default search action
Zhe Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Zhe Tang, Jing Tang, Dengpeng Zou, Junyi Rao, Fang Qi:
Two guidance joint network based on coarse map and edge map for camouflaged object detection. Appl. Intell. 54(15-16): 7531-7544 (2024) - [j25]Zhe Tang, Sihao Li, Kyeong Soo Kim, Jeremy S. Smith:
Multi-Dimensional Wi-Fi Received Signal Strength Indicator Data Augmentation Based on Multi-Output Gaussian Process for Large-Scale Indoor Localization. Sensors 24(3): 1026 (2024) - [j24]Sihao Li, Zhe Tang, Kyeong Soo Kim, Jeremy S. Smith:
On the Use and Construction of Wi-Fi Fingerprint Databases for Large-Scale Multi-Building and Multi-Floor Indoor Localization: A Case Study of the UJIIndoorLoc Database. Sensors 24(12): 3827 (2024) - [c28]Zhe Tang, Ruocheng Gu, Sihao Li, Kyeong Soo Kim, Jeremy S. Smith:
Static vs. Dynamic Databases for Indoor Localization Based on Wi-Fi Fingerprinting: A Discussion from a Data Perspective. ICAIIC 2024: 760-765 - [c27]Zhe Tang, Ping Li, Jinying Xiao, Jie Nie:
Pruning neural networks by synchronously changing weight information. IJCNN 2024: 1-7 - [c26]Jinying Xiao, Ping Li, Jie Nie, Zhe Tang:
SEVEN: Pruning Transformer Model by Reserving Sentinels. IJCNN 2024: 1-8 - [c25]Jinying Xiao, Ping Li, Zhe Tang, Jie Nie:
LNPT: Label-free Network Pruning and Training. IJCNN 2024: 1-8 - [i10]Zhe Tang, Ruocheng Gu, Sihao Li, Kyeong Soo Kim, Jeremy S. Smith:
Static vs. Dynamic Databases for Indoor Localization based on Wi-Fi Fingerprinting: A Discussion from a Data Perspective. CoRR abs/2402.12756 (2024) - [i9]Jinying Xiao, Ping Li, Jie Nie, Zhe Tang:
SEVEN: Pruning Transformer Model by Reserving Sentinels. CoRR abs/2403.12688 (2024) - [i8]Jinying Xiao, Ping Li, Zhe Tang, Jie Nie:
LNPT: Label-free Network Pruning and Training. CoRR abs/2403.12690 (2024) - [i7]Sihao Li, Kyeong Soo Kim, Zhe Tang, Graduate, Jeremy S. Smith:
Hierarchical Stage-Wise Training of Linked Deep Neural Networks for Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi RSSI Fingerprinting. CoRR abs/2407.13288 (2024) - [i6]Sihao Li, Zhe Tang, Kyeong Soo Kim, Jeremy S. Smith:
Mean Teacher based SSL Framework for Indoor Localization Using Wi-Fi RSSI Fingerprinting. CoRR abs/2407.13303 (2024) - [i5]Jinying Xiao, Ping Li, Jie Nie, Zhe Tang:
EMP: Enhance Memory in Data Pruning. CoRR abs/2408.16031 (2024) - [i4]Zhe Tang, Sihao Li, Zichen Huang, Guandong Yang, Kyeong Soo Kim, Jeremy S. Smith:
SGP-RI: A Real-Time-Trainable and Decentralized IoT Indoor Localization Model Based on Sparse Gaussian Process with Reduced-Dimensional Inputs. CoRR abs/2409.00078 (2024) - 2023
- [j23]Fang Qi, Yingkai Zhao, Md. Zakirul Alam Bhuiyan, Tao Hai, Md. Monirul Islam, Shaobo Zhang, Zhe Tang:
Unauthorized and privacy-intrusive human activity watching through Wi-Fi signals: An emerging cybersecurity threat. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j22]Zhe Tang, Jiajia Lu, Zhengyun Chen, Fang Qi, Lingyan Zhang:
Improved Pest-YOLO: Real-time pest detection based on efficient channel attention mechanism and transformer encoder. Ecol. Informatics 78: 102340 (2023) - [j21]Liangtao Nie, Ruilin Zhang, Ting Hu, Zhe Tang, Mingjing Fang, Xikui Lv, Ruitao Zhang:
A fitting algorithm based on multi-touch gesture for rapid generation of railway line. Integr. Comput. Aided Eng. 30(2): 135-150 (2023) - [j20]Zhe Tang, Lin Zhou, Fang Qi, Huarong Chen:
An improved lightweight and real-time YOLOv5 network for detection of surface defects on indocalamus leaves. J. Real Time Image Process. 20(1): 14 (2023) - [j19]Fang Qi, Yuxiang Wang, Zhe Tang, Shuhong Chen:
Real-time and effective detection of agricultural pest using an improved YOLOv5 network. J. Real Time Image Process. 20(2): 33 (2023) - [j18]Yuguang Lu, Yuling Wu, Zhe Tang, Yike Hou, Mingyue Cui, Shuqi Huang, Binghua Long, Zhangsen Yu, Muhammad Zubair Iqbal, Xiangdong Kong:
Synthesis of Multifunctional Mn3O4-Ag2S Janus Nanoparticles for Enhanced T1-Magnetic Resonance Imaging and Photo-Induced Tumor Therapy. Sensors 23(21): 8930 (2023) - [j17]Lei Peng, Zhuoming Yuan, Guangming Dai, Maocai Wang, Zhe Tang:
Reinforcement learning-based hybrid differential evolution for global optimization of interplanetary trajectory design. Swarm Evol. Comput. 81: 101351 (2023) - [j16]Zhe Tang, Yi Yang, Wen Li, Defu Lian, Lixin Duan:
Deep Cross-Attention Network for Crowdfunding Success Prediction. IEEE Trans. Multim. 25: 1306-1319 (2023) - [c24]Sihao Li, Kyeong Soo Kim, Zhe Tang, Jeremy S. Smith:
Stage-Wise and Hierarchical Training of Linked Deep Neural Networks for Large-Scale Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi Fingerprinting. CANDARW 2023: 63-68 - [c23]Sihao Li, Zhe Tang, Kyeong Soo Kim, Jeremy S. Smith:
Exploiting Unlabeled RSSI Fingerprints in Multi-Building and Multi-Floor Indoor Localization through Deep Semi-Supervised Learning Based on Mean Teacher. candar 2023: 155-160 - 2022
- [j15]Mingcheng Zuo, Guangming Dai, Lei Peng, Zhe Tang, Dunwei Gong, Qinxia Wang:
A differential evolution algorithm with the guided movement for population and its application to interplanetary transfer trajectory design. Eng. Appl. Artif. Intell. 110: 104727 (2022) - [j14]Fang Qi, Gangming Chen, Jieyuan Liu, Zhe Tang:
End-to-end pest detection on an improved deformable DETR with multihead criss cross attention. Ecol. Informatics 72: 101902 (2022) - [j13]Zhe Tang, Zhe Li, Jialing Yang, Fang Qi:
P &GGD: A Joint-Way Model Optimization Strategy Based on Filter Pruning and Filter Grafting For Tea Leaves Classification. Neural Process. Lett. 54(5): 4391-4407 (2022) - [j12]Fang Qi, Yongle Wang, Zhe Tang:
Lightweight Plant Disease Classification Combining GrabCut Algorithm, New Coordinate Attention, and Channel Pruning. Neural Process. Lett. 54(6): 5317-5331 (2022) - [c22]Zhe Tang, Sihao Li, Kyeong Soo Kim, Jeremy S. Smith:
Multi-Output Gaussian Process-Based Data Augmentation for Multi-Building and Multi-Floor Indoor Localization. ICC Workshops 2022: 361-366 - [i3]Zhe Tang, Sihao Li, Kyeong Soo Kim, Jeremy S. Smith:
Multi-Output Gaussian Process-Based Data Augmentation for Multi-Building and Multi-Floor Indoor Localization. CoRR abs/2202.01980 (2022) - [i2]Zhe Tang, Sihao Li, Kyeong Soo Kim, Jeremy S. Smith:
On the Multidimensional Augmentation of Fingerprint Data for Indoor Localization in A Large-Scale Building Complex Based on Multi-Output Gaussian Process. CoRR abs/2211.10642 (2022) - 2021
- [j11]Fang Qi, Zuoqi Xie, Zhe Tang, Huarong Chen:
Related Study Based on Otsu Watershed Algorithm and New Squeeze-and-Excitation Networks for Segmentation and Level Classification of Tea Buds. Neural Process. Lett. 53(3): 2261-2275 (2021) - [c21]Zhe Tang, Zhengyun Chen, Fang Qi, Lingyan Zhang, Shuhong Chen:
Pest-YOLO: Deep Image Mining and Multi-Feature Fusion for Real-Time Agriculture Pest Detection. ICDM 2021: 1348-1353 - 2020
- [j10]Zhe Tang, Jialing Yang, Zhe Li, Fang Qi:
Grape disease image classification based on lightweight convolution neural networks and channelwise attention. Comput. Electron. Agric. 178: 105735 (2020) - [c20]Wenke Li, Zhe Tang, Fang Qi:
A Hybrid Task Scheduling Algorithm Combining Symbiotic Organisms Search with Fuzzy Logic in Cloud Computing. CSE 2020: 16-23 - [c19]Zhe Tang, Jianqiang Ma:
Coarse to Fine Ensemble Network for Thyroid Nodule Segmentation. MICCAI (Challenges) 2020: 122-128
2010 – 2019
- 2019
- [c18]Fang Qi, Xing Chang, Zhe Tang, Wenbo Wang:
Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud. DependSys 2019: 80-92 - [c17]Qifan Wang, Lei Zhou, Zhe Tang, Guojun Wang:
A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles. iSCI 2019: 253-267 - 2018
- [j9]Quanyun Wei, Fang Qi, Zhe Tang:
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation. Telecommun. Syst. 69(2): 253-262 (2018) - [c16]Zhenghang Zhong, Zhe Tang, Xiangxing Li, Tiancheng Yuan, Yang Yang, Meng Wei, Yuanyuan Zhang, Renzhi Sheng, Naomi Grant, Chongfeng Ling, Xintao Huan, Kyeong Soo Kim, Sanghyuk Lee:
XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field. CANDAR Workshops 2018: 228-234 - [i1]Zhenghang Zhong, Zhe Tang, Xiangxing Li, Tiancheng Yuan, Yang Yang, Meng Wei, Yuanyuan Zhang, Renzhi Sheng, Naomi Grant, Chongfeng Ling, Xintao Huan, Kyeong Soo Kim, Sanghyuk Lee:
XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field. CoRR abs/1810.07377 (2018) - 2017
- [j8]Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng:
Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE Trans. Intell. Transp. Syst. 18(4): 814-823 (2017) - [j7]Zhe Tang, Ying-Ke Lei:
Radio Transmitter Identification Based on Collaborative Representation. Wirel. Pers. Commun. 96(1): 1377-1391 (2017) - [c15]Fang Qi, Ke Li, Zhe Tang:
A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy. ISPA/IUCC 2017: 607-613 - [c14]Yanmei Li, Fang Qi, Zhe Tang:
Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network. SpaCCS 2017: 87-92 - [c13]Yuanlong Li, Fang Qi, Zhe Tang:
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow. SpaCCS 2017: 108-120 - [c12]Lian Duan, Fang Qi, Guojun Wang, Zhe Tang:
Module-Level Software Streaming Loading Model Based on Hypervisor. SpaCCS Workshops 2017: 627-636 - 2016
- [j6]Zhe Tang, Qiang Zhou, Fang Qi, Jianxin Wang:
Optimal transitional trajectory generation for automatic machines. Int. J. Comput. Sci. Eng. 12(2/3): 104-112 (2016) - [c11]Wenbo Wang, Fang Qi, Xiaoqiang Wu, Zhe Tang:
Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks. ICCS 2016: 617-626 - [c10]Fang Qi, Wenbo Wang, Zhe Tang:
Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks. SpaCCS 2016: 374-382 - 2015
- [j5]Fang Qi, Shaowei Wu, Zhe Tang, Guojun Wang:
Selective partial recovery optimisation strategy for SSL connection migration. Int. J. Auton. Adapt. Commun. Syst. 8(2/3): 213-227 (2015) - [j4]Zhe Tang, Yuancheng Su, Meng Joo Er, Fang Qi, Li Zhang, Jianyong Zhou:
A local binary pattern based texture descriptors for classification of tea leaves. Neurocomputing 168: 1011-1023 (2015) - 2014
- [c9]Yu Lan, Jiang Wu, Zhe Tang:
Generation of domestic load profiles using appliances' activating moments. ISGT 2014: 1-5 - 2013
- [j3]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
User requirements-aware security ranking in SSL protocol. J. Supercomput. 64(3): 762-776 (2013) - 2011
- [j2]Zhe Tang, Meng Joo Er, Fang Qi:
Dynamic fuzzy neural network for the intelligent control of a humanoid robot. Comput. Syst. Sci. Eng. 26(3) (2011) - [j1]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. Secur. Commun. Networks 4(4): 372-383 (2011)
2000 – 2009
- 2009
- [c8]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. MASS 2009: 842-847 - 2008
- [c7]Zhe Tang, Meng Joo Er, Chiang-Ju Chien:
Analysis of human gait using an Inverted Pendulum Model. FUZZ-IEEE 2008: 1174-1178 - [c6]Fang Qi, Zhe Tang, Guojun Wang:
Attacks vs. Countermeasures of SSL Protected Trust Model. ICYCS 2008: 1986-1991 - 2007
- [c5]Zhe Tang, Meng Joo Er:
Humanoid 3D Gait Generation Based on Inverted Pendulum Model. ISIC 2007: 339-344 - [c4]Zhe Tang, Meng Joo Er, Geok See Ng:
Humanoid Robotics Modeling by Dynamic Fuzzy Neural Network. IJCNN 2007: 2653-2657 - 2005
- [c3]Zhe Tang, Changjiu Zhou, Zengqi Sun:
Humanoid Walking Gait Optimization Using GA-Based Neural Network. ICNC (2) 2005: 252-261 - 2004
- [c2]Zhe Tang, Changjiu Zhou, Zengqi Sun:
Balance of penalty kicking for a biped robot. RAM 2004: 336-340 - 2003
- [c1]Zhe Tang, Changjiu Zhou, Zengqi Sun:
Trajectory planning for smooth transition of a biped robot. ICRA 2003: 2455-2460
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint