Di Tang

Orcid: 0000-0001-6323-9375

According to our database1, Di Tang authored at least 52 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance.
CoRR, 2024

2023
Multienzyme deep learning models improve peptide de novo sequencing by mass spectrometry proteomics.
PLoS Comput. Biol., January, 2023

Siam Deep Feature KCF Method and Experimental Study for Pedestrian Tracking.
Sensors, 2023

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
CoRR, 2023

HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Efficient Power Division Multiplexing in MIMO Systems.
IEEE Trans. Wirel. Commun., 2022

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models.
CoRR, 2022

Understanding Impacts of Task Similarity on Backdoor Attack and Detection.
CoRR, 2022

Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests.
Proceedings of the 31st USENIX Security Symposium, 2022

Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Study of SER and BER in NOMA Systems.
IEEE Trans. Veh. Technol., 2021

Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
Proceedings of the 30th USENIX Security Symposium, 2021


Understanding the Brains and Brawn of Illicit Streaming App.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

A Neural Network PID Control for Predicting Morphing Kinematics during Perching to Resist Deep Stall.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2020
Multi-camera visual SLAM for off-road navigation.
Robotics Auton. Syst., 2020

Information cascades prediction with attention neural network.
Hum. centric Comput. Inf. Sci., 2020

Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Design of the Fractal Bluetooth and UWB Positioning Beacon Antenna.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Asynchronous In-band Full-Duplex Transmission Scheme for Ad-Hoc Networks.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
NeuroSkinning: automatic skin binding for production characters with deep graph networks.
ACM Trans. Graph., 2019

Similarity estimation based on sparse spectral correspondence.
Multim. Tools Appl., 2019

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019

A hybrid gene selection method based on gene scoring strategy and improved particle swarm optimization.
BMC Bioinform., 2019

A New Weight and Sensitivity Based Variable Maximum Distance to Average Vector Algorithm for Wearable Sensor Data Privacy Protection.
IEEE Access, 2019

Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

A multi-dimensional spam filtering framework based on threat intelligence.
Proceedings of the 12th International Symposium on Computational Intelligence and Design, 2019

A Distributed PCM Clustering Algorithm Based on Spark.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

2018
Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.
CoRR, 2018

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks.
Proceedings of the 2018 International Conference on Computing, 2018

Study of the Symbol Error Rate/Bit Error Rate in Non-orthogonal Multiple Access (NOMA) Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A Data-Driven Soft Sensor Modeling Method Based on Deep Learning and its Application.
IEEE Trans. Ind. Electron., 2017

Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

A novel secure forwarding scheme for Location Based Service.
Proceedings of the 2017 International Conference on Computing, 2017

2016
A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network.
IEEE Trans. Veh. Technol., 2016

2015
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Topic-sensitive multi-document summarization algorithm.
Comput. Sci. Inf. Syst., 2015

A delay-aware and secure data forwarding scheme for urban sensing networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A context-aware MAC protocol in VANET based on Bayesian Networks.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2012
Quantitative security and efficiency analysis of SEAR in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Characterization of linear network coding for pollution detection.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Research and Realization of Real-Time Ultrasonic TOFD Scan Imaging System.
Proceedings of the Advances in Computer Science, 2011

2010
Performance analysis and improvement of cooperative MAC for multi-hop Ad Hoc networks.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Optimal resource allocation for energy efficient transmissions with QoS constrains in coded cooperative networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

2008
Energy-Aware Dynamic Topology Control Algorithm for Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...