Siyuan Tang

Orcid: 0000-0002-2684-7598

According to our database1, Siyuan Tang authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Application of deep learning and XGBoost in predicting pathological staging of breast cancer MR images.
J. Supercomput., May, 2024

SSANet - Novel Residual Network for Computer-Aided Diagnosis of Pulmonary Nodules in Chest Computed Tomography.
Int. J. Imaging Syst. Technol., 2024

Cover Image.
Int. J. Imaging Syst. Technol., 2024

Breast tumor classification based on self-supervised contrastive learning from ultrasound videos.
CoRR, 2024

Learn and Don't Forget: Adding a New Language to ASR Foundation Models.
CoRR, 2024

Cross-Lingual Transfer Learning for Speech Translation.
CoRR, 2024

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Combining reinforcement learning method to enhance LEDBAT++ over diversified network environments.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Input Factor Selection Based on Interpretable Neural Network for Industrial Virtual Sensing Application.
IEEE Trans. Instrum. Meas., 2023

The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
CoRR, 2023

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
CoRR, 2023

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming.
CoRR, 2022

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Construction and verification of retinal vessel segmentation algorithm for color fundus image under BP neural network model.
J. Supercomput., 2021

Classification of Benign and Malignant Pulmonary Nodules Based on the Multiresolution 3D DPSECN Model and Semisupervised Clustering.
IEEE Access, 2021

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Increasing multicast transmission rate with localized multipath in software-defined networks.
Frontiers Comput. Sci., 2019

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2017
基于BP神经网络的医学图像分割新方法 (New Method for Medical Image Segmentation Based on BP Neural Network).
计算机科学, 2017

3DBody Software Experimental Platform for Course of Sports Anatomy.
Int. J. Emerg. Technol. Learn., 2017

Occupation exposure declaration and monitoring information system design and application for medical staff.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Design of hospital beds center management information system based on HIS.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees.
IEEE Trans. Inf. Forensics Secur., 2016

Demo: Data Analysis and Visualization in Bike-Sharing Systems.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Design and development of ICU intelligent medicine management system based on MVC.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
A Heuristic Algorithm for Optimal Discrete Bandwidth Allocation in SDN Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Realizing video streaming multicast over SDN networks.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2011
Chain-Based DFA Deflation for Fast and Scalable Regular Expression Matching Using TCAM.
Proceedings of the 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011


  Loading...