Dan Tang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Machine learning-based identification of potential debris flow catchments in the Wenchuan earthquake region.
Earth Sci. Informatics, December, 2025

Analysis of Employment Effect and Regional Characteristics of Digital Economy Development.
J. Adv. Comput. Intell. Intell. Informatics, May, 2025

Multi-Organ Segmentation Network for Female Pelvic MR Images Based on Hierarchical Decoupled Fusion and Multi-Scale Feature Processing.
Int. J. Imaging Syst. Technol., 2025

2024
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing.
J. Supercomput., February, 2024

Noise-aware and correlation analysis-based for fuzzy-rough feature selection.
Inf. Sci., February, 2024

An LDoS attack detection method based on FSWT time-frequency distribution.
Expert Syst. Appl., 2024

Research on LLM Acceleration Using the High-Performance RISC-V Processor "Xiangshan" (Nanhu Version) Based on the Open-Source Matrix Instruction Set Extension (Vector Dot Product).
CoRR, 2024

ECG Signal Denoising Method Based on CEEMDAN Algorithm and Strong Adaptive Wavelet Threshold.
Proceedings of the 8th IEEE International Conference on Vision, 2024

2023
Prediction and Characteristic Analysis of Enterprise Digital Transformation Integrating XGBoost and SHAP.
J. Adv. Comput. Intell. Intell. Informatics, September, 2023

Quantization and Deployment Study of Classification Models for Embedded Platforms.
Proceedings of the 28th International Conference on Automation and Computing, 2023

2022
A new detection method for LDoS attacks based on data mining.
Future Gener. Comput. Syst., 2022

A novel sparse representation based fusion approach for multi-focus images.
Expert Syst. Appl., 2022

ADMS: An online attack detection and mitigation system for LDoS attacks via SDN.
Comput. Commun., 2022

2021
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN.
Mob. Networks Appl., 2021

Financing a capital-constrained supply chain: factoring accounts receivable vs a BCT-SCF receivable chain.
Kybernetes, 2021

The detection of low-rate DoS attacks using the SADBSCAN algorithm.
Inf. Sci., 2021

TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Work in Progress: Network Attack Detection Towards Smart Factory.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

LDoS Attack Detection using PSO and K-means Algorithm.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Low-Rate DoS Attacks Detection Based on MAF-ADM.
Sensors, 2020

An improved VLC mapping method with parameter optimization for reversible data hiding in JPEG bitstream.
Multim. Tools Appl., 2020

The Study on the Influence of Terms of Trade on Regional Inflation - Based on the Mixed NKPC Model Under the Opening Economy Condition.
J. Adv. Comput. Intell. Intell. Informatics, 2020

WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection.
Ad Hoc Networks, 2020

Low-rate DoS Attack Detection Based on WPD-EE Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries.
IEEE Trans. Biomed. Eng., 2019

A Fast Recovery Method for Single Disk Failure Based on EVENODD.
Int. J. Netw. Secur., 2019

A New Erasure Code Decoding Algorithm.
Int. J. Netw. Secur., 2019

A Fitted Fuzzy-rough Method for Missing Data Imputation.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Low-Rate DoS Attack Detection Based on Improved Logistic Regression.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Array Erasure Codes with Preset Fault Tolerance Capability.
Int. J. Netw. Secur., 2018

A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2016
Passive Wireless Hermetic Environment Monitoring System for Spray Painting Workshop.
Sensors, 2016

Combining 3D joints Moving Trend and Geometry property for human action recognition.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Spatial characterization of innervation zones under electrically elicited M-wave.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

2014
A New Detection Method based on AEWMA Algorithm for LDoS attacks.
J. Networks, 2014

A New Collaborative Detection Method for LDoS Attacks.
J. Networks, 2014

Optimal processing rate and buffer size of a jump-diffusion processing system.
Ann. Oper. Res., 2014

2013
Pattern recognition based forearm motion classification for patients with chronic hemiparesis.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2011
HMTT: A Hybrid Hardware/Software Tracing System for Bridging Memory Trace's Semantic Gap
CoRR, 2011

2010
System Architecture of Godson-3 Multi-Core Processors.
J. Comput. Sci. Technol., 2010

DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance.
Proceedings of the 16th International Conference on High-Performance Computer Architecture (HPCA-16 2010), 2010

A multi-FPGA based platform for emulating a 100m-transistor-scale processor with high-speed peripherals (abstract only).
Proceedings of the ACM/SIGDA 18th International Symposium on Field Programmable Gate Arrays, 2010

Secret Image Sharing Based on Array Codes.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010

2009
An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMP.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

2008
Image Encryption Based on Bivariate Polynomials.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2004
SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004


  Loading...