default search action
Ke Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Ke Tang 0001 — Southern University of Science and Technology, Shenzhen China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Zhi Da, Ke Tang, Yubo Tao, Liyan Yang:
Financialization and Commodity Markets Serial Dependence. Manag. Sci. 70(4): 2122-2143 (2024) - [j28]Dasheng Xiao, Zhifu Lin, Aiyang Yu, Ke Tang, Hong Xiao:
Data-driven method embedded physical knowledge for entire lifecycle degradation monitoring in aircraft engines. Reliab. Eng. Syst. Saf. 247: 110100 (2024) - [j27]Xiao Wang, Ke Tang, Xingyuan Dai, Jintao Xu, Quancheng Du, Rui Ai, Yuxiao Wang, Weihao Gu:
S4TP: Social-Suitable and Safety-Sensitive Trajectory Planning for Autonomous Vehicles. IEEE Trans. Intell. Veh. 9(2): 3220-3231 (2024) - [j26]Ke Tang, Lang Feng, Zhongfeng Wang:
Mixed Integer Programming based Placement Refinement by RSMT Model with Movable Pins. ACM Trans. Design Autom. Electr. Syst. 29(2): 36:1-36:18 (2024) - [c17]Wenqi Zhang, Ke Tang, Hai Wu, Mengna Wang, Yongliang Shen, Guiyang Hou, Zeqi Tan, Peng Li, Yueting Zhuang, Weiming Lu:
Agent-Pro: Learning to Evolve via Policy-Level Reflection and Optimization. ACL (1) 2024: 5348-5375 - [c16]Zhi Zheng, Shunyu Yao, Zhenkun Wang, Xialiang Tong, Mingxuan Yuan, Ke Tang:
DPN: Decoupling Partition and Navigation for Neural Solvers of Min-max Vehicle Routing Problems. ICML 2024 - [c15]Jiaqi Zhou, Yan Li, Ke Tang, Weiwei Guo, Wenxian Yu:
Improved Aligned Variational Autoencoders with Knowledge Graph for Generalized Zero-Shot Radar HRRP Target Recognition. IGARSS 2024: 10385-10389 - [i15]Pengyi Li, Jianye Hao, Hongyao Tang, Xian Fu, Yan Zheng, Ke Tang:
Bridging Evolutionary Algorithms and Reinforcement Learning: A Comprehensive Survey. CoRR abs/2401.11963 (2024) - [i14]Wenqi Zhang, Ke Tang, Hai Wu, Mengna Wang, Yongliang Shen, Guiyang Hou, Zeqi Tan, Peng Li, Yueting Zhuang, Weiming Lu:
Agent-Pro: Learning to Evolve via Policy-Level Reflection and Optimization. CoRR abs/2402.17574 (2024) - [i13]Xiao Wang, Ke Tang, Xingyuan Dai, Jintao Xu, Quancheng Du, Rui Ai, Yuxiao Wang, Weihao Gu:
S4TP: Social-Suitable and Safety-Sensitive Trajectory Planning for Autonomous Vehicles. CoRR abs/2404.11946 (2024) - [i12]Zhi Zheng, Shunyu Yao, Zhenkun Wang, Xialiang Tong, Mingxuan Yuan, Ke Tang:
DPN: Decoupling Partition and Navigation for Neural Solvers of Min-max Vehicle Routing Problems. CoRR abs/2405.17272 (2024) - 2023
- [j25]Ke Tang, Sidun Fang, Guanhong Chen, Tao Niu:
Unit Maintenance Strategy Considering the Uncertainty of Energy Intensive Load and Wind Power Under the Carbon Peak and Carbon Neutral Target. IEEE Access 11: 38819-38827 (2023) - [j24]Ke Tang, Lan Cheng, Xiao Wang, Chenqiang Pan, Liang Lin, Li Dong, Bo Li:
Research on Digital Monitoring Technology for Airport High-Pressure Rotary Jet Piles. IEEE Access 11: 112731-112752 (2023) - [j23]Xiaoyue Luo, Yanhui Wang, Junwu Dong, Zhanxing Li, Yang Yang, Ke Tang, Tao Huang:
Complete trajectory extraction for moving targets in traffic scenes that considers multi-level semantic features. Int. J. Geogr. Inf. Sci. 37(4): 913-937 (2023) - [j22]Songling Zhu, Ronghua Shang, Ke Tang, Songhua Xu, Yangyang Li:
BookKD: A novel knowledge distillation for reducing distillation costs by decoupling knowledge generation and learning. Knowl. Based Syst. 279: 110916 (2023) - [j21]Lin William Cong, Xi Li, Ke Tang, Yang Yang:
Crypto Wash Trading. Manag. Sci. 69(11): 6427-6454 (2023) - [j20]Yigong Pan, Ke Tang, Guangzhong Sun:
Theoretical guarantee for crowdsourcing learning with unsure option. Pattern Recognit. 137: 109316 (2023) - [j19]Xiao Wang, Ke Tang, Xingyuan Dai, Jintao Xu, Jinhao Xi, Rui Ai, Yuxiao Wang, Weihao Gu, Changyin Sun:
Safety-Balanced Driving-Style Aware Trajectory Planning in Intersection Scenarios With Uncertain Environment. IEEE Trans. Intell. Veh. 8(4): 2888-2898 (2023) - [j18]Lang Feng, Wenjian Liu, Chuliang Guo, Ke Tang, Cheng Zhuo, Zhongfeng Wang:
GANDSE: Generative Adversarial Network-based Design Space Exploration for Neural Network Accelerator Design. ACM Trans. Design Autom. Electr. Syst. 28(3): 35:1-35:20 (2023) - [c14]Ke Tang, Xiuxiu Hu, Pingsheng Chen, Siyu Xia:
Fibrosis Grading Methods for Renal Whole Slide Images Based on Uncertainty Estimation. ACPR (2) 2023: 396-408 - [c13]Yibo Wang, Peiran He, Ke Tang, Qian Huang, Yang Liu:
Research on the presupposition of product design conceptual model based on AHP to user psychological model. ICISE 2023: 311-316 - [i11]Zhenwei Zhang, Haorui Yan, Ke Tang, Yuping Duan:
MetaUE: Model-based Meta-learning for Underwater Image Enhancement. CoRR abs/2303.06543 (2023) - [i10]Kai Feng, Han Hong, Ke Tang, Jingyuan Wang:
Statistical Tests for Replacing Human Decision Makers with Algorithms. CoRR abs/2306.11689 (2023) - 2022
- [j17]Yu Cong, Ximeng Zhao, Ke Tang, Ge Wang, Yanfei Hu, Yingkui Jiao:
FA-LSTM: A Novel Toxic Gas Concentration Prediction Model in Pollutant Environment. IEEE Access 10: 1591-1602 (2022) - [j16]Chunyan Zhang, Qinglei Zhou, Meng Qiao, Ke Tang, Lianqiu Xu, Fudong Liu:
Re_Trans: Combined Retrieval and Transformer Model for Source Code Summarization. Entropy 24(10): 1372 (2022) - [j15]Chunyan Zhang, Junchao Wang, Qinglei Zhou, Ting Xu, Ke Tang, Hairen Gui, Fudong Liu:
A Survey of Automatic Source Code Summarization. Symmetry 14(3): 471 (2022) - [c12]Jinlong Liu, Junjian Chen, Dehong Liu, Liang Hu, Jun Li, Gang Chen, Jun Li, Ke Tang:
Research on High Performance Domestic Chip Architecture Based on Digital Grid Edge Computing. CSSE 2022: 695-701 - [i9]Lang Feng, Wenjian Liu, Chuliang Guo, Ke Tang, Cheng Zhuo, Zhongfeng Wang:
GANDSE: Generative Adversarial Network based Design Space Exploration for Neural Network Accelerator Design. CoRR abs/2208.00800 (2022) - 2021
- [c11]Ke Tang, Fudong Liu, Zheng Shan, Chunyan Zhang:
Anti-obfuscation Binary Code Clone Detection Based on Software Gene. ICPCSEE (1) 2021: 193-208 - [c10]Ke Tang, Jing Xu Ding, Mei Jian Lei, Zhen Zeng, Jun Di Guo, Qiu Ling Zeng:
An Electromagnetic Immunity Test Scheme for Vehicle Audio System. IEEA 2021: 11-16 - [c9]Lin William Cong, Xi Li, Ke Tang, Yang Yang:
Detecting and Quantifying Crypto Wash Trading (Extended Abstract). Tokenomics 2021: 10:1-10:6 - [i8]Lin William Cong, Ke Tang, Jingyuan Wang, Yang Zhang:
Deep Sequence Modeling: Development and Applications in Asset Pricing. CoRR abs/2108.08999 (2021) - [i7]Lin William Cong, Ke Tang, Bing Wang, Jingyuan Wang:
An AI-assisted Economic Model of Endogenous Mobility and Infectious Diseases: The Case of COVID-19 in the United States. CoRR abs/2109.10009 (2021) - 2020
- [j14]Ke Tang, Haiwen Yuan, Jianxun Lv, Fengchen Chen:
Research on the Method for Analyzing the Degree of Impact Acceleration and Compaction of the Impact Roller. IEEE Access 8: 73588-73600 (2020) - [j13]Xuesong Yan, Pengpeng Li, Ke Tang, Liang Gao, Ling Wang:
Clonal selection based intelligent parameter inversion algorithm for prestack seismic data. Inf. Sci. 517: 86-99 (2020) - [j12]Ke Tang, Haiwen Yuan, Jianxun Lv, Fengchen Chen:
Developing an Intelligent Monitoring Technology for Airport Stone Column Machines. Sensors 20(11): 3050 (2020) - [c8]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432 - [i6]Xiaojian Wang, Jingyuan Wang, Ke Tang:
Interpreting Deep Learning Model Using Rule-based Method. CoRR abs/2010.07824 (2020)
2010 – 2019
- 2019
- [j11]Ke Tang, Wei Wang, Yue Meng, Mingyan Zhang:
Flight control and airwake suppression algorithm for carrier landing based on model predictive control. Trans. Inst. Meas. Control 41(8): 2205-2213 (2019) - [c7]Jingyuan Wang, Yang Zhang, Ke Tang, Junjie Wu, Zhang Xiong:
AlphaStock: A Buying-Winners-and-Selling-Losers Investment Strategy using Interpretable Deep Reinforcement Attention Networks. KDD 2019: 1900-1908 - [i5]Kai Feng, Han Hong, Ke Tang, Jingyuan Wang:
Decision Making with Machine Learning and ROC Curves. CoRR abs/1905.02810 (2019) - [i4]Jingyuan Wang, Yang Zhang, Ke Tang, Junjie Wu, Zhang Xiong:
AlphaStock: A Buying-Winners-and-Selling-Losers Investment Strategy using Interpretable Deep Reinforcement Attention Networks. CoRR abs/1908.02646 (2019) - 2018
- [j10]Ruoxi Sun, Jing Ye, Ke Tang, Kai Zhang, Xin Zhang, Yong Ren:
Big Data Aided Vehicular Network Feature Analysis and Mobility Models Design. Mob. Networks Appl. 23(6): 1487-1495 (2018) - [j9]Ke Tang, Wenquan Zhu, Pei Zhan, Siyang Ding:
An Identification Method for Spring Maize in Northeast China Based on Spectral and Phenological Features. Remote. Sens. 10(2): 193 (2018) - [c6]Zheng Li, Xuesong Yan, Yuanyuan Fan, Ke Tang:
Improved Clonal Selection Algorithm for Solving AVO Elastic Parameter Inversion Problem. BIC-TA (1) 2018: 60-69 - 2017
- [j8]Massimiliano Vasile, Edmondo A. Minisci, Ke Tang:
Computational Intelligence in Aerospace Science and Engineering [Guest Editorial]. IEEE Comput. Intell. Mag. 12(4): 12-13 (2017) - [j7]Ke Tang, Hong Xiao:
Entropy Conditions Involved in the Nonlinear Coupled Constitutive Method for Solving Continuum and Rarefied Gas Flows. Entropy 19(12): 683 (2017) - 2015
- [j6]Ke Tang, Samuel W. K. Wong, Jun S. Liu, Jinfeng Zhang, Jie Liang:
Conformational sampling and structure prediction of multiple interacting loops in soluble and β-barrel membrane proteins using multi-loop distance-guided chain-growth Monte Carlo method. Bioinform. 31(16): 2646-2652 (2015) - 2014
- [j5]Guoquan Li, Ke Tang, Jinzhao Lin, Yu Pang, Zhangyong Li, Qianneng Zhou, Lu Deng:
Design of Modulation and Packet Detection in Body Area Networks. J. Comput. 9(4): 916-921 (2014) - [j4]Ke Tang, Jinfeng Zhang, Jie Liang:
Fast Protein Loop Sampling and Structure Prediction Using Distance-Guided Sequential Chain-Growth Monte Carlo Method. PLoS Comput. Biol. 10(4) (2014) - [c5]Ke Tang, Ganesh K. Venayagamoorthy:
Online coherency analysis of synchronous generators in a power system. ISGT 2014: 1-5 - 2013
- [j3]Yuxin Ding, Xuebing Yuan, Ke Tang, Xiao Xiao, Yibin Zhang:
A fast malware detection algorithm based on objective-oriented association mining. Comput. Secur. 39: 315-324 (2013) - [c4]Xiao Xiao, Yuxin Ding, Yibin Zhang, Ke Tang, Dai Wei:
Malware detection based on objective-oriented association mining. ICMLC 2013: 375-380 - 2011
- [j2]Mingyuan Zhao, Chong Fu, Luping Ji, Ke Tang, Mingtian Zhou:
Feature selection and parameter optimization for support vector machines: A new approach based on genetic algorithm with feature chromosomes. Expert Syst. Appl. 38(5): 5197-5204 (2011) - 2010
- [c3]Thanh-Tung Cao, Ke Tang, Anis Mohamed, Tiow Seng Tan:
Parallel Banding Algorithm to compute exact distance transform with the GPU. SI3D 2010: 83-90
2000 – 2009
- 2009
- [c2]Zhengbin Dong, Guojie Song, Kunqing Xie, Ke Tang, Jingyao Wang:
Statistical Analysis of Real Large-Scale Mobile Social Network. FSKD (2) 2009: 612-616 - 2008
- [c1]Xiaowen Zhang, Li Shu, Ke Tang:
Multi-Map Orbit Hopping Chaotic Cipher. Security and Management 2008: 327-332 - 2006
- [j1]Ke Tang, Huaiwu Zhang, Zhiyong Zhong:
Lekner summation for two-dimensional magnetic dipolar interaction energy. Comput. Phys. Commun. 174(4): 270-272 (2006) - [i3]Xiaowen Zhang, Li Shu, Ke Tang:
Multi-Map Orbit Hopping Chaotic Stream Cipher. CoRR abs/cs/0601010 (2006) - [i2]Xiaowen Zhang, Ke Tang, Li Shu:
A Chaotic Cipher Mmohocc and Its Randomness Evaluation. CoRR abs/cs/0605066 (2006) - [i1]Xiaowen Zhang, Li Shu, Ke Tang:
A Chaotic Cipher Mmohocc and Its Security Analysis. CoRR abs/cs/0606025 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint