


default search action
Peng Tang 0002
Person information
- affiliation (PhD 2022): Shanghai Jiao Tong University, School of Cyber Science and Engineering, China
Other persons with the same name
- Peng Tang — disambiguation page
- Peng Tang 0001
— PLA Army Engineering University, College of Communications Engineering, Nanjing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j15]Yuqi Niu
, Weidong Qiu
, Peng Tang
, Lifan Wang
, Shuo Chen
, Shujun Li
, Nadin Kökciyan
, Ben Niu
:
Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. Proc. ACM Hum. Comput. Interact. 9(2): 1-38 (2025)
[j14]Peng Tang
, Xiaoyu Zhu
, Weidong Qiu
, Zheng Huang, Zhenyu Mu, Shujun Li
:
FLAD: Byzantine-Robust Federated Learning Based on Gradient Feature Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 22(4): 3993-4009 (2025)
[j13]Yangde Wang
, Weidong Qiu
, Peng Tang
, Hao Tian, Shujun Li
:
SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. IEEE Trans. Dependable Secur. Comput. 22(4): 4428-4441 (2025)
[j12]Guowei Ling
, Peng Tang
, Fei Tang
, Shifeng Sun
, Shouling Ji
, Weidong Qiu
:
Ultra-Fast Private Set Intersection From Efficient Oblivious Key-Value Stores. IEEE Trans. Dependable Secur. Comput. 22(5): 4998-5014 (2025)
[j11]Guowei Ling
, Peng Tang
, Fei Tang
, Shifeng Sun
, Jinyong Shan
, Liyao Xiang
, Weidong Qiu
:
Privacy-Preserving Authorized Set Matching via Dishonest Majority Multiparty Computation. IEEE Trans. Dependable Secur. Comput. 22(6): 7614-7631 (2025)
[j10]Guowei Ling
, Peng Tang
, Jinyong Shan
, Fei Tang
, Weidong Qiu
:
More Efficient, Privacy-Enhanced, and Powerful Privacy-Preserving Feature Retrieval Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 20: 4815-4827 (2025)
[i9]Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li
, Nadin Kokciyan, Ben Niu:
Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. CoRR abs/2501.11756 (2025)
[i8]Yuxin Chen, Peng Tang, Weidong Qiu, Shujun Li
:
Using LLMs for Automated Privacy Policy Analysis: Prompt Engineering, Fine-Tuning and Explainability. CoRR abs/2503.16516 (2025)
[i7]Yubin Zheng, Pak-Hei Yeung, Jing Xia, Tianjie Ju, Peng Tang, Weidong Qiu, Jagath C. Rajapakse:
FedDEAP: Adaptive Dual-Prompt Tuning for Multi-Domain Federated Learning. CoRR abs/2510.18837 (2025)- 2024
[j9]Guowei Ling
, Fei Tang
, Chaochao Cai, Jinyong Shan
, Haiyang Xue
, Wulu Li, Peng Tang
, Xinyi Huang
, Weidong Qiu
:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 19: 2201-2216 (2024)
[c12]Haozhang Li, Yangde Wang
, Weidong Qiu
, Shujun Li
, Peng Tang
:
PassTSL: Modeling Human-Created Passwords Through Two-Stage Learning. ACISP (3) 2024: 404-423
[c11]Peng Tang, Lifan Wang, Weidong Qiu, Zheng Huang, Qiangmin Wang:
Fuzzy Clustered Federated Learning Under Mixed Data Distributions. AAMAS 2024: 2501-2503
[c10]Yubin Zheng, Peng Tang, Tianjie Ju, Hao Wang, Weidong Qiu, Jagath C. Rajapakse:
Federated Semi-supervised Learning for Medical Image Segmentation with Intra-client and Inter-client Consistency. BIBM 2024: 4054-4059
[c9]Ke Hu, Liyao Xiang, Peng Tang, Weidong Qiu:
Feature Norm Regularized Federated Learning: Utilizing Data Disparities for Model Performance Gains. IJCAI 2024: 4136-4146
[c8]Yubin Zheng, Peng Tang, Tianjie Ju, Weidong Qiu, Bo Yan:
Fine-Grained Contrastive Learning for Pulmonary Nodule Classification. IJCNN 2024: 1-8
[i6]Yubin Zheng, Peng Tang, Tianjie Ju, Weidong Qiu, Bo Yan:
