default search action
Guangming Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c5]Zeshi Liu, Shuo Chen, Peiyao Qu, Huanli Liu, Minghui Niu, Liliang Ying, Jie Ren, Guangming Tang, Haihang You:
SUSHI: Ultra-High-Speed and Ultra-Low-Power Neuromorphic Chip Using Superconducting Single-Flux-Quantum Circuits. MICRO 2023: 614-627 - 2022
- [j18]Jie Ren, Guangming Tang, Feng Wang, Siqi Li, Peiyao Qu, Xiaoping Gao, Liliang Ying, Shucheng Yang, Binhan Liu, Xue Zhang, Xi Gao, Wei Peng, Zhen Wang:
Superconducting single flux quantum (SFQ) technology for power-efficiency computing. CCF Trans. High Perform. Comput. 4(2): 182-210 (2022) - 2020
- [j17]Shuo Wang, Qingqi Pei, Jianhua Wang, Guangming Tang, Yuchen Zhang, Xiaohu Liu:
An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning. IEEE Access 8: 35792-35804 (2020) - [j16]Haitao Song, Guangming Tang, Yifeng Sun, Shunxiang Yang:
Anisotropic distortion cost update strategy in spatial image steganography. Multim. Tools Appl. 79(17-18): 11973-11992 (2020) - [j15]Shuo Wang, Qingqi Pei, Yuchen Zhang, Xiaohu Liu, Guangming Tang:
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack. Secur. Commun. Networks 2020: 8882200:1-8882200:15 (2020)
2010 – 2019
- 2019
- [j14]Yang Wang, Tao Hu, Guangming Tang, Jichao Xie, Jie Lu:
SGS: Safe-Guard Scheme for Protecting Control Plane Against DDoS Attacks in Software-Defined Networking. IEEE Access 7: 34699-34710 (2019) - [j13]Hai-Tao Song, Guangming Tang, Guang Kou, Yifeng Sun, Mingming Jiang:
Digital steganography model and embedding optimization strategy. Multim. Tools Appl. 78(7): 8271-8288 (2019) - [j12]Haitao Song, Guangming Tang, Yifeng Sun, Zhanzhan Gao:
Security Measure for Image Steganography Based on High Dimensional KL Divergence. Secur. Commun. Networks 2019: 3546367:1-3546367:13 (2019) - 2018
- [j11]Yi Sun, Guangming Tang, Xiaoyu Xu, Mingming Jiang:
Steganography using Gabor filter and anisotropic diffusion. Multim. Tools Appl. 77(15): 20247-20265 (2018) - [c4]Yifeng Sun, Xiaoyu Xu, Haitao Song, Guangming Tang, Shunxiang Yang:
Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages. ICCCS (4) 2018: 313-323 - 2017
- [j10]Yi Sun, Guangming Tang, Yuan Bian, Xiaoyu Xu:
An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs. KSII Trans. Internet Inf. Syst. 11(5): 2723-2740 (2017) - [j9]Yuan Bian, Guangming Tang, Zhanzhan Gao, Shuo Wang:
A distortion cost modification strategy for adaptive pentary steganography. Multim. Tools Appl. 76(20): 20643-20662 (2017) - 2016
- [j8]Shufan Yan, Guangming Tang, Yanling Chen:
Incorporating data hiding into G.729 speech codec. Multim. Tools Appl. 75(18): 11493-11512 (2016) - [c3]Yuan Bian, Guangming Tang, Shuo Wang, Zhanzhan Gao, Shiyuan Chen:
Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers. IWDW 2016: 506-517 - [c2]Xiaoyu Xu, Yifeng Sun, Guangming Tang, Shiyuan Chen, Jian Zhao:
Deep Learning on Spatial Rich Model for Steganalysis. IWDW 2016: 564-577 - 2015
- [j7]Yanling Chen, Guangming Tang, Yifeng Sun:
基于免疫危险理论的网络安全态势评估 (Assessment of Network Security Situation Based on Immune Danger Theory). 计算机科学 42(6): 167-170 (2015) - [j6]Guang Kou, Guangming Tang, Ziliang Xu:
网络安全态势感知中D-S证据理论冲突证据的修正研究 (Research on Revising Conflict Evidence of D-S Evidence Theory in Network Security Situation Awareness). 计算机科学 42(7): 200-203 (2015) - [j5]Shufan Yan, Guangming Tang, Yifeng Sun, Zhanzhan Gao, Liuqing Shen:
A triple-layer steganography scheme for low bit-rate speech streams. Multim. Tools Appl. 74(24): 11763-11782 (2015) - 2013
- [j4]Jing Liu, Guangming Tang, Yifeng Sun:
A secure steganography for privacy protection in healthcare system. J. Medical Syst. 37(2): 9918 (2013) - 2012
- [j3]Yifeng Sun, Danmei Niu, Guangming Tang, Zhanzhan Gao:
Optimized LSB Matching Steganography Based on Fisher Information. J. Multim. 7(4): 295-302 (2012) - [j2]Jing Liu, Guangming Tang:
Stego Key Estimation in LSB Steganography. J. Multim. 7(4): 309-313 (2012) - 2010
- [j1]Guangming Tang, Jing Liu:
A Secure Steganography Preserving High Order Statistics. J. Multim. 5(2): 189-196 (2010)
2000 – 2009
- 2009
- [c1]Jing Liu, Guangming Tang:
A New Method for Data Hiding Domain Classification. IFITA (3) 2009: 260-263
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint