


default search action
Peng Li 0011
Person information
- affiliation: Nanjing University of Posts and Telecommