Xiangyan Tang

Orcid: 0000-0002-3874-8415

According to our database1, Xiangyan Tang authored at least 41 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-view graph imputation network.
Inf. Fusion, February, 2024

2023
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain.
Comput. Syst. Sci. Eng., 2023

2022
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition.
KSII Trans. Internet Inf. Syst., 2022

Erratum to: An improved random forest algorithm and its application to wind pressure prediction.
Int. J. Intell. Syst., 2022

MIFNet: A lightweight multiscale information fusion network.
Int. J. Intell. Syst., 2022

2021
A survey of security threats and defense on Blockchain.
Multim. Tools Appl., 2021

Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.
Mob. Networks Appl., 2021

Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.
Mob. Networks Appl., 2021

DFFNet: An IoT-perceptive dual feature fusion network for general real-time semantic segmentation.
Inf. Sci., 2021

An improved random forest algorithm and its application to wind pressure prediction.
Int. J. Intell. Syst., 2021

A DAPP Business Data Storage Model Based on Blockchain and IPFS.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
Generative Adversarial Networks: A Literature Review.
KSII Trans. Internet Inf. Syst., 2020

Traffic flow combination forecasting method based on improved LSTM and ARIMA.
Int. J. Embed. Syst., 2020

DDoS attack detection method based on network abnormal behaviour in big data environment.
Int. J. Comput. Sci. Eng., 2020

2019
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment.
Symmetry, 2019

Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing".
Secur. Commun. Networks, 2019

A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning.
CoRR, 2019

Adaptive DDoS attack detection method based on multiple-kernel learning.
CoRR, 2019

Forecasting model based on information-granulated GA-SVR and ARIMA for producer price index.
CoRR, 2019

DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment.
CoRR, 2019

DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Security Situation Assessment Method Based on Neural Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

DDoS Attack Detection Method Based on V-Support Vector Machine.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning.
Secur. Commun. Networks, 2018

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.
Secur. Commun. Networks, 2018

基于多生长时期模板匹配的玉米螟识别方法 (Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods).
计算机科学, 2018

An automatic traffic-congestion detection method for bad weather based on traffic video.
Int. J. High Perform. Comput. Netw., 2018

Traffic flow detection method based on vertical virtual road induction line.
Int. J. Embed. Syst., 2018

A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence.
Comput. J., 2018

DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A change-point DDoS attack detection method based on half interaction anomaly degree.
Int. J. Auton. Adapt. Commun. Syst., 2017

Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Trend prediction of internet public opinion based on collaborative filtering.
Proceedings of the 12th International Conference on Natural Computation, 2016

Characterization of bipolar information aggregation and decomposition.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
Road detection in image by fusion laser points based on fuzzy SVM for a small ground mobile robot.
J. Intell. Fuzzy Syst., 2015

A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Obstacle detection based on image and laser points fusion for a small ground robot.
Proceedings of the IEEE International Conference on Information and Automation, 2015


  Loading...