Dan Tang

Orcid: 0000-0002-3080-462X

According to our database1, Dan Tang authored at least 70 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SGNNRec: A Scalable Double-Layer Attention-Based Graph Neural Network Recommendation Model.
Neural Process. Lett., April, 2024

FTODefender: An efficient flow table overflow attacks defending system in SDN.
Expert Syst. Appl., March, 2024

An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing.
J. Supercomput., February, 2024

Noise-aware and correlation analysis-based for fuzzy-rough feature selection.
Inf. Sci., February, 2024

FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN.
IEEE Trans. Netw. Sci. Eng., 2024

2023
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN.
IEEE Trans. Netw. Serv. Manag., December, 2023

Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics.
IEEE Trans. Cogn. Commun. Netw., December, 2023

PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN.
IEEE Trans. Netw. Serv. Manag., September, 2023

Prediction and Characteristic Analysis of Enterprise Digital Transformation Integrating XGBoost and SHAP.
J. Adv. Comput. Intell. Intell. Informatics, September, 2023

Functional Verification for Agile Processor Development: A Case for Workflow Integration.
J. Comput. Sci. Technol., July, 2023

SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks.
J. Netw. Comput. Appl., April, 2023

GASF-IPP: Detection and Mitigation of LDoS Attack in SDN.
IEEE Trans. Serv. Comput., 2023

A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm.
IEEE Trans. Netw. Sci. Eng., 2023

LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables.
IEEE Trans. Inf. Forensics Secur., 2023

AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Toward Developing High-Performance RISC-V Processors Using Agile Methodology.
IEEE Micro, 2023

Blockchain-Driven Supply Chain's Financing and Coordination Strategy under Nash Bargaining Scheme.
Complex., 2023

MEGP: Dual feature extraction network for Chinese medical entity recognition.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

Quantization and Deployment Study of Classification Models for Embedded Platforms.
Proceedings of the 28th International Conference on Automation and Computing, 2023

2022
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm.
IEEE Trans. Serv. Comput., 2022

Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN.
IEEE J. Sel. Areas Commun., 2022

A new detection method for LDoS attacks based on data mining.
Future Gener. Comput. Syst., 2022

An approach for detecting LDoS attack based on cloud model.
Frontiers Comput. Sci., 2022

A novel sparse representation based fusion approach for multi-focus images.
Expert Syst. Appl., 2022

ADMS: An online attack detection and mitigation system for LDoS attacks via SDN.
Comput. Commun., 2022

A novel LDoS attack detection method based on reconstruction anomaly.
Clust. Comput., 2022


2021
FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack.
IEEE Trans. Reliab., 2021

A Novel Decoding Method for the Erasure Codes.
Secur. Commun. Networks, 2021

MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN.
Mob. Networks Appl., 2021

Financing a capital-constrained supply chain: factoring accounts receivable vs a BCT-SCF receivable chain.
Kybernetes, 2021

The detection of low-rate DoS attacks using the SADBSCAN algorithm.
Inf. Sci., 2021

LDoS Attack Detection Based on ASNNC-OFA Algorithm.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Work in Progress: Network Attack Detection Towards Smart Factory.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

LDoS Attack Detection using PSO and K-means Algorithm.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Low-Rate DoS Attacks Detection Based on MAF-ADM.
Sensors, 2020

An improved VLC mapping method with parameter optimization for reversible data hiding in JPEG bitstream.
Multim. Tools Appl., 2020

The Study on the Influence of Terms of Trade on Regional Inflation - Based on the Mixed NKPC Model Under the Opening Economy Condition.
J. Adv. Comput. Intell. Intell. Informatics, 2020

Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis.
Hum. centric Comput. Inf. Sci., 2020

MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost.
Future Gener. Comput. Syst., 2020

WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection.
Ad Hoc Networks, 2020

Low-rate DoS Attack Detection Based on WPD-EE Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries.
IEEE Trans. Biomed. Eng., 2019

A Fast Recovery Method for Single Disk Failure Based on EVENODD.
Int. J. Netw. Secur., 2019

A New Erasure Code Decoding Algorithm.
Int. J. Netw. Secur., 2019

A Fitted Fuzzy-rough Method for Missing Data Imputation.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Low-Rate DoS Attack Detection Based on Improved Logistic Regression.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Array Erasure Codes with Preset Fault Tolerance Capability.
Int. J. Netw. Secur., 2018

A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2016
Passive Wireless Hermetic Environment Monitoring System for Spray Painting Workshop.
Sensors, 2016

Combining 3D joints Moving Trend and Geometry property for human action recognition.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Spatial characterization of innervation zones under electrically elicited M-wave.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

2014
A New Detection Method based on AEWMA Algorithm for LDoS attacks.
J. Networks, 2014

A New Collaborative Detection Method for LDoS Attacks.
J. Networks, 2014

Optimal processing rate and buffer size of a jump-diffusion processing system.
Ann. Oper. Res., 2014

2013
Pattern recognition based forearm motion classification for patients with chronic hemiparesis.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2011
HMTT: A Hybrid Hardware/Software Tracing System for Bridging Memory Trace's Semantic Gap
CoRR, 2011

2010
System Architecture of Godson-3 Multi-Core Processors.
J. Comput. Sci. Technol., 2010

DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance.
Proceedings of the 16th International Conference on High-Performance Computer Architecture (HPCA-16 2010), 2010

A multi-FPGA based platform for emulating a 100m-transistor-scale processor with high-speed peripherals (abstract only).
Proceedings of the ACM/SIGDA 18th International Symposium on Field Programmable Gate Arrays, 2010

Secret Image Sharing Based on Array Codes.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010

2009
An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMP.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

2008
Image Encryption Based on Bivariate Polynomials.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2004
SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004


  Loading...