
Peng Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j44]Peng Tang, Kaixiang Peng
, Jie Dong
, Kai Zhang, Shanshan Zhao:
Monitoring of Nonlinear Processes With Multiple Operating Modes Through a Novel Gaussian Mixture Variational Autoencoder Model. IEEE Access 8: 114487-114500 (2020) - [j43]Huijuan Lian
, Weidong Qiu, Di Yan, Jie Guo, Zhe Li, Peng Tang:
Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Comput. Secur. 96: 101845 (2020) - [j42]Peng Tang, Yu Wang, Ning Shen:
Prediction of college students' physical fitness based on K-means clustering and SVR. Comput. Syst. Sci. Eng. 35(4) (2020) - [j41]Peng Tang, Weidong Qiu, Zheng Huang, Shuang Chen, Min Yan, Huijuan Lian
, Zhe Li:
Anomaly detection in electronic invoice systems based on machine learning. Inf. Sci. 535: 172-186 (2020) - [j40]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
Detection of SQL injection based on artificial neural network. Knowl. Based Syst. 190: 105528 (2020) - [j39]Peng Tang
, Xinggang Wang
, Song Bai
, Wei Shen
, Xiang Bai, Wenyu Liu
, Alan L. Yuille:
PCL: Proposal Cluster Learning for Weakly Supervised Object Detection. IEEE Trans. Pattern Anal. Mach. Intell. 42(1): 176-191 (2020) - [j38]Peng Tang
, Chunyu Wang
, Xinggang Wang
, Wenyu Liu
, Wenjun Zeng
, Jingdong Wang
:
Object Detection in Videos by High Quality Object Linking. IEEE Trans. Pattern Anal. Mach. Intell. 42(5): 1272-1278 (2020) - [j37]Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang:
Efficient and secure k-nearest neighbor query on outsourced data. Peer Peer Netw. Appl. 13(6): 2324-2333 (2020) - [j36]Peng Tang
, Qiaokang Liang
, Xintong Yan, Shao Xiang
, Dan Zhang:
GP-CNN-DTEL: Global-Part CNN Model With Data-Transformed Ensemble Learning for Skin Lesion Classification. IEEE J. Biomed. Health Informatics 24(10): 2870-2882 (2020) - [j35]Xiang Cheng
, Peng Tang
, Sen Su
, Rui Chen, Zequn Wu, Binyuan Zhu:
Multi-Party High-Dimensional Data Publishing Under Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(8): 1557-1571 (2020) - [c41]Jingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo:
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning. SocialSec 2020: 203-214 - [i13]Peng Tang, Chetan Ramaiah, Ran Xu, Caiming Xiong:
Proposal Learning for Semi-Supervised Object Detection. CoRR abs/2001.05086 (2020) - [i12]Zhenfang Chen, Lin Ma, Wenhan Luo, Peng Tang, Kwan-Yee K. Wong:
Look Closer to Ground Better: Weakly-Supervised Temporal Grounding of Sentence in Video. CoRR abs/2001.09308 (2020) - [i11]Yingwei Li, Qihang Yu, Mingxing Tan, Jieru Mei, Peng Tang, Wei Shen, Alan L. Yuille, Cihang Xie:
Shape-Texture Debiased Neural Network Training. CoRR abs/2010.05981 (2020)
2010 – 2019
- 2019
- [j34]Peng Tang
, Qiaokang Liang, Xintong Yan, Dan Zhang, Gianmarc Coppola, Wei Sun:
Multi-proportion channel ensemble model for retinal vessel segmentation. Comput. Biol. Medicine 111 (2019) - [j33]Peng Tang
, Qiaokang Liang, Xintong Yan, Shao Xiang, Wei Sun, Dan Zhang, Gianmarc Coppola:
Efficient skin lesion segmentation using separable-Unet with stochastic weight averaging. Comput. Methods Programs Biomed. 178: 289-301 (2019) - [j32]Hao Hua
, Ludger Hovestadt, Peng Tang
, Biao Li:
Integer programming for urban design. Eur. J. Oper. Res. 274(3): 1125-1137 (2019) - [j31]Binbin Huang, Zhongjin Li, Peng Tang, Shangguang Wang, Jun Zhao, Haiyang Hu, Wanqing Li, Victor I. Chang
:
Security modeling and efficient computation offloading for service workflow in mobile edge computing. Future Gener. Comput. Syst. 97: 755-774 (2019) - [j30]Peng Tang, Fei Wang, Yuehong Dai:
Controller Design for Different Electric Tail Rotor Operating Modes in Helicopters. Int. J. Pattern Recognit. Artif. Intell. 33(8): 1959022:1-1959022:20 (2019) - [j29]Xinggang Wang
, Yongluan Yan, Peng Tang
, Wenyu Liu
, Xiaojie Guo
:
Bag similarity network for deep multi-instance learning. Inf. Sci. 504: 578-588 (2019) - [j28]Xinggang Wang
, Jiasi Wang, Peng Tang, Wenyu Liu:
Weakly- and Semi-Supervised Fast Region-Based CNN for Object Detection. J. Comput. Sci. Technol. 34(6): 1269-1278 (2019) - [j27]Peng Tang
, Xinggang Wang
, Baoguang Shi, Xiang Bai
, Wenyu Liu
, Zhuowen Tu
:
Deep FisherNet for Image Classification. IEEE Trans. Neural Networks Learn. Syst. 30(7): 2244-2250 (2019) - [j26]Tao Deng
, Zhenhua Su, Junying Li, Peng Tang, Xing Chen, Ping Liu:
Advanced Angle Field Weakening Control Strategy of Permanent Magnet Synchronous Motor. IEEE Trans. Veh. Technol. 68(4): 3424-3435 (2019) - [c40]Hongru Zhu, Peng Tang, Alan L. Yuille, Soojin Park, Jeongho Park:
Robustness of Object Recognition under Extreme Occlusion in Humans and Computational Models. CogSci 2019: 3213-3219 - [c39]Song Bai, Peng Tang, Philip H. S. Torr, Longin Jan Latecki:
Re-Ranking via Metric Fusion for Object Retrieval and Person Re-Identification. CVPR 2019: 740-749 - [c38]Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. DSC 2019: 84-91 - [c37]Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. DSC 2019: 300-305 - [c36]Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. DSC 2019: 306-311 - [c35]Yuyin Zhou, Yan Wang, Peng Tang, Song Bai, Wei Shen, Elliot K. Fishman, Alan L. Yuille:
Semi-Supervised 3D Abdominal Multi-Organ Segmentation Via Deep Multi-Planar Co-Training. WACV 2019: 121-140 - [i10]Hongru Zhu, Peng Tang, Alan L. Yuille:
Robustness of Object Recognition under Extreme Occlusion in Humans and Computational Models. CoRR abs/1905.04598 (2019) - [i9]Binbin Huang, Zhongjin Li, Peng Tang, Shangguang Wang, Jun Zhao, Haiyang Hu, Wanqing Li, Victor I. Chang:
Security modeling and efficient computation offloading for service workflow in mobile edge computing. CoRR abs/1907.02506 (2019) - 2018
- [j25]Yanhua Hu, Peng Tang, Weidong Jin, Zhengwei He:
铁路视频序列的FOE的估计 (Estimation of FOE for Railway Video Sequences). 计算机科学 45(7): 226-229 (2018) - [j24]Zhenzhen Cai, Peng Tang, Jianbin Hu, Weidong Jin:
深度卷积神经网络实现硬性渗出的自动检测 (Auto-detection of Hard Exudates Based on Deep Convolutional Neural Network). 计算机科学 45(11A): 203-207 (2018) - [j23]Xinggang Wang
, Yongluan Yan, Peng Tang, Xiang Bai, Wenyu Liu
:
Revisiting multiple instance neural networks. Pattern Recognit. 74: 15-24 (2018) - [c34]Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, Guozhen Liu:
SQL Injection Behavior Mining Based Deep Learning. ADMA 2018: 445-454 - [c33]Peng Tang, Xinggang Wang
, Angtian Wang, Yongluan Yan, Wenyu Liu
, Junzhou Huang, Alan L. Yuille:
Weakly Supervised Region Proposal Network and Object Detection. ECCV (11) 2018: 370-386 - [c32]Gangming Zhao, Zhaoxiang Zhang, He Guan, Peng Tang, Jingdong Wang:
Rethinking ReLU to Train Better CNNs. ICPR 2018: 603-608 - [c31]Yan Wang, Yuyin Zhou, Peng Tang, Wei Shen, Elliot K. Fishman, Alan L. Yuille:
Training Multi-organ Segmentation Networks with Sample Selection by Relaxed Upper Confident Bound. MICCAI (4) 2018: 434-442 - [i8]Peng Tang, Chunyu Wang, Xinggang Wang, Wenyu Liu, Wenjun Zeng, Jingdong Wang:
Object Detection in Videos by Short and Long Range Object Linking. CoRR abs/1801.09823 (2018) - [i7]Yuyin Zhou, Yan Wang, Peng Tang, Wei Shen, Elliot K. Fishman, Alan L. Yuille:
Semi-supervised multi-organ segmentation via multi-planar co-training. CoRR abs/1804.02586 (2018) - [i6]Yan Wang, Yuyin Zhou, Peng Tang, Wei Shen, Elliot K. Fishman, Alan L. Yuille:
Training Multi-organ Segmentation Networks with Sample Selection by Relaxed Upper Confident Bound. CoRR abs/1804.02595 (2018) - [i5]Peng Tang, Xinggang Wang, Song Bai, Wei Shen, Xiang Bai, Wenyu Liu, Alan L. Yuille:
PCL: Proposal Cluster Learning for Weakly Supervised Object Detection. CoRR abs/1807.03342 (2018) - 2017
- [j22]Dan Wang, Junfeng Wang
, Yihua Du, Peng Tang:
Adaptive Solitary Pulmonary Nodule Segmentation for Digital Radiography Images Based on Random Walks and Sequential Filter. IEEE Access 5: 1460-1468 (2017) - [j21]Damian M. Lyons, Ronald C. Arkin, Shu Jiang, Matthew Joseph O'Brien, Feng Tang, Peng Tang:
Establishing A-Priori Performance Guarantees for Robot Missions that Include Localization Software. Int. J. Monit. Surveillance Technol. Res. 5(1): 49-70 (2017) - [j20]Jingfeng Wu, Weidong Jin, Peng Tang:
数据异常的监测技术综述 (Survey on Monitoring Techniques for Data Abnormalities). 计算机科学 44(Z11): 24-28 (2017) - [j19]Peng Tang, Jin Zhang, Xinggang Wang
, Bin Feng, Fabio Roli, Wenyu Liu
:
Learning extremely shared middle-level image representation for scene classification. Knowl. Inf. Syst. 52(2): 509-530 (2017) - [j18]Peng Tang, Xinggang Wang
, Zilong Huang, Xiang Bai, Wenyu Liu
:
Deep patch learning for weakly supervised object classification and discovery. Pattern Recognit. 71: 446-459 (2017) - [j17]Damian M. Lyons, Ronald C. Arkin, Shu Jiang, Matthew Joseph O'Brien, Feng Tang
, Peng Tang:
Performance verification for robot missions in uncertain environments. Robotics Auton. Syst. 98: 89-104 (2017) - [j16]Mingbo Zhao, Tommy W. S. Chow
, Peng Tang, Zengfu Wang, Jun Guo, Moshe Zukerman
:
Route Selection for Cabling Considering Cost Minimization and Earthquake Survivability Via a Semi-Supervised Probabilistic Model. IEEE Trans. Ind. Informatics 13(2): 502-511 (2017) - [j15]Peng Tang, Xinggang Wang
, Bin Feng, Wenyu Liu
:
Learning Multi-Instance Deep Discriminative Patterns for Image Classification. IEEE Trans. Image Process. 26(7): 3385-3396 (2017) - [c30]Peng Tang, Xinggang Wang
, Xiang Bai, Wenyu Liu
:
Multiple Instance Detection Network with Online Instance Classifier Refinement. CVPR 2017: 3059-3067 - [c29]Peng Tang, Weidong Jin:
Railway running smoothness monitoring based on visual motion parallax. ROBIO 2017: 2407-2412 - [i4]Peng Tang, Xinggang Wang, Xiang Bai, Wenyu Liu:
Multiple Instance Detection Network with Online Instance Classifier Refinement. CoRR abs/1704.00138 (2017) - [i3]Peng Tang, Xinggang Wang, Zilong Huang, Xiang Bai, Wenyu Liu:
Deep Patch Learning for Weakly Supervised Object Classification and Discovery. CoRR abs/1705.02429 (2017) - 2016
- [j14]Peng Tang, Ming-Bo Zhao, Tommy W. S. Chow:
Locality Alignment Discriminant Analysis for Visualizing Regional English. Neural Process. Lett. 43(1): 295-307 (2016) - [j13]Peng Tang, Tommy W. S. Chow:
Wireless Sensor-Networks Conditions Monitoring and Fault Diagnosis Using Neighborhood Hidden Conditional Random Field. IEEE Trans. Ind. Informatics 12(3): 933-940 (2016) - [c28]Peng Tang, Weidong Jin:
Automatic Image Semantic Segmentation by MRF with Transformation-Invariant Shape Priors. AsiaSim/SCS AutumnSim (1) 2016: 216-226 - [c27]Peng Tang, Anping Song, Zhixiang Liu, Wu Zhang:
An Implementation and Optimization of Lattice Boltzmann Method Based on the Multi-Node CPU+MIC Heterogeneous Architecture. CyberC 2016: 315-320 - [c26]Sen Su, Peng Tang, Xiang Cheng, Rui Chen, Zequn Wu:
Differentially private multi-party high-dimensional data publishing. ICDE 2016: 205-216 - [c25]Damian M. Lyons, Ronald C. Arkin, Shu Jiang, Matthew Joseph O'Brien, Feng Tang, Peng Tang:
Formal Performance Guarantees for Behavior-Based Localization Missions. ICTAI 2016: 98-105 - [c24]Jia Feng, Peng Tang, Bin Feng, Wenyu Liu
:
Latent information mining for semi-supervised sentiment classification in catering reviews. WCSP 2016: 1-5 - [i2]Peng Tang, Xinggang Wang, Baoguang Shi, Xiang Bai, Wenyu Liu, Zhuowen Tu:
Deep FisherNet for Object Classification. CoRR abs/1608.00182 (2016) - [i1]Xinggang Wang, Yongluan Yan, Peng Tang, Xiang Bai, Wenyu Liu:
Revisiting Multiple Instance Neural Networks. CoRR abs/1610.02501 (2016) - 2015
- [j12]Xiang Cheng, Sen Su, Shengzhi Xu, Peng Tang, Zhengyi Li:
Differentially private maximal frequent sequence mining. Comput. Secur. 55: 175-192 (2015) - [j11]Peng Tang, Siu Cheung Hui, Alvis Cheuk M. Fong:
A lattice-based approach for chemical structural retrieval. Eng. Appl. Artif. Intell. 39: 215-222 (2015) - [j10]Zhao Zhang
, Ming-Bo Zhao, Bing Li, Peng Tang, Fanzhang Li:
Simple yet effective color principal and discriminant feature extraction for representing and recognizing color images. Neurocomputing 149: 1058-1073 (2015) - [j9]Ming-Bo Zhao, Choujun Zhan, Zhou Wu
, Peng Tang:
Semi-Supervised Image Classification Based on Local and Global Regression. IEEE Signal Process. Lett. 22(10): 1666-1670 (2015) - [c23]Sen Su, Han Yan, Xiang Cheng, Peng Tang, Peng Xu, Jianliang Xu
:
Authentication of Top-k Spatial Keyword Queries in Outsourced Databases. DASFAA (1) 2015: 567-588 - [c22]Damian M. Lyons, Ronald C. Arkin, Shu Jiang, Dagan Harrington, Feng Tang, Peng Tang:
Probabilistic Verification of Multi-robot Missions in Uncertain Environments. ICTAI 2015: 56-63 - [c21]Peng Tang, Tommy W. S. Chow:
Wireless sensor network faulty scenes diagnosis using high dimensional Neighborhood Hidden Conditional Random Field. INDIN 2015: 1130-1135 - [c20]Peng Tang, Bin Feng, Xinggang Wang
, Bi Li, Sihua Yi, Wenyu Liu
:
Fisher vector with weakly-supervised Gaussian dictionary for scene classification. WCSP 2015: 1-5 - 2014
- [j8]Peng Tang, Tommy W. S. Chow:
Mining language variation using word using and collocation characteristics. Expert Syst. Appl. 41(17): 7805-7819 (2014) - [j7]Bing Li, Tommy W. S. Chow, Peng Tang:
Analyzing rough set based attribute reductions by extension rule. Neurocomputing 123: 185-196 (2014) - [j6]Peng Tang, Ming-Bo Zhao, Tommy W. S. Chow:
Text style analysis using trace ratio criterion patch alignment embedding. Neurocomputing 136: 201-212 (2014) - [j5]Ming-Bo Zhao, Rosa H. M. Chan, Tommy W. S. Chow, Peng Tang:
Compact Graph based Semi-Supervised Learning for Medical Diagnosis in Alzheimer's Disease. IEEE Signal Process. Lett. 21(10): 1192-1196 (2014) - [c19]Peng Tang, Siu Cheung Hui, Chi-Wing Fu
:
Connected Bond Recognition for Handwritten Chemical Skeletal Structural Formulas. ICFHR 2014: 122-127 - [c18]Peng Tang, Weidong Jin, Liang Chen:
Visual abnormality detection framework for train-mounted pantograph headline surveillance. ITSC 2014: 847-852 - [c17]Peng Tang, Siu Cheung Hui, Chi-Wing Fu
:
Chemical Symbol Feature Set for Handwritten Chemical Symbol Recognition. S+SSPR 2014: 312-322 - 2013
- [j4]Peng Tang, Tommy W. S. Chow:
Recognition of word collocation habits using frequency rank ratio and inter-term intimacy. Expert Syst. Appl. 40(11): 4301-4314 (2013) - [j3]Ming-Bo Zhao, Rosa H. M. Chan, Peng Tang, Tommy W. S. Chow, Savio W. H. Wong
:
Trace Ratio Linear Discriminant Analysis for Medical Diagnosis: A Case Study of Dementia. IEEE Signal Process. Lett. 20(5): 431-434 (2013) - [c16]Peng Tang, Siu Cheung Hui, Chi-Wing Fu
:
Online chemical symbol recognition for handwritten chemical expression recognition. ICIS 2013: 535-540 - [c15]Peng Tang, Siu Cheung Hui, Chi-Wing Fu
:
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition. ICDAR 2013: 359-363 - [c14]Zhao Zhang
, Ming-Bo Zhao, Bing Li, Peng Tang:
ColorPCA: Color principal feature extraction technique for color image reconstruction and recognition. IJCNN 2013: 1-7 - [c13]Christos Alexopoulos, David Goldsman, Peng Tang, James R. Wilson:
A sequential procedure for estimating the steady-state mean using standardized time series. Winter Simulation Conference 2013: 613-622 - 2012
- [c12]Wenwei Wang, Cheng Lin, Peng Tang, Chengjun Zhou:
Thermal Characteristic Analysis of Power Lithium-ion Battery System for Electric Vehicle. ICDMA 2012: 967-971 - [c11]Peng Tang, Siu Cheung Hui, Gao Cong
:
Functional Feature Extraction and Chemical Retrieval. SSDBM 2012: 507-525 - 2011
- [c10]Peng Tang, Siu Cheung Hui, Chi-Wing Fu
:
Online structural analysis for handwritten chemical expression recognition. ICICS 2011: 1-5 - [c9]Qingyi Gao, Peng Tang, Ting Deng, Tianyu Wo:
VirtualRank: A Prediction Based Load Balancing Technique in Virtual Computing Environment. SERVICES 2011: 247-256 - 2010
- [c8]Chee Kheong Siew, Shuai Peng, Wuqiong Luo, Peng Tang, Yanting Mo:
Scalable Distributed-FDPS Algorithm for QoS Provisioning. INC 2010: 31-40
2000 – 2009
- 2008
- [j2]Peng Tang, Jing Xiao:
Automatic Generation of High-level Contact State Space between 3D Curved Objects. Int. J. Robotics Res. 27(7): 832-854 (2008) - [c7]Peng Tang, Lin Gao, Peng Sheng:
A Stochastic Approach Based Bayesian Salient Motion Segmentation Method. CSSE (1) 2008: 997-1000 - [c6]Lin Gao, Zhifang Liu, Peng Tang:
Probabilistic Visual Tracking using Global and Local Object's Information. CSSE (1) 2008: 1005-1008 - [c5]Peng Tang, Lin Gao:
Video object segmentation based on graph cut with dynamic shape prior constraint. ICPR 2008: 1-4 - 2007
- [c4]Peng Tang, Jing Xiao:
Automatic generation of contact state graphs between a polygon and a planar kinematic chain. IROS 2007: 1564-1569 - 2006
- [c3]Peng Tang, Jing Xiao:
Automatic Generation of Contact State Graphs based on Curvature Monotonic Segmentation. ICRA 2006: 2633-2640 - [c2]Peng Tang, Jing Xiao:
Generation of Point-contact State Space between Strictly Curved Objects. Robotics: Science and Systems 2006 - 2005
- [c1]Peng Tang, Jing Xiao:
Automatic Generation of High-level Contact State Space between Planar Curved Objects. ICRA 2005: 3601-3606 - 2004
- [j1]Cheng-de Lin, Peng Tang:
Kekulé Count in Capped Zigzag Boron-Nitride Nanotubes. J. Chem. Inf. Model. 44(1): 13-20 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-31 01:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint