.
Signal Image Video Process., 2020

Malicious behaviour identification for Android based on an RBF neural network.
Int. J. Secur. Networks, 2020

Automatic Damage-Detecting System for Port Container Gate Based on AI.
Proceedings of the ICCPR 2020: 9th International Conference on Computing and Pattern Recognition, Xiamen, China, October 30, 2020

2019
Infinite families of 3-designs from APN functions.
CoRR, 2019

Deep Hierarchical Strategy Model for Multi-Source Driven Quantitative Investment.
IEEE Access, 2019

2017
Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

2016
Correctness Verification of Outsourced Inner Product of Vectors with Error Localization.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

2015
Robust Vehicle Surveillance in Night Traffic Videos Using an Azimuthally Blur Technique.
IEEE Trans. Veh. Technol., 2015

Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round.
Int. J. Netw. Secur., 2015

Fuzzy hypotheses testing using fuzzy data and confidence interval in radar decision criteria.
Evol. Syst., 2015

2014
Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data.
J. Networks, 2014

2013
TSHC: Trusted Scheme for Hadoop Cluster.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

An Energy Efficiency Trusted Dynamic Routing Protocol for Wireless Sensor Networks.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Radar Decision Criteria Based on Fuzzy Test of Hypotheses.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013

2005
Segmentation and Tracking of Neural Stem Cell.
Proceedings of the Advances in Intelligent Computing, 2005


  Loading...