default search action
Xiangyan Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Xin Peng, Jieren Cheng, Xiangyan Tang, Bin Zhang, Wenxuan Tu:
Multi-view graph imputation network. Inf. Fusion 102: 102024 (2024) - [j25]Xiangyan Tang, Wenhang Xu, Keqiu Li, Mengxue Han, Zhizhong Ma, Ruili Wang:
PIAENet: Pyramid integration and attention enhanced network for object detection. Inf. Sci. 670: 120576 (2024) - [j24]Xin Peng, Jieren Cheng, Xiangyan Tang, Jingxin Liu, Jiahua Wu:
Dual Contrastive Learning Network for Graph Clustering. IEEE Trans. Neural Networks Learn. Syst. 35(8): 10846-10856 (2024) - [j23]Xin Peng, Jieren Cheng, Xiangyan Tang, Ziqi Deng, Wenxuan Tu, Neal Xiong:
HSNet: An Intelligent Hierarchical Semantic-Aware Network System for Real-Time Semantic Segmentation. IEEE Trans. Syst. Man Cybern. Syst. 54(7): 4318-4330 (2024) - 2023
- [j22]Jieren Cheng, Xiulai Li, Xinbing Xu, Xiangyan Tang, Victor S. Sheng:
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain. Comput. Syst. Sci. Eng. 47(1): 975-992 (2023) - [c18]Guolong Liao, Xiangyan Tang, Tian Li, Li Zhong, Pengfan Zeng:
A Review of Relationship Extraction Based on Deep Learning. IAIC (1) 2023: 73-84 - [c17]Haojun Liu, Xiangyan Tang, Taixing Xu, Ji He:
A Survey of Homogeneous and Heterogeneous Multi-source Information Fusion Based on Rough Set Theory. IAIC (1) 2023: 235-246 - [c16]Jiahua Wu, Xiangyan Tang, Guangxing Liu, Bofan Wu:
An Overview of Graph Data Missing Value Imputation. IAIC (2) 2023: 256-270 - 2022
- [j21]Lang Li, Tiancai Liang, Shan Ai, Xiangyan Tang:
Erratum to: An improved random forest algorithm and its application to wind pressure prediction. Int. J. Intell. Syst. 37(2): 1802 (2022) - [j20]Jieren Cheng, Xin Peng, Xiangyan Tang, Wenxuan Tu, Wenhang Xu:
MIFNet: A lightweight multiscale information fusion network. Int. J. Intell. Syst. 37(9): 5617-5642 (2022) - [j19]Jingxin Liu, Jieren Cheng, Xin Peng, Zeli Zhao, Xiangyan Tang, Victor S. Sheng:
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition. KSII Trans. Internet Inf. Syst. 16(6): 1833-1848 (2022) - 2021
- [j18]Lang Li, Tiancai Liang, Shan Ai, Xiangyan Tang:
An improved random forest algorithm and its application to wind pressure prediction. Int. J. Intell. Syst. 36(8): 4016-4032 (2021) - [j17]Xiangyan Tang, Wenxuan Tu, Keqiu Li, Jieren Cheng:
DFFNet: An IoT-perceptive dual feature fusion network for general real-time semantic segmentation. Inf. Sci. 565: 326-343 (2021) - [j16]Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan:
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mob. Networks Appl. 26(4): 1543-1550 (2021) - [j15]Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan:
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mob. Networks Appl. 26(4): 1551 (2021) - [j14]Jieren Cheng, Luyi Xie, Xiangyan Tang, Naixue Xiong, Boyi Liu:
A survey of security threats and defense on Blockchain. Multim. Tools Appl. 80(20): 30623-30652 (2021) - [c15]Xiangyan Tang, Hao Guo, Hui Li, Yuming Yuan, Jianghao Wang, Jieren Cheng:
A DAPP Business Data Storage Model Based on Blockchain and IPFS. ICAIS (2) 2021: 219-230 - [e1]Jieren Cheng, Xiangyan Tang, Xiaozhang Liu:
Cyberspace Safety and Security - 12th International Symposium, CSS 2020, Haikou, China, December 1-3, 2020, Proceedings. Lecture Notes in Computer Science 12653, Springer 2021, ISBN 978-3-030-73670-5 [contents] - 2020
- [j13]Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu:
DDoS attack detection method based on network abnormal behaviour in big data environment. Int. J. Comput. Sci. Eng. 23(1): 22-30 (2020) - [j12]Boyi Liu, Xiangyan Tang, Jieren Cheng, Pengchao Shi:
Traffic flow combination forecasting method based on improved LSTM and ARIMA. Int. J. Embed. Syst. 12(1): 22-30 (2020) - [j11]Jieren Cheng, Yue Yang, Xiangyan Tang, Naixue Xiong, Yuan Zhang, Feifei Lei:
Generative Adversarial Networks: A Literature Review. KSII Trans. Internet Inf. Syst. 14(12): 4625-4647 (2020)
2010 – 2019
- 2019
- [j10]Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing". Secur. Commun. Networks 2019: 6809054:1 (2019) - [j9]Ruomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu:
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry 11(1): 78 (2019) - [c14]Yifu Liu, Jieren Cheng, Xiangyan Tang, Mengyang Li, Luyi Xie:
Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network. CSS (2) 2019: 30-41 - [c13]Xiangyan Tang, Rui Cao, Jieren Cheng, Dong Fan, Wenxuan Tu:
DDoS Attack Detection Method Based on V-Support Vector Machine. CSS (2) 2019: 42-56 - [c12]Xiangyan Tang, Yiyang Zhang, Jieren Cheng, Jinying Xu, Hui Li:
DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning. CSS (2) 2019: 57-66 - [c11]Xiangyan Tang, Meizhu Chen, Jieren Cheng, Jinying Xu, Hui Li:
A Security Situation Assessment Method Based on Neural Network. CSS (2) 2019: 579-587 - [c10]Wei Guo, Xiangyan Tang, Jieren Cheng, Jinying Xu, Canting Cai, Yulong Guo:
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory. ICAIS (4) 2019: 396-407 - [i5]Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu:
DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment. CoRR abs/1903.11844 (2019) - [i4]Xiangyan Tang, Liang Wang, Jieren Cheng, Jing Chen:
Forecasting model based on information-granulated GA-SVR and ARIMA for producer price index. CoRR abs/1903.12012 (2019) - [i3]Jieren Cheng, Chen Zhang, Xiangyan Tang, Victor S. Sheng, Zhe Dong, Junqi Li, Jing Chen:
Adaptive DDoS attack detection method based on multiple-kernel learning. CoRR abs/1905.07893 (2019) - [i2]Jieren Cheng, Junqi Li, Xiangyan Tang, Victor S. Sheng, Chen Zhang, Mengyang Li:
A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning. CoRR abs/1906.08204 (2019) - [i1]Boyi Liu, Xiangyan Tang, Jieren Cheng, Pengchao Shi:
Traffic Flow Combination Forecasting Method Based on Improved LSTM and ARIMA. CoRR abs/1906.10407 (2019) - 2018
- [j8]Jieren Cheng, Jinghe Zhou, Qiang Liu, Xiangyan Tang, Yanxiang Guo:
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. Comput. J. 61(7): 959-970 (2018) - [j7]Jieren Cheng, Boyi Liu, Xiangyan Tang, Zhuhua Hu, Jianping Yin:
Traffic flow detection method based on vertical virtual road induction line. Int. J. Embed. Syst. 10(6): 518-525 (2018) - [j6]Jieren Cheng, Boyi Liu, Xiangyan Tang:
An automatic traffic-congestion detection method for bad weather based on traffic video. Int. J. High Perform. Comput. Netw. 11(3): 251-259 (2018) - [j5]Boyi Liu, Xiangyan Tang, Jieren Cheng:
基于多生长时期模板匹配的玉米螟识别方法 (Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods). 计算机科学 45(4): 106-111 (2018) - [j4]Jieren Cheng, Chen Zhang, Xiangyan Tang, Victor S. Sheng, Zhe Dong, Junqi Li:
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning. Secur. Commun. Networks 2018: 5198685:1-5198685:19 (2018) - [j3]Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. Secur. Commun. Networks 2018: 6459326:1-6459326:14 (2018) - [c9]Ruomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu:
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. ICA3PP (Workshops) 2018: 165-176 - [c8]Ruizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu, Xiangfeng He:
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. ICCCS (2) 2018: 654-669 - [c7]Boyi Liu, Xiangyan Tang, Jieren Cheng, Jiquan Chen:
Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot. ICCCS (2) 2018: 718-730 - 2017
- [j2]Jieren Cheng, Xiangyan Tang, Jianping Yin:
A change-point DDoS attack detection method based on half interaction anomaly degree. Int. J. Auton. Adapt. Commun. Syst. 10(1): 38-54 (2017) - [c6]Jieren Cheng, Kuanqi Cai, Boyi Liu, Xiangyan Tang:
Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model. ICCCS (1) 2017: 275-287 - [c5]Boyi Liu, Jieren Cheng, Kuanqi Cai, Pengchao Shi, Xiangyan Tang:
Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction. NCTCS 2017: 328-340 - 2016
- [c4]Xuegang Chen, Jieren Cheng, Jianping Yin, Xiangyan Tang, Jialu Zhang:
Characterization of bipolar information aggregation and decomposition. ICNC-FSKD 2016: 305-310 - [c3]Xuegang Chen, Mingna Xia, Jieren Cheng, Xiangyan Tang, Jialu Zhang:
Trend prediction of internet public opinion based on collaborative filtering. ICNC-FSKD 2016: 583-588 - 2015
- [j1]Xia Yuan, Xiangyan Tang, Chunxia Zhao:
Road detection in image by fusion laser points based on fuzzy SVM for a small ground mobile robot. J. Intell. Fuzzy Syst. 29(6): 2677-2688 (2015) - [c2]Xia Yuan, Xiangyan Tang, Shukun Xue, Chunxia Zhao:
Obstacle detection based on image and laser points fusion for a small ground robot. ICIA 2015: 386-391 - [c1]Jieren Cheng, Boyi Liu, Xiangyan Tang:
A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video. ISICA 2015: 506-518
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint