Cong Tang

Orcid: 0000-0002-1355-8623

According to our database1, Cong Tang authored at least 38 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction.
IEEE Trans. Inf. Forensics Secur., 2024

Seismic Noise Attenuation Using Variational Mode Decomposition and the Schroedinger Equation.
IEEE Trans. Geosci. Remote. Sens., 2024

2023
A Blockchain based Fund Management System for Construction Projects - A Comprehensive Case Study in Xiong'an New Area China.
CoRR, 2023

A Blockchain Based Fund Management System for Construction Projects - A Comprehensive Case Study in Xiong'an New Area China.
Proceedings of the Tenth International Conference on Software Defined Systems, 2023

An Attack Entity Deducing Model for Attack Forensics.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Settlement-based framework for long-term serviceability assessment of immersed tunnels.
Reliab. Eng. Syst. Saf., 2022

XSS adversarial example attacks based on deep reinforcement learning.
Comput. Secur., 2022

2021
Parametric studies and data development of two-dimensional cellular structures and crystals at different length scales.
PhD thesis, 2021

RPM: Local Differential Privacy based Inventory Forecasting.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding.
Complex., 2020

Diverse Feature Blend Based on Filter-Bank Common Spatial Pattern and Brain Functional Connectivity for Multiple Motor Imagery Detection.
IEEE Access, 2020

An Approach of One-vs-Rest Filter Bank Common Spatial Pattern and Spiking Neural Networks for Multiple Motor Imagery Decoding.
IEEE Access, 2020

A General Traffic Flow Prediction Approach Based on Spatial-Temporal Graph Attention.
IEEE Access, 2020

Optimized Pseudo-Padé Fourier Migrator in Terms of Propagation Angles.
IEEE Access, 2020

A Request-level Guaranteed Delivery Advertising Planning: Forecasting and Allocation.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Dynamic Spatial-Temporal Graph Attention Graph Convolutional Network for Short-Term Traffic Flow Forecasting.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

PGC: Decentralized Confidential Payment System with Auditability.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Construction Method and Performance Analysis of Chaotic S-Box Based on Fireworks Algorithm.
Int. J. Bifurc. Chaos, 2019

Unconventional Jamming Scheme for Multiple Quadrature Amplitude Modulations.
IEICE Trans. Commun., 2019

Welding of High Entropy Alloys - A Review.
Entropy, 2019

Emotion Recognition and Dynamic Functional Connectivity Analysis Based on EEG.
IEEE Access, 2019

Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third Parties.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

2018
Double iterative optimal dictionary learning-based SAR image filtering method.
Signal Image Video Process., 2018

Frequency reconfigurable filtering power divider with a single varactor.
IEICE Electron. Express, 2018

2015
Vulnerabilities Scoring Approach for Cloud SaaS.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Making Tagging Systems Resistant to Tricky Spam Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2012
Estimating age privacy leakage in online social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards privacy-preserving RFID-based location-based services.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

DIFO: Discovering faulty OBUs in VANETs.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook.
Proceedings of the Database Systems for Adanced Applications, 2011

Need for Symmetry: Addressing Privacy Risks in Online Social Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
On the Privacy of Peer-Assisted Distribution of Security Patches.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

An Adjacency Matrixes-Based Model for Network Security Analysis.
Proceedings of IEEE International Conference on Communications, 2010

A Hybrid Movie Recommender Based on Ontology and Neural Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Securing key issuing in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A holistic mechanism against file pollution in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

Evaluating Network Security With Two-Layer Attack Graphs.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...