


default search action
Dan Tang 0003
Person information
- affiliation: Hunan University, Changsha, China
Other persons with the same name
- Dan Tang — disambiguation page
- Dan Tang 0001
— Yunnan University, Kunming, Yunnan, China - Dan Tang 0002
— Beijing Institute of Open Source Chip, Beijing, China - Dan Tang 0004
— Chengdu University of Information Technology, China - Dan Tang 0005
— Liaoning University, Shenyang, China - Dan Tang 0006
— Sichuan University of Science and Engineering, Zigong, Sichuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j32]Dan Tang
, Xiaocai Wang
, Pei Tan
, Zheng Qin
, Keqin Li
, Jiliang Zhang
:
DNSGreen: A Comprehensive Defense System Against Bounce-Style DNS DDoS Attacks With P4. IEEE Trans. Computers 75(1): 247-260 (2026)
[j31]Rui Dai
, Dan Tang
, Zheng Qin
, Kai Chen
, Keqin Li
, Jiliang Zhang
:
Detecting Congestion-Related Attacks via Fine-Grained Queue Diagnosis. IEEE Trans. Cogn. Commun. Netw. 12: 1255-1268 (2026)
[j30]Dan Tang
, Xinmeng Li
, Pei Tan
, Keqin Li
, Zheng Qin
, Jiliang Zhang
:
DOE-DTL: A ML-Utilized System Combined With PDP for Detection and Mitigation of DLDoS Attack. IEEE Trans. Netw. 34: 139-151 (2026)
[j29]Dan Tang
, Boru Liu
, Zheng Qin
, Wei Liang
, Keqin Li
, Wenqiang Jin
:
REAPER: Real-Time Detection of Malicious Traffic via Deep Time-Series Embedding Analysis. IEEE Trans. Netw. 34: 872-887 (2026)
[j28]Dan Tang
, Chenguang Zuo
, Xinmeng Li
, Siyuan Wang
, Wei Liang
, Keqin Li
, Jiliang Zhang
:
MWD-CFM: Detection and Mitigation of DDoS Attack Against SDN Flow Tables. IEEE Trans. Netw. 34: 4269-4282 (2026)- 2025
[j27]Dan Tang
, Rui Dai
, Yudong Yan
, Keqin Li
, Wei Liang
, Zheng Qin
:
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks. ACM Comput. Surv. 57(4): 103:1-103:32 (2025)
[j26]Dan Tang, Chenguang Zuo
, Xinmeng Li, Pei Tan, Dongshuo Zhang, Zheng Qin:
Low-rate flow table overflow attack defense system based on two-level threshold in software-defined networks. Expert Syst. Appl. 293: 128685 (2025)
[j25]Dan Tang
, Rui Dai
, Chenguang Zuo
, Jingwen Chen
, Keqin Li
, Zheng Qin
:
A Low-Rate DoS Attack Mitigation Scheme Based on Port and Traffic State in SDN. IEEE Trans. Computers 74(5): 1758-1770 (2025)
[j24]Dan Tang
, Boru Liu
, Keqin Li
, Sheng Xiao
, Wei Liang
, Jiliang Zhang
:
PLUTO: A Robust LDoS Attack Defense System Executing at Line Speed. IEEE Trans. Dependable Secur. Comput. 22(3): 2855-2872 (2025)
[j23]Dan Tang
, Chenguang Zuo
, Jiliang Zhang
, Keqin Li
, Qiuwei Yang
, Zheng Qin
:
MARS: Defending TCP Protocol Abuses in Programmable Data Plane. IEEE Trans. Netw. Serv. Manag. 22(5): 4050-4060 (2025)- 2024
[j22]Dan Tang, Hongbo Cao, Jiliang Zhang, Zheng Qin, Wei Liang
, Xiaopu Ma:
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane. Comput. Networks 252: 110666 (2024)
[j21]Dan Tang
, Zhiqing Zheng
, Chao Yin
, Bing Xiong, Zheng Qin, Qiuwei Yang
:
FTODefender: An efficient flow table overflow attacks defending system in SDN. Expert Syst. Appl. 237(Part B): 121460 (2024)
[j20]Boru Liu, Dan Tang, Jingwen Chen, Wei Liang
, Yufeng Liu, Qiuwei Yang
:
ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN. Expert Syst. Appl. 254: 124356 (2024)
[j19]Xiaocai Wang, Dan Tang, Ye Feng, Zheng Qin, Bing Xiong
, Yufeng Liu
:
An LDoS attack detection method based on FSWT time-frequency distribution. Expert Syst. Appl. 256: 125006 (2024)
[j18]Dan Tang
, Zhiqing Zheng
, Keqin Li
, Chao Yin
, Wei Liang
, Jiliang Zhang:
FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN. IEEE Trans. Netw. Sci. Eng. 11(3): 2524-2536 (2024)
[j17]Dan Tang
, Xiaocai Wang
, Keqin Li
, Chao Yin
, Wei Liang
, Jiliang Zhang
:
FAPM: A Fake Amplification Phenomenon Monitor to Filter DRDoS Attacks With P4 Data Plane. IEEE Trans. Netw. Serv. Manag. 21(6): 6703-6715 (2024)- 2023
[j16]Dan Tang, Dongshuo Zhang, Zheng Qin, Qiuwei Yang, Sheng Xiao:
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks. J. Netw. Comput. Appl. 213: 103597 (2023)
[j15]Dan Tang
, Siyuan Wang
, Siqi Zhang
, Zheng Qin
, Wei Liang
, Sheng Xiao
:
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics. IEEE Trans. Cogn. Commun. Netw. 9(6): 1721-1733 (2023)
[j14]Dan Tang
, Xiyin Wang
, Xiong Li
, Pandi Vijayakumar
, Neeraj Kumar
:
AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 273-287 (2023)
[j13]Dan Tang
, Yudong Yan
, Chenjun Gao
, Wei Liang
, Wenqiang Jin
:
LtRFT: Mitigate the Low-Rate Data Plane DDoS Attack With Learning-To-Rank Enabled Flow Tables. IEEE Trans. Inf. Forensics Secur. 18: 3143-3157 (2023)
[j12]Dan Tang
, Chenjun Gao
, Xinmeng Li, Wei Liang
, Sheng Xiao
, Qiuwei Yang
:
A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. IEEE Trans. Netw. Sci. Eng. 10(4): 1952-1963 (2023)
[j11]Dan Tang
, Zhiqing Zheng
, Xiaocai Wang, Sheng Xiao
, Qiuwei Yang
:
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN. IEEE Trans. Netw. Serv. Manag. 20(3): 3686-3698 (2023)
[j10]Dan Tang
, Chenjun Gao
, Wei Liang
, Jiliang Zhang, Keqin Li
:
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN. IEEE Trans. Netw. Serv. Manag. 20(4): 5073-5084 (2023)
[j9]Dan Tang
, Siyuan Wang
, Boru Liu
, Wenqiang Jin
, Jiliang Zhang
:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. IEEE Trans. Serv. Comput. 16(5): 3373-3384 (2023)- 2022
[j8]Dan Tang, Yudong Yan
, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. Clust. Comput. 25(2): 1373-1392 (2022)
[j7]Wei Shi, Dan Tang, Sijia Zhan, Zheng Qin, Xiyin Wang:
An approach for detecting LDoS attack based on cloud model. Frontiers Comput. Sci. 16(6): 166821 (2022)
[j6]Dan Tang
, Yudong Yan
, Siqi Zhang
, Jingwen Chen, Zheng Qin
:
Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN. IEEE J. Sel. Areas Commun. 40(1): 428-444 (2022)
[j5]Dan Tang
, Siqi Zhang
, Yudong Yan
, Jingwen Chen, Zheng Qin
:
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm. IEEE Trans. Serv. Comput. 15(6): 3471-3484 (2022)- 2021
[j4]Dan Tang, Ye Feng
, Siqi Zhang
, Zheng Qin
:
FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack. IEEE Trans. Reliab. 70(3): 1143-1157 (2021)
[c7]Siyuan Wang, Dan Tang, Yu Liu, Jingwen Chen, Yudong Yan, Jiayi Zhang:
LDoS Attack Detection using PSO and K-means Algorithm. CSCWD 2021: 317-322
[c6]Xinmeng Li, Nengguang Luo, Dan Tang, Zhiqing Zheng, Zheng Qin, Xinxiang Gao:
BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network. ISPA/BDCloud/SocialCom/SustainCom 2021: 300-307
[c5]Xinmeng Li, Kai Zheng, Dan Tang, Zheng Qin, Zhiqing Zheng, Shihan Zhang:
LDoS Attack Detection Based on ASNNC-OFA Algorithm. WCNC 2021: 1-6- 2020
[j3]Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Xiong Li
, Joel J. P. C. Rodrigues:
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Gener. Comput. Syst. 106: 347-359 (2020)
[j2]Dan Tang, Rui Dai, Liu Tang, Xiong Li
:
Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis. Hum. centric Comput. Inf. Sci. 10: 6 (2020)
[j1]Sijia Zhan
, Dan Tang, Jianping Man, Rui Dai, Xiyin Wang:
Low-Rate DoS Attacks Detection Based on MAF-ADM. Sensors 20(1): 189 (2020)
[c4]Zhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen:
An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm. ICCCN 2020: 1-9
2010 – 2019
- 2019
[c3]Yudong Yan, Dan Tang, Sijia Zhan, Rui Dai, Jingwen Chen, Ningbo Zhu:
Low-Rate DoS Attack Detection Based on Improved Logistic Regression. HPCC/SmartCity/DSS 2019: 468-476
[c2]Dongshuo Zhang, Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Ningbo Zhu:
PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack. HPCC/SmartCity/DSS 2019: 1163-1170- 2018
[c1]Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man:
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. ICICS 2018: 92-104
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-09 00:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







