Guangming Tang

Orcid: 0000-0001-6610-3166

According to our database1, Guangming Tang authored at least 23 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SUSHI: Ultra-High-Speed and Ultra-Low-Power Neuromorphic Chip Using Superconducting Single-Flux-Quantum Circuits.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

2022
Superconducting single flux quantum (SFQ) technology for power-efficiency computing.
CCF Trans. High Perform. Comput., 2022

2020
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack.
Secur. Commun. Networks, 2020

Anisotropic distortion cost update strategy in spatial image steganography.
Multim. Tools Appl., 2020

An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning.
IEEE Access, 2020

2019
Security Measure for Image Steganography Based on High Dimensional KL Divergence.
Secur. Commun. Networks, 2019

Digital steganography model and embedding optimization strategy.
Multim. Tools Appl., 2019

SGS: Safe-Guard Scheme for Protecting Control Plane Against DDoS Attacks in Software-Defined Networking.
IEEE Access, 2019

2018
Steganography using Gabor filter and anisotropic diffusion.
Multim. Tools Appl., 2018

Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A distortion cost modification strategy for adaptive pentary steganography.
Multim. Tools Appl., 2017

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs.
KSII Trans. Internet Inf. Syst., 2017

2016
Incorporating data hiding into G.729 speech codec.
Multim. Tools Appl., 2016

Deep Learning on Spatial Rich Model for Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
A triple-layer steganography scheme for low bit-rate speech streams.
Multim. Tools Appl., 2015

网络安全态势感知中D-S证据理论冲突证据的修正研究 (Research on Revising Conflict Evidence of D-S Evidence Theory in Network Security Situation Awareness).
计算机科学, 2015

基于免疫危险理论的网络安全态势评估 (Assessment of Network Security Situation Based on Immune Danger Theory).
计算机科学, 2015

2013
A secure steganography for privacy protection in healthcare system.
J. Medical Syst., 2013

2012
Optimized LSB Matching Steganography Based on Fisher Information.
J. Multim., 2012

Stego Key Estimation in LSB Steganography.
J. Multim., 2012

2010
A Secure Steganography Preserving High Order Statistics.
J. Multim., 2010

2009
A New Method for Data Hiding Domain Classification.
Proceedings of the International Forum on Information Technology and Applications, 2009


  Loading...