Bowen Tang
Orcid: 0009-0000-7908-5868
According to our database1,
Bowen Tang
authored at least 26 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Cheminformatics, December, 2024
Multicomponent WVD Spectrogram Enhancement Algorithm for Indoor Through-Wall Radar Target Tracking.
IEEE Internet Things J., November, 2024
Improved Linear Chirplet Transform and Singular Value Decomposition Joint Algorithm for Motion Target Tracking.
IEEE Internet Things J., April, 2024
J. Vis. Commun. Image Represent., 2024
Digit. Signal Process., 2024
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models.
CoRR, 2024
Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Enhancing Learning-Based Binary Code Similarity Detection Model through Adversarial Training with Multiple Function Variants.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Sequential Enhancement for Compressed Video Using Deep Convolutional Generative Adversarial Network.
Neural Process. Lett., 2022
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods.
CoRR, 2022
LighTN: Light-weight Transformer Network for Performance-overhead Tradeoff in Point Cloud Downsampling.
CoRR, 2022
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2020
A self-attention based message passing neural network for predicting molecular lipophilicity and aqueous solubility.
J. Cheminformatics, 2020
2019
Comprehensive Evaluation and Application of GIS Insulation Condition Part 1: Selection and Optimization of Insulation Condition Comprehensive Evaluation Index Based on Multi-Source Information Fusion.
IEEE Access, 2019
Comprehensive Evaluation and Application of GIS Insulation Condition Part 2: Construction and Application of Comprehensive Evaluation Model Considering Universality and Economic Value.
IEEE Access, 2019
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019
2017
Analysis of Influencing Factors of Shooting Rate Based on Trajectory Prediction of the Basketball.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017