default search action
Gang Liang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Chenghao Li, Xinyan Yang, Gang Liang:
Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection. Comput. J. 67(5): 1826-1837 (2024) - [j26]Chuancheng Wei, Gang Liang, Kexiang Yan:
BotGSL: Twitter Bot Detection with Graph Structure Learning. Comput. J. 67(7): 2486-2497 (2024) - [j25]Junhao Zeng, Gang Liang, Yixin Ma, Xinyan Yang, Cheng Chen:
Pornographic video detection based on semantic and image enhancement. Comput. J. 67(10): 3009-3019 (2024) - [j24]Zhiwei Liang, Kui Zhao, Gang Liang, Yifei Wu, Jinxi Guo:
ACFL: Communication-Efficient adversarial contrastive federated learning for medical image segmentation. Knowl. Based Syst. 304: 112516 (2024) - [j23]Jiaping Lin, Gang Liang, Rongchuan Zhang:
LTTrack: Rethinking the Tracking Framework for Long-Term Multi-Object Tracking. IEEE Trans. Circuits Syst. Video Technol. 34(10): 9866-9881 (2024) - [c20]Guoqing Zhou, Gang Liang, Yuhang Bai, Ertao Gao:
Improving Accuracy of Ocean-Land Classification by using Laser Pulse Continuity of Airborne Lidar Bathymetry. IGARSS 2024: 2275-2278 - [c19]Gang Liang, Guoqing Zhou, Ertao Gao, Yuhang Bai:
A Novel Water-Land Discriminator Based on Near Water Surface Penetration of Green Laser. IGARSS 2024: 2438-2441 - 2023
- [j22]Bo Pang, Gang Liang, Jin Yang, Yijing Chen, Xinyi Wang, Wenbo He:
CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network. Comput. J. 66(5): 1295-1309 (2023) - [j21]Zhiwei Liang, Kui Zhao, Gang Liang, Siyu Li, Yifei Wu, Yiping Zhou:
MAXFormer: Enhanced transformer for medical image segmentation with multi-attention and multi-scale features fusion. Knowl. Based Syst. 280: 110987 (2023) - [j20]Jin Yang, Xinyun Jiang, Gang Liang, Siyu Li, Zicheng Ma:
Malicious Traffic Identification with Self-Supervised Contrastive Learning. Sensors 23(16): 7215 (2023) - [j19]Gang Liang, Xinglei Zhao, Jianhu Zhao, Fengnian Zhou:
MVCNN: A Deep Learning-Based Ocean-Land Waveform Classification Network for Single-Wavelength LiDAR Bathymetry. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 16: 656-674 (2023) - 2022
- [j18]Siyu Li, Jin Yang, Gang Liang, Tianrui Li, Kui Zhao:
SybilFlyover: Heterogeneous graph-based fake account detection model on social networks. Knowl. Based Syst. 258: 110038 (2022) - [c18]Sifeng He, Xudong Yang, Chen Jiang, Gang Liang, Wei Zhang, Tan Pan, Qing Wang, Furong Xu, Chunguang Li, Jingxiong Liu, Hui Xu, Kaiming Huang, Yuan Cheng, Feng Qian, Xiaobo Zhang, Lei Yang:
A Large-scale Comprehensive Dataset and Copy-overlap Aware Evaluation Protocol for Segment-level Video Copy Detection. CVPR 2022: 21054-21063 - [i1]Sifeng He, Xudong Yang, Chen Jiang, Gang Liang, Wei Zhang, Tan Pan, Qing Wang, Furong Xu, Chunguang Li, Jingxiong Liu, Hui Xu, Kaiming Huang, Yuan Cheng, Feng Qian, Xiaobo Zhang, Lei Yang:
A Large-scale Comprehensive Dataset and Copy-overlap Aware Evaluation Protocol for Segment-level Video Copy Detection. CoRR abs/2203.02654 (2022) - 2021
- [j17]Gang Liang:
Image classification of artworks based on multiple naive Bayes algorithm. Int. J. Arts Technol. 13(2): 79-90 (2021) - [j16]Xinhui Cao, Yuting Dong, Zhongzheng Li, Juan Li, Gang Liang, Honglian Zhou:
The Principle of Intelligent Switch Composition and Algorithm of the Built-In Electronic Voltage Transformer. J. Appl. Math. 2021: 8832812:1-8832812:8 (2021) - [j15]Gang Liang, Xinglei Zhao, Jianhu Zhao, Fengnian Zhou:
Feature Selection and Mislabeled Waveform Correction for Water-Land Discrimination Using Airborne Infrared Laser. Remote. Sens. 13(18): 3628 (2021) - [c17]Yuanxing Xiao, Gang Liang:
Low-Power Hardware-Friendly Fatigued Driving Detection Based on Feature Fusion and Time Series Classification. SMC 2021: 1359-1366 - 2020
- [j14]Junren Chen, Gang Liang, Wenbo He, Chun Xu, Jin Yang, Ruihang Liu:
A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism. IEEE Access 8: 122709-122721 (2020) - [j13]Jin Yang, Tao Li, Gang Liang, Yunpeng Wang, Tianyu Gao, Fangdong Zhu:
Spam transaction attack detection model based on GRU and WGAN-div. Comput. Commun. 161: 172-182 (2020)
2010 – 2019
- 2019
- [j12]Jin Yang, Tao Li, Gang Liang, Wenbo He, Yue Zhao:
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN. IEEE Access 7: 83286-83296 (2019) - [j11]Wenshen Jia, Gang Liang, Hui Tian, Jing Sun, Cihui Wan:
Electronic Nose-Based Technique for Rapid Detection and Recognition of Moldy Apples. Sensors 19(7): 1526 (2019) - [c16]Yu Li, Xianshu Luo, Gang Liang, Guo-Qiang Lo:
Demonstration of Ge/Si Avalanche Photodetector Arrays for Lidar Application. OFC 2019: 1-3 - 2016
- [c15]Gang Liang, Jin Yang, Chun Xu:
Automatic rumors identification on Sina Weibo. ICNC-FSKD 2016: 1523-1531 - 2015
- [j10]Gang Liang, Wenbo He, Chun Xu, Liangyin Chen, Jinquan Zeng:
Rumor Identification in Microblogging Systems Based on Users' Behavior. IEEE Trans. Comput. Soc. Syst. 2(3): 99-108 (2015) - 2014
- [j9]Hongtao Shi, Gang Liang, Hai Wang:
A novel traffic identification approach based on multifractal analysis and combined neural network. Ann. des Télécommunications 69(3-4): 155-169 (2014) - 2012
- [j8]Ziqian Wan, Gang Liang, Tao Li:
Multi-core Processors based Network Intrusion Detection Method. J. Networks 7(9): 1327-1333 (2012)
2000 – 2009
- 2009
- [j7]Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, SunJun Liu:
Distributed agents model for intrusion detection based on AIS. Knowl. Based Syst. 22(2): 115-119 (2009) - [j6]Shingyu Leung, Gang Liang, Knut Solna, Hongkai Zhao:
Expectation-Maximization Algorithm with Local Adaptivity. SIAM J. Imaging Sci. 2(3): 834-857 (2009) - 2008
- [c14]Houtan Shirani-Mehr, Chen Li, Gang Liang, Michal Shmueli-Scheuer:
Quality-Aware Retrieval of Data Objects from Autonomous Sources for Web-Based Repositories. ICDE 2008: 1492-1494 - [c13]Diangang Wang, Tao Li, SunJun Liu, Gang Liang, Kui Zhao:
An Immune Multi-agent System for Network Intrusion Detection. ISICA 2008: 436-445 - 2007
- [j5]Jin Yang, Tao Li, SunJun Liu, Tiefang Wang, Diangang Wang, Gang Liang:
Computer Forensics System Based on Artificial Immune Systems. J. Univers. Comput. Sci. 13(9): 1354-1365 (2007) - [c12]Qing Li, Zhishu Li, Gang Liang, Jingyu Zhang, Liangyin Chen, Baolin Li:
IDGSC: An Immunity-Based Approach for Dynamic Grid Service Classification. FSKD (2) 2007: 160-165 - 2006
- [j4]Gang Liang, Nina Taft, Bin Yu:
A fast lightweight approach to origin-destination IP traffic estimation using partial measurements. IEEE Trans. Inf. Theory 52(6): 2634-2648 (2006) - [c11]Gang Liang, Tao Li, Jiancheng Ni, Yaping Jiang, Jin Yang, Xun Gong:
An Immunity-Based Dynamic Multilayer Intrusion Detection System. ICIC (3) 2006: 641-650 - [c10]Xun Gong, Tao Li, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu:
Immunity and Mobile Agent Based Grid Intrusion Detection. ICIC (3) 2006: 651-659 - [c9]Gang Liang, Tao Li, Xun Gong, Yaping Jiang, Jin Yang, Jiancheng Ni:
NASC: A Novel Approach for Spam Classification. ICIC (3) 2006: 672-681 - [c8]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, Gang Liang, Xiaoqin Hu:
Grid Intrusion Detection Based on Immune Agent. ICNC (2) 2006: 73-82 - [c7]Xun Gong, Tao Li, Ji Lu, Tiefang Wang, Gang Liang, Jin Yang, Feixian Sun:
Immunity and Mobile Agent Based Intrusion Detection for Grid. PRIMA 2006: 187-198 - [c6]SunJun Liu, Tao Li, Diangang Wang, Kui Zhao, Xun Gong, Xiaoqin Hu, Chun Xu, Gang Liang:
Immune Multi-agent Active Defense Model for Network Intrusion. SEAL 2006: 104-111 - [c5]Xun Gong, Tao Li, Tiefang Wang, Jin Yang, SunJun Liu, Gang Liang:
An Immune Mobile Agent Based Grid Intrusion Detection Model. SEAL 2006: 112-119 - 2004
- [c4]Gang Liang, Sudarshan S. Chawathe:
Privacy-Preserving Inter-database Operations. ISI 2004: 66-82 - [c3]Gang Liang, Bin Yu, Nina Taft:
Maximum entropy models: convergence rates and applications in dynamic system monitoring. ISIT 2004: 168 - 2003
- [j3]Gang Liang, Bin Yu:
Maximum pseudo likelihood estimation in network tomography. IEEE Trans. Signal Process. 51(8): 2043-2053 (2003) - [c2]Gang Liang, Bin Yu:
Pseudo Likelihood Estimation in Network Tomography. INFOCOM 2003: 2101-2111
1990 – 1999
- 1997
- [j2]Steve Calzone, Keshi Chen, Chih-Chwen Chuang, Ajay Divakaran, Simant Dube, Lyman Hurd, Jarkko Kari, Gang Liang, Fu-Huei Lin, John Muller, Hawley K. Rising III:
Video compression by mean-corrected motion compensation of partial quadtrees. IEEE Trans. Circuits Syst. Video Technol. 7(1): 86-96 (1997) - 1993
- [j1]Gang Liang, D. Mitchell Wilkes, James A. Cadzow:
ARMA model order estimation based on the eigenvalues of the covariance matrix. IEEE Trans. Signal Process. 41(10): 3003-3009 (1993) - 1992
- [c1]D. Mitchell Wilkes, Gang Liang, James A. Cadzow:
ARMA model order determination and MDL: a new perspective. ICASSP 1992: 525-528
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint