default search action
Keke Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Peican Zhu, Zepeng Fan, Sensen Guo, Keke Tang, Xingyu Li:
Improving adversarial transferability through hybrid augmentation. Comput. Secur. 139: 103674 (2024) - [j16]Peican Zhu, Botao Wang, Keke Tang, Haifeng Zhang, Xiaodong Cui, Zhen Wang:
A knowledge-guided graph attention network for emotion-cause pair extraction. Knowl. Based Syst. 286: 111342 (2024) - [j15]Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan:
Node Injection Attack Based on Label Propagation Against Graph Neural Network. IEEE Trans. Comput. Soc. Syst. 11(5): 5858-5870 (2024) - [j14]Keke Tang, Tianrui Lou, Weilong Peng, Nenglun Chen, Yawen Shi, Wenping Wang:
Effective Single-Step Adversarial Training With Energy-Based Models. IEEE Trans. Emerg. Top. Comput. Intell. 8(5): 3396-3407 (2024) - [j13]Lianbo Ma, Nan Li, Peican Zhu, Keke Tang, Asad Khan, Feng Wang, Guo Yu:
A Novel Fuzzy Neural Network Architecture Search Framework for Defect Recognition With Uncertainties. IEEE Trans. Fuzzy Syst. 32(5): 3274-3285 (2024) - [j12]Zhize Wu, Pengpeng Sun, Xin Chen, Keke Tang, Tong Xu, Le Zou, Xiaofeng Wang, Ming Tan, Fan Cheng, Thomas Weise:
SelfGCN: Graph Convolution Network With Self-Attention for Skeleton-Based Action Recognition. IEEE Trans. Image Process. 33: 4391-4403 (2024) - [j11]Denghui Zhang, Muhammad Shafiq, Keke Tang, Usman Naseem:
Multi-Resolution Wavelet Fractal Analysis and Subtask Training for Enhancing Few-Shot Noisy Brainwave Recognition. IEEE J. Biomed. Health Informatics 28(7): 3841-3850 (2024) - [c32]Le Cheng, Peican Zhu, Keke Tang, Chao Gao, Zhen Wang:
GIN-SD: Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion. AAAI 2024: 55-63 - [c31]Keke Tang, Xu He, Weilong Peng, Jianpeng Wu, Yawen Shi, Daizong Liu, Pan Zhou, Wenping Wang, Zhihong Tian:
Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds. AAAI 2024: 5127-5135 - [c30]Daizong Liu, Xiaoye Qu, Xiang Fang, Jianfeng Dong, Pan Zhou, Guoshun Nan, Keke Tang, Wanlong Fang, Yu Cheng:
Towards Robust Temporal Activity Localization Learning with Noisy Labels. LREC/COLING 2024: 16630-16642 - [c29]Keke Tang, Chao Hou, Weilong Peng, Runnan Chen, Peican Zhu, Wenping Wang, Zhihong Tian:
CORES: Convolutional Response-based Score for Out-of-distribution Detection. CVPR 2024: 10916-10925 - [c28]Keke Tang, Lujie Huang, Weilong Peng, Daizong Liu, Xiaofei Wang, Yang Ma, Ligang Liu, Zhihong Tian:
FLAT: Flux-Aware Imperceptible Adversarial Attacks on 3D Point Clouds. ECCV (6) 2024: 198-215 - [c27]Keke Tang, Wenyu Zhao, Weilong Peng, Xiang Fang, Xiaodong Cui, Peican Zhu, Zhihong Tian:
Reparameterization Head for Efficient Multi-Input Networks. ICASSP 2024: 6190-6194 - [c26]Weilong Peng, Yi Luo, Keke Tang, Kongyang Chen, Yangtao Wang, Ping Li, Meie Fang:
IE-aware Consistency Losses for Detailed 3D Face Reconstruction from Multiple Images in the Wild. ICME 2024: 1-6 - [c25]Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, Zhen Wang:
A General Black-box Adversarial Attack on Graph-based Fake News Detectors. IJCAI 2024: 568-576 - [c24]Keke Tang, Zhensu Wang, Weilong Peng, Lujie Huang, Le Wang, Peican Zhu, Wenping Wang, Zhihong Tian:
SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds. ACM Multimedia 2024: 3131-3140 - [c23]Xiaowen Cai, Yunbo Tao, Daizong Liu, Pan Zhou, Xiaoye Qu, Jianfeng Dong, Keke Tang, Lichao Sun:
Frequency-Aware GAN for Imperceptible Transfer Attack on 3D Point Clouds. ACM Multimedia 2024: 6162-6171 - [i12]Jie Tian, Jixin Hou, Zihao Wu, Peng Shu, Zhengliang Liu, Yujie Xiang, Beikang Gu, Nicholas Filla, Yiwei Li, Ning Liu, Xianyan Chen, Keke Tang, Tianming Liu, Xianqiao Wang:
Assessing Large Language Models in Mechanical Engineering Education: A Study on Mechanics-Focused Conceptual Understanding. CoRR abs/2401.12983 (2024) - [i11]Le Cheng, Peican Zhu, Keke Tang, Chao Gao, Zhen Wang:
GIN-SD: Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion. CoRR abs/2403.00014 (2024) - [i10]Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, Zhen Wang:
A General Black-box Adversarial Attack on Graph-based Fake News Detectors. CoRR abs/2404.15744 (2024) - [i9]Yining Huang, Keke Tang, Meilian Chen:
A Comprehensive Survey on Evaluating Large Language Model Applications in the Medical Industry. CoRR abs/2404.15777 (2024) - [i8]Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan:
Node Injection Attack Based on Label Propagation Against Graph Neural Network. CoRR abs/2405.18824 (2024) - 2023
- [j10]Jiaheng Hua, Xiaodong Cui, Xianghua Li, Keke Tang, Peican Zhu:
Multimodal fake news detection through data augmentation-based contrastive learning. Appl. Soft Comput. 136: 110125 (2023) - [j9]Keke Tang, Yawen Shi, Tianrui Lou, Weilong Peng, Xu He, Peican Zhu, Zhaoquan Gu, Zhihong Tian:
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds. IEEE Internet Things J. 10(6, March 15): 5158-5169 (2023) - [j8]Peican Zhu, Xin Hou, Keke Tang, Yang Liu, Yin-Ping Zhao, Zhen Wang:
Unsupervised feature selection through combining graph learning and ℓ2,0-norm constraint. Inf. Sci. 622: 68-82 (2023) - [j7]Keke Tang, Yuhong Chen, Weilong Peng, Yanling Zhang, Meie Fang, Zheng Wang, Peng Song:
RepPVConv: attentively fusing reparameterized voxel features for efficient 3D point cloud perception. Vis. Comput. 39(11): 5577-5588 (2023) - [c22]Keke Tang, Jianpeng Wu, Weilong Peng, Yawen Shi, Peng Song, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
Deep Manifold Attack on Point Clouds via Parameter Plane Stretching. AAAI 2023: 2420-2428 - [c21]Qi Li, Xingyu Li, Xiaodong Cui, Keke Tang, Peican Zhu:
HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets. CIKM 2023: 4064-4068 - [c20]Xiang Fang, Daizong Liu, Wanlong Fang, Pan Zhou, Yu Cheng, Keke Tang, Kai Zou:
Annotations Are Not All You Need: A Cross-modal Knowledge Transfer Network for Unsupervised Temporal Sentence Grounding. EMNLP (Findings) 2023: 8721-8733 - [c19]Keke Tang, Xujian Cai, Weilong Peng, Daizong Liu, Peican Zhu, Pan Zhou, Zhihong Tian, Wenping Wang:
Matching Words for Out-of-distribution Detection. ICDM 2023: 578-587 - [c18]Keke Tang, Xujian Cai, Weilong Peng, Shudong Li, Wenping Wang:
OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers. ICIP 2023: 1260-1264 - [c17]Zepeng Fan, Peican Zhu, Chao Gao, Jinbang Hong, Keke Tang:
DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion. KSEM (2) 2023: 276-288 - [c16]Keke Tang, Tianrui Lou, Xu He, Yawen Shi, Peican Zhu, Zhaoquan Gu:
Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training. KSEM (1) 2023: 328-342 - [c15]Xu He, Keke Tang, Yawen Shi, Yin Li, Weilong Peng, Peican Zhu:
Are Deep Point Cloud Classifiers Suffer From Out-of-distribution Overconfidence Issue? SMC 2023: 2620-2627 - 2022
- [j6]Nan Lin, Yuxuan Li, Keke Tang, Yujun Zhu, Xiayu Zhang, Ruolin Wang, Jianmin Ji, Xiaoping Chen, Xin-Ming Zhang:
Manipulation Planning From Demonstration Via Goal-Conditioned Prior Action Primitive Decomposition and Alignment. IEEE Robotics Autom. Lett. 7(2): 1387-1394 (2022) - [c14]Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Example Attacks against ASR Systems: An Overview. DSC 2022: 470-477 - [c13]Jinbang Hong, Keke Tang, Chao Gao, Songxin Wang, Sensen Guo, Peican Zhu:
GM-Attack: Improving the Transferability of Adversarial Attacks. KSEM (3) 2022: 489-500 - [i7]Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Attacks on ASR Systems: An Overview. CoRR abs/2208.02250 (2022) - 2021
- [j5]Zhaoquan Gu, Keke Tang, Zhen Wang, Yanhua Li, Wei Shi, Zhihong Tian:
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications. Frontiers Neurorobotics 15 (2021) - [j4]Weilong Peng, Yong Su, Keke Tang, Chao Xu, Zhiyong Feng, Meie Fang:
Geometrical Consistency Modeling on B-Spline Parameter Domain for 3D Face Reconstruction From Limited Number of Wild Images. Frontiers Neurorobotics 15: 652562 (2021) - [c12]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. ICCV 2021: 1133-1142 - [i6]Yining Huang, Meilian Chen, Keke Tang:
Training like Playing: A Reinforcement Learning And Knowledge Graph-based framework for building Automatic Consultation System in Medical Field. CoRR abs/2106.07502 (2021) - [i5]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. CoRR abs/2108.06024 (2021) - [i4]Yining Huang, Shaoze Lin, Yijun Wei, Keke Tang:
Sinoledge: A Knowledge Engine based on Logical Reasoning and Distributed Micro Services. CoRR abs/2109.08307 (2021) - 2020
- [j3]Hua Zhong, Zhong Shen, Yafei Zhao, Keke Tang, Wenping Wang, Zheng Wang:
A Hybrid Underwater Manipulator System With Intuitive Muscle-Level sEMG Mapping Control. IEEE Robotics Autom. Lett. 5(2): 3198-3205 (2020) - [c11]Weiguo Wang, Zhaoquan Gu, Keke Tang:
An Improved Algorithm for Bert. CIAT 2020: 116-120 - [c10]Yinyu Lyu, Chenwei Liu, Hao Tan, Rui Xie, Keke Tang, Zhaoquan Gu:
Convolutional Neural Network based Timbre Classification. CIAT 2020: 186-191 - [c9]Keke Tang, Jiaqi Li:
The Business Cycle, Market Power, and Corporate Investment. ICEME 2020: 184-195 - [i3]Nan Lin, Yuxuan Li, Yujun Zhu, Ruolin Wang, Xiayu Zhang, Jianmin Ji, Keke Tang, Xiaoping Chen, Xinming Zhang:
NEARL: Non-Explicit Action Reinforcement Learning for Robotic Control. CoRR abs/2011.01046 (2020)
2010 – 2019
- 2019
- [j2]Keke Tang, Peng Song, Xiaofei Wang, Bailin Deng, Chi-Wing Fu, Ligang Liu:
Computational Design of Steady 3D Dissection Puzzles. Comput. Graph. Forum 38(2): 291-303 (2019) - [c8]Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang:
Chinese Text Classification Based on Neural Networks and Word2vec. DSC 2019: 284-291 - [c7]Zhaoquan Gu, Yuexuan Wang, Keke Tang, Chao Li, Mohan Li, Lihua Yin:
A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 129-134 - [i2]Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang:
Decision Propagation Networks for Image Classification. CoRR abs/1911.12101 (2019) - 2017
- [j1]Keke Tang, Peng Song, Xiaoping Chen:
3D Object Recognition in Cluttered Scenes With Robust Shape Description and Correspondence Selection. IEEE Access 5: 1833-1845 (2017) - 2016
- [c6]Keke Tang, Peng Song, Xiaoping Chen:
Signature of Geometric Centroids for 3D Local Shape Description and Partial Shape Matching. ACCV (5) 2016: 311-326 - [i1]Keke Tang, Peng Song, Xiaoping Chen:
Signature of Geometric Centroids for 3D Local Shape Description and Partial Shape Matching. CoRR abs/1612.08408 (2016) - 2015
- [c5]Keke Tang, Zhe Zhao, Xiaoping Chen:
Label Propagation for Large Scale 3D Indoor Scenes. ISVC (1) 2015: 253-264 - [c4]Keke Tang, Zhe Zhao, Xiaoping Chen:
Joint Visual Phrase Detection to Boost Scene Parsing. ISVC (2) 2015: 389-399 - [c3]Yingfeng Chen, Feng Wu, Ningyang Wang, Keke Tang, Min Cheng, Xiaoping Chen:
KeJia-LC: A Low-Cost Mobile Robot Platform - Champion of Demo Challenge on Benchmarking Service Robots at RoboCup 2015. RoboCup 2015: 60-71 - [c2]Min Cheng, Xiaoping Chen, Keke Tang, Feng Wu, Andras Gabor Kupcsik, Luca Iocchi, Yingfeng Chen, David Hsu:
Synthetical Benchmarking of Service Robots: A First Effort on Domestic Mobile Platforms. RoboCup 2015: 377-388 - 2014
- [c1]Kai Chen, Dongcai Lu, Yingfeng Chen, Keke Tang, Ningyang Wang, Xiaoping Chen:
The Intelligent Techniques in Robot KeJia - The Champion of RoboCup@Home 2014. RoboCup 2014: 130-141
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint