Liu Tang

Orcid: 0000-0002-0008-8917

According to our database1, Liu Tang authored at least 35 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Data-Aided Channel Estimation and Combining for Cell-Free Massive MIMO With Low-Resolution ADCs.
IEEE Commun. Lett., March, 2024

2023
A Lightweight Object Detector Based on Spatial-Coordinate Self-Attention for UAV Aerial Images.
Remote. Sens., January, 2023

DComp: Efficient Offload of LSM-tree Compaction with Data Processing Units.
Proceedings of the 52nd International Conference on Parallel Processing, 2023

How the Position Distribution of HUD Information Influences the Driver's Recognition Performance in Different Scenes.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2023

Why Query Plans Are Different: An Automatic Detection and Inference System.
Proceedings of the Databases Theory and Applications, 2023

2022
ComboTree: A Persistent Indexing Structure With Universal Operational Efficiency and Scalability.
IEEE Trans. Parallel Distributed Syst., 2022

TriangleKV: Reducing Write Stalls and Write Amplification in LSM-Tree Based KV Stores With Triangle Container in NVM.
IEEE Trans. Parallel Distributed Syst., 2022

Building a Fast and Efficient LSM-tree Store by Integrating Local Storage with Cloud Storage.
ACM Trans. Archit. Code Optim., 2022

AutoDI: Towards an Automatic Plan Regression Analysis.
Proc. VLDB Endow., 2022

Environmental Boundaries and Road Regularity in Virtual Reality: Examining Their Effects on Navigation Performance and Spatial Cognition.
Proceedings of the Human Aspects of IT for the Aged Population. Design, Interaction and Technology Acceptance, 2022

2021
A Self-Adaptive Reinforcement-Exploration Q-Learning Algorithm.
Symmetry, 2021

MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN.
Mob. Networks Appl., 2021

Differentiated Key-Value Storage Management for Balanced I/O Performance.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

Building A Fast and Efficient LSM-tree Store by Integrating Local Storage with Cloud Storage.
Proceedings of the IEEE International Conference on Cluster Computing, 2021

2020
Non-Invasive Blood Glucose Monitoring Technology: A Review.
Sensors, 2020

Open innovation from the perspective of network embedding: knowledge evolution and development trend.
Scientometrics, 2020

TiDB: A Raft-based HTAP Database.
Proc. VLDB Endow., 2020

Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis.
Hum. centric Comput. Inf. Sci., 2020

MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost.
Future Gener. Comput. Syst., 2020

WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection.
Ad Hoc Networks, 2020

MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with Matrix Container in NVM.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Drying control system for persimmon based on single-chip computer and PID.
Proceedings of the ISBDAI 2020, 2020

A control system of multiple stepmotors based on STM32 and CAN bus.
Proceedings of the ISBDAI 2020, 2020

UniKV: Toward High-Performance and Scalable KV Storage in Mixed Workloads via Unified Indexing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Usability Assessment of Augmented Reality-Based Pedestrian Navigation Aid.
Proceedings of the Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Posture, Motion and Health, 2020

Research and implementation of an automatic simulation tool.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

2019
PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Investigation of Precipitable Water Vapor Obtained by Raman Lidar and Comprehensive Analyses with Meteorological Parameters in Xi'an.
Remote. Sens., 2018

Investigation and Analysis of All-Day Atmospheric Water Vapor Content over Xi'an Using Raman Lidar and Sunphotometer Measurements.
Remote. Sens., 2018

A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2016
A method for issue queue soft error vulnerability mitigation.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Mechanistic relationship between instruction fetch width and basic block size to architectural vulnerability factor.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

2011
User-Oriented and Entropy Based Adaptable Web Service Selection in AmI.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2002
Top Down FP-Growth for Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2002


  Loading...