Остановите войну!
for scientists:
default search action
Keke Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i8]Jie Tian, Jixin Hou, Zihao Wu, Peng Shu, Zhengliang Liu, Yujie Xiang, Beikang Gu, Nicholas Filla, Yiwei Li, Ning Liu, Xianyan Chen, Keke Tang, Tianming Liu, Xianqiao Wang:
Assessing Large Language Models in Mechanical Engineering Education: A Study on Mechanics-Focused Conceptual Understanding. CoRR abs/2401.12983 (2024) - 2023
- [j10]Jiaheng Hua, Xiaodong Cui, Xianghua Li, Keke Tang, Peican Zhu:
Multimodal fake news detection through data augmentation-based contrastive learning. Appl. Soft Comput. 136: 110125 (2023) - [j9]Keke Tang, Yawen Shi, Tianrui Lou, Weilong Peng, Xu He, Peican Zhu, Zhaoquan Gu, Zhihong Tian:
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds. IEEE Internet Things J. 10(6, March 15): 5158-5169 (2023) - [j8]Peican Zhu, Xin Hou, Keke Tang, Yang Liu, Yin-Ping Zhao, Zhen Wang:
Unsupervised feature selection through combining graph learning and ℓ2,0-norm constraint. Inf. Sci. 622: 68-82 (2023) - [j7]Keke Tang, Yuhong Chen, Weilong Peng, Yanling Zhang, Meie Fang, Zheng Wang, Peng Song:
RepPVConv: attentively fusing reparameterized voxel features for efficient 3D point cloud perception. Vis. Comput. 39(11): 5577-5588 (2023) - [c22]Keke Tang, Jianpeng Wu, Weilong Peng, Yawen Shi, Peng Song, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
Deep Manifold Attack on Point Clouds via Parameter Plane Stretching. AAAI 2023: 2420-2428 - [c21]Qi Li, Xingyu Li, Xiaodong Cui, Keke Tang, Peican Zhu:
HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets. CIKM 2023: 4064-4068 - [c20]Xiang Fang, Daizong Liu, Wanlong Fang, Pan Zhou, Yu Cheng, Keke Tang, Kai Zou:
Annotations Are Not All You Need: A Cross-modal Knowledge Transfer Network for Unsupervised Temporal Sentence Grounding. EMNLP (Findings) 2023: 8721-8733 - [c19]Keke Tang, Xujian Cai, Weilong Peng, Daizong Liu, Peican Zhu, Pan Zhou, Zhihong Tian, Wenping Wang:
Matching Words for Out-of-distribution Detection. ICDM 2023: 578-587 - [c18]Keke Tang, Xujian Cai, Weilong Peng, Shudong Li, Wenping Wang:
OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers. ICIP 2023: 1260-1264 - [c17]Zepeng Fan, Peican Zhu, Chao Gao, Jinbang Hong, Keke Tang:
DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion. KSEM (2) 2023: 276-288 - [c16]Keke Tang, Tianrui Lou, Xu He, Yawen Shi, Peican Zhu, Zhaoquan Gu:
Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training. KSEM (1) 2023: 328-342 - [c15]Xu He, Keke Tang, Yawen Shi, Yin Li, Weilong Peng, Peican Zhu:
Are Deep Point Cloud Classifiers Suffer From Out-of-distribution Overconfidence Issue? SMC 2023: 2620-2627 - 2022
- [j6]Nan Lin, Yuxuan Li, Keke Tang, Yujun Zhu, Xiayu Zhang, Ruolin Wang, Jianmin Ji, Xiaoping Chen, Xin-Ming Zhang:
Manipulation Planning From Demonstration Via Goal-Conditioned Prior Action Primitive Decomposition and Alignment. IEEE Robotics Autom. Lett. 7(2): 1387-1394 (2022) - [c14]Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Example Attacks against ASR Systems: An Overview. DSC 2022: 470-477 - [c13]Jinbang Hong, Keke Tang, Chao Gao, Songxin Wang, Sensen Guo, Peican Zhu:
GM-Attack: Improving the Transferability of Adversarial Attacks. KSEM (3) 2022: 489-500 - [i7]Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Attacks on ASR Systems: An Overview. CoRR abs/2208.02250 (2022) - 2021
- [j5]Zhaoquan Gu, Keke Tang, Zhen Wang, Yanhua Li, Wei Shi, Zhihong Tian:
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications. Frontiers Neurorobotics 15 (2021) - [j4]Weilong Peng, Yong Su, Keke Tang, Chao Xu, Zhiyong Feng, Meie Fang:
Geometrical Consistency Modeling on B-Spline Parameter Domain for 3D Face Reconstruction From Limited Number of Wild Images. Frontiers Neurorobotics 15: 652562 (2021) - [c12]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. ICCV 2021: 1133-1142 - [i6]Yining Huang, Meilian Chen, Keke Tang:
Training like Playing: A Reinforcement Learning And Knowledge Graph-based framework for building Automatic Consultation System in Medical Field. CoRR abs/2106.07502 (2021) - [i5]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. CoRR abs/2108.06024 (2021) - [i4]Yining Huang, Shaoze Lin, Yijun Wei, Keke Tang:
Sinoledge: A Knowledge Engine based on Logical Reasoning and Distributed Micro Services. CoRR abs/2109.08307 (2021) - 2020
- [j3]Hua Zhong, Zhong Shen, Yafei Zhao, Keke Tang, Wenping Wang, Zheng Wang:
A Hybrid Underwater Manipulator System With Intuitive Muscle-Level sEMG Mapping Control. IEEE Robotics Autom. Lett. 5(2): 3198-3205 (2020) - [c11]Weiguo Wang, Zhaoquan Gu, Keke Tang:
An Improved Algorithm for Bert. CIAT 2020: 116-120 - [c10]Yinyu Lyu, Chenwei Liu, Hao Tan, Rui Xie, Keke Tang, Zhaoquan Gu:
Convolutional Neural Network based Timbre Classification. CIAT 2020: 186-191 - [c9]Keke Tang, Jiaqi Li:
The Business Cycle, Market Power, and Corporate Investment. ICEME 2020: 184-195 - [i3]Nan Lin, Yuxuan Li, Yujun Zhu, Ruolin Wang, Xiayu Zhang, Jianmin Ji, Keke Tang, Xiaoping Chen, Xinming Zhang:
NEARL: Non-Explicit Action Reinforcement Learning for Robotic Control. CoRR abs/2011.01046 (2020)
2010 – 2019
- 2019
- [j2]Keke Tang, Peng Song, Xiaofei Wang, Bailin Deng, Chi-Wing Fu, Ligang Liu:
Computational Design of Steady 3D Dissection Puzzles. Comput. Graph. Forum 38(2): 291-303 (2019) - [c8]Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang:
Chinese Text Classification Based on Neural Networks and Word2vec. DSC 2019: 284-291 - [c7]Zhaoquan Gu, Yuexuan Wang, Keke Tang, Chao Li, Mohan Li, Lihua Yin:
A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 129-134 - [i2]Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang:
Decision Propagation Networks for Image Classification. CoRR abs/1911.12101 (2019) - 2017
- [j1]Keke Tang, Peng Song, Xiaoping Chen:
3D Object Recognition in Cluttered Scenes With Robust Shape Description and Correspondence Selection. IEEE Access 5: 1833-1845 (2017) - 2016
- [c6]Keke Tang, Peng Song, Xiaoping Chen:
Signature of Geometric Centroids for 3D Local Shape Description and Partial Shape Matching. ACCV (5) 2016: 311-326 - [i1]Keke Tang, Peng Song, Xiaoping Chen:
Signature of Geometric Centroids for 3D Local Shape Description and Partial Shape Matching. CoRR abs/1612.08408 (2016) - 2015
- [c5]Keke Tang, Zhe Zhao, Xiaoping Chen:
Label Propagation for Large Scale 3D Indoor Scenes. ISVC (1) 2015: 253-264 - [c4]Keke Tang, Zhe Zhao, Xiaoping Chen:
Joint Visual Phrase Detection to Boost Scene Parsing. ISVC (2) 2015: 389-399 - [c3]Yingfeng Chen, Feng Wu, Ningyang Wang, Keke Tang, Min Cheng, Xiaoping Chen:
KeJia-LC: A Low-Cost Mobile Robot Platform - Champion of Demo Challenge on Benchmarking Service Robots at RoboCup 2015. RoboCup 2015: 60-71 - [c2]Min Cheng, Xiaoping Chen, Keke Tang, Feng Wu, Andras Gabor Kupcsik, Luca Iocchi, Yingfeng Chen, David Hsu:
Synthetical Benchmarking of Service Robots: A First Effort on Domestic Mobile Platforms. RoboCup 2015: 377-388 - 2014
- [c1]Kai Chen, Dongcai Lu, Yingfeng Chen, Keke Tang, Ningyang Wang, Xiaoping Chen:
The Intelligent Techniques in Robot KeJia - The Champion of RoboCup@Home 2014. RoboCup 2014: 130-141
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-20 22:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint