


default search action
Dan Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Dan Tang 0001
— Yunnan University, Kunming, Yunnan, China - Dan Tang 0002
— Beijing Institute of Open Source Chip, Beijing, China - Dan Tang 0003
— Hunan University, Changsha, China - Dan Tang 0004
— Chengdu University of Information Technology, China - Dan Tang 0005
— Liaoning University, Shenyang, China - Dan Tang 0006
— Sichuan University of Science and Engineering, Zigong, Sichuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j26]Dunlong Liu, Jing Zhou, Xuejia Sang, Dan Tang, Shaojie Zhang, Qiao Chen:
Machine learning-based identification of potential debris flow catchments in the Wenchuan earthquake region. Earth Sci. Informatics 18(4): 515 (2025)
[j25]Xiaobao Liu
, Cheng Zhang, Wenjuan Gu, Tingqiang Yao, Jihong Shen, Dan Tang:
Multi-Organ Segmentation Network for Female Pelvic MR Images Based on Hierarchical Decoupled Fusion and Multi-Scale Feature Processing. Int. J. Imaging Syst. Technol. 35(3) (2025)
[j24]Dan Tang, Liucen Lai:
Analysis of Employment Effect and Regional Characteristics of Digital Economy Development. J. Adv. Comput. Intell. Intell. Informatics 29(3): 687-696 (2025)- 2024
[j23]Xiaocai Wang, Dan Tang, Ye Feng, Zheng Qin, Bing Xiong
, Yufeng Liu
:
An LDoS attack detection method based on FSWT time-frequency distribution. Expert Syst. Appl. 256: 125006 (2024)
[j22]Haiqing Zhang
, Xi Yu, Tianrui Li
, Daiwei Li
, Dan Tang, Lei He:
Noise-aware and correlation analysis-based for fuzzy-rough feature selection. Inf. Sci. 659: 120047 (2024)
[j21]Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. J. Supercomput. 80(3): 4248-4285 (2024)
[c22]Kunran Li, Dongping Huang, Peizhuo Li, Dan Tang:
ECG Signal Denoising Method Based on CEEMDAN Algorithm and Strong Adaptive Wavelet Threshold. ICVISP 2024: 1-12
[i2]Xu-Hao Chen, Si-Peng Hu, Hong-Chao Liu, Boran Liu, Dan Tang, Di Zhao:
Research on LLM Acceleration Using the High-Performance RISC-V Processor "Xiangshan" (Nanhu Version) Based on the Open-Source Matrix Instruction Set Extension (Vector Dot Product). CoRR abs/2409.00661 (2024)- 2023
[j20]Dan Tang, Jiangying Wei:
Prediction and Characteristic Analysis of Enterprise Digital Transformation Integrating XGBoost and SHAP. J. Adv. Comput. Intell. Intell. Informatics 27(5): 780-789 (2023)
[c21]Zihan Huang, Jin Jin, Chaolong Zhang, Zhijie Xu
, Yuanping Xu, Chao Kong, Qin Wen, Dan Tang:
Quantization and Deployment Study of Classification Models for Embedded Platforms. ICAC 2023: 1-6- 2022
[j19]Dan Tang, Xiyin Wang, Yudong Yan, Dongshuo Zhang, Huan Zhao:
ADMS: An online attack detection and mitigation system for LDoS attacks via SDN. Comput. Commun. 181: 454-471 (2022)
[j18]Dan Tang, Qingyu Xiong, Hongpeng Yin, Zhiqin Zhu
, Yanxia Li:
A novel sparse representation based fusion approach for multi-focus images. Expert Syst. Appl. 197: 116737 (2022)
[j17]Dan Tang, Jingwen Chen, Xiyin Wang, Siqi Zhang, Yudong Yan:
A new detection method for LDoS attacks based on data mining. Future Gener. Comput. Syst. 128: 73-87 (2022)- 2021
[j16]Dan Tang, Siqi Zhang, Jingwen Chen, Xiyin Wang:
The detection of low-rate DoS attacks using the SADBSCAN algorithm. Inf. Sci. 565: 229-247 (2021)
[j15]Dan Tang, Xintian Zhuang:
Financing a capital-constrained supply chain: factoring accounts receivable vs a BCT-SCF receivable chain. Kybernetes 50(8): 2209-2231 (2021)
[j14]Dan Tang, Liu Tang
, Wei Shi, Sijia Zhan, Qiuwei Yang:
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN. Mob. Networks Appl. 26(4): 1705-1722 (2021)
[c20]Siyuan Wang, Dan Tang, Yu Liu, Jingwen Chen, Yudong Yan, Jiayi Zhang:
LDoS Attack Detection using PSO and K-means Algorithm. CSCWD 2021: 317-322
[c19]Dan Tang, Dongshuo Zhang, Huan Zhao, Dashun Liu, Yudong Yan, Jingwen Chen:
Work in Progress: Network Attack Detection Towards Smart Factory. RTAS 2021: 485-488
[c18]Boru Liu, Dan Tang, Yudong Yan, Zhiqing Zheng, Shihan Zhang, Jiangmeng Zhou:
TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM. TrustCom 2021: 678-685- 2020
[j13]Dan Tang, Jianping Man, Liu Tang, Ye Feng, Qiuwei Yang:
WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection. Ad Hoc Networks 102: 102145 (2020)
[j12]Dan Tang:
The Study on the Influence of Terms of Trade on Regional Inflation - Based on the Mixed NKPC Model Under the Opening Economy Condition. J. Adv. Comput. Intell. Intell. Informatics 24(4): 461-467 (2020)
[j11]Cheng Zhang
, Bo Ou
, Dan Tang:
An improved VLC mapping method with parameter optimization for reversible data hiding in JPEG bitstream. Multim. Tools Appl. 79(27-28): 19045-19062 (2020)
[j10]Sijia Zhan
, Dan Tang, Jianping Man, Rui Dai, Xiyin Wang:
Low-Rate DoS Attacks Detection Based on MAF-ADM. Sensors 20(1): 189 (2020)
[c17]Zhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen:
An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm. ICCCN 2020: 1-9
[c16]Xiaocai Wang, Qiuwei Yang, Zichao Xie, Zhiqing Zheng, Yudong Yan, Dan Tang:
Low-rate DoS Attack Detection Based on WPD-EE Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2020: 384-391
2010 – 2019
- 2019
[j9]Feng Xiao, Di Fan, Dan Tang:
A Fast Recovery Method for Single Disk Failure Based on EVENODD. Int. J. Netw. Secur. 21(3): 392-401 (2019)
[j8]Di Fan, Feng Xiao, Dan Tang:
A New Erasure Code Decoding Algorithm. Int. J. Netw. Secur. 21(3): 522-529 (2019)
[j7]Rui Zhang, Shenghong He
, Xinghua Yang, Xiaoyun Wang, Kai Li, Qiyun Huang
, Zhuliang Yu
, Xichun Zhang, Dan Tang, Yuanqing Li
:
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries. IEEE Trans. Biomed. Eng. 66(1): 89-100 (2019)
[c15]Yudong Yan, Dan Tang, Sijia Zhan, Rui Dai, Jingwen Chen, Ningbo Zhu:
Low-Rate DoS Attack Detection Based on Improved Logistic Regression. HPCC/SmartCity/DSS 2019: 468-476
[c14]Dongshuo Zhang, Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Ningbo Zhu:
PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack. HPCC/SmartCity/DSS 2019: 1163-1170
[c13]Daiwei Li, Tianrui Li
, Haiqing Zhang, Abdelaziz Bouras, Xi Yu, Dan Tang:
A Fitted Fuzzy-rough Method for Missing Data Imputation. ISKE 2019: 74-81- 2018
[j6]Dan Tang, Yaqiang Wang, Haopeng Yang
:
Array Erasure Codes with Preset Fault Tolerance Capability. Int. J. Netw. Secur. 20(1): 193-200 (2018)
[c12]Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man:
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. ICICS 2018: 92-104
[c11]Xiaoxue Wu, Dan Tang, Liu Tang, Jianping Man, Sijia Zhan, Qin Liu:
A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1358-1363- 2016
[j5]Lifeng Wang, Jingjing Ma, Yan Huang, Dan Tang, Qing-An Huang
:
Passive Wireless Hermetic Environment Monitoring System for Spray Painting Workshop. Sensors 16(8): 1207 (2016)
[c10]Chuan Zhang, Yun Peng
, Sheng Li, Ping Zhou, Alvaro Munoz
, Dan Tang, Yingchun Zhang:
Spatial characterization of innervation zones under electrically elicited M-wave. EMBC 2016: 121-124
[c9]Bangli Liu
, Hui Yu
, Xiaolong Zhou, Dan Tang, Honghai Liu
:
Combining 3D joints Moving Trend and Geometry property for human action recognition. SMC 2016: 332-337- 2014
[j4]Xindan Li, Dan Tang, Yongjin Wang, Xuewei Yang
:
Optimal processing rate and buffer size of a jump-diffusion processing system. Ann. Oper. Res. 217(1): 319-335 (2014)
[j3]Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Collaborative Detection Method for LDoS Attacks. J. Networks 9(10): 2674-2681 (2014)
[j2]Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Detection Method based on AEWMA Algorithm for LDoS attacks. J. Networks 9(11): 2981-2986 (2014)- 2013
[c8]Yanjuan Geng, Liangqing Zhang, Dan Tang, Xiufeng Zhang, Guanglin Li
:
Pattern recognition based forearm motion classification for patients with chronic hemiparesis. EMBC 2013: 5918-5921- 2012
[c7]Wen Su, Longbing Zhang, Dan Tang, Xiang Gao:
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing. HPCC-ICESS 2012: 509-515- 2011
[i1]Yungang Bao, Jinyong Zhang, Yan Zhu, Dan Tang, Yuan Ruan, Mingyu Chen, Jianping Fan:
HMTT: A Hybrid Hardware/Software Tracing System for Bridging Memory Trace's Semantic Gap. CoRR abs/1106.2568 (2011)- 2010
[j1]Xiang Gao, Yunji Chen
, Huandong Wang, Dan Tang, Weiwu Hu:
System Architecture of Godson-3 Multi-Core Processors. J. Comput. Sci. Technol. 25(2): 181-191 (2010)
[c6]Yiding Wang, Xiaojing Wang, Dan Tang:
Secret Image Sharing Based on Array Codes. APWCS 2010: 113-117
[c5]Huandong Wang, Xiang Gao, Yunji Chen
, Dan Tang, Weiwu Hu:
A multi-FPGA based platform for emulating a 100m-transistor-scale processor with high-speed peripherals (abstract only). FPGA 2010: 283
[c4]Dan Tang, Yungang Bao, Weiwu Hu, Mingyu Chen:
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance. HPCA 2010: 1-12
2000 – 2009
- 2009
[c3]Huandong Wang, Dan Tang, Xiang Gao, Yunji Chen
:
An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMP. NAS 2009: 215-218- 2008
[c2]Dan Tang, Xiaojing Wang:
Image Encryption Based on Bivariate Polynomials. CSSE (6) 2008: 193-196- 2004
[c1]Hai Jin, Dan Tang, Yongkun Zhang, Hao Chen:
SHAK: Eliminating Faked Three-way Handshaking in Socket Handoff. IPDPS 2004
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-22 05:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