Federated Semi-supervised Learning for Medical Image Segmentation with intra-client and inter-client Consistency. CoRR abs/2403.12695 (2024)
[i5]Yangde Wang, Haozhang Li, Weidong Qiu, Shujun Li
, Peng Tang:
PassTSL: Modeling Human-Created Passwords through Two-Stage Learning. CoRR abs/2407.14145 (2024)
[i4]Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li
:
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers. CoRR abs/2410.04754 (2024)
[i3]Guowei Ling, Peng Tang, Weidong Qiu:
Low-Communication Updatable PSI from Asymmetric PSI and PSU. IACR Cryptol. ePrint Arch. 2024: 1712 (2024)- 2023
[j8]Ijazul Haq
, Weidong Qiu, Jie Guo, Peng Tang:
Pashto offensive language detection: a benchmark dataset and monolingual Pashto BERT. PeerJ Comput. Sci. 9: e1617 (2023)
[j7]Ijazul Haq
, Weidong Qiu, Jie Guo, Peng Tang:
Correction of whitespace and word segmentation in noisy Pashto text using CRF. Speech Commun. 153: 102970 (2023)
[j6]Fei Tang
, Guowei Ling
, Chaochao Cai, Jinyong Shan
, Xuanqi Liu
, Peng Tang
, Weidong Qiu:
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications. IEEE Trans. Inf. Forensics Secur. 18: 3517-3530 (2023)
[c7]Huina Li
, Guozhen Liu, Haochen Zhang, Peng Tang, Weidong Qiu:
Automatic Search of Linear Structure: Applications to Keccak and Ascon. Inscrypt (2) 2023: 172-192
[c6]Yubin Zheng, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo, Zheng Huang:
A Novel Deep Learning Framework for Interpretable Drug-Target Interaction Prediction with Attention and Multi-task Mechanism. DASFAA (4) 2023: 336-352
[i2]Ke Hu, Weidong Qiu, Peng Tang:
Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights. CoRR abs/2312.06951 (2023)- 2022
[j5]Yangyang Bao
, Weidong Qiu, Peng Tang
, Xiaochun Cheng
:
Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System. IEEE J. Biomed. Health Informatics 26(5): 2041-2051 (2022)
[i1]Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu:
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications. IACR Cryptol. ePrint Arch. 2022: 1573 (2022)- 2020
[j4]Huijuan Lian
, Weidong Qiu, Di Yan
, Jie Guo, Zhe Li, Peng Tang:
Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Comput. Secur. 96: 101845 (2020)
[j3]Peng Tang, Weidong Qiu, Zheng Huang, Shuang Chen, Min Yan, Huijuan Lian
, Zhe Li:
Anomaly detection in electronic invoice systems based on machine learning. Inf. Sci. 535: 172-186 (2020)
[j2]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
Detection of SQL injection based on artificial neural network. Knowl. Based Syst. 190: 105528 (2020)
[j1]Huijuan Lian, Weidong Qiu, Di Yan
, Zheng Huang, Peng Tang:
Efficient and secure k-nearest neighbor query on outsourced data. Peer-to-Peer Netw. Appl. 13(6): 2324-2333 (2020)
[c5]Jingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo:
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning. SocialSec 2020: 203-214
2010 – 2019
- 2019
[c4]Huijuan Lian, Weidong Qiu, Di Yan
, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. DSC 2019: 84-91
[c3]Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. DSC 2019: 300-305
[c2]Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. DSC 2019: 306-311- 2018
[c1]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
SQL Injection Behavior Mining Based Deep Learning. ADMA 2018: 445-454
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-14 01:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







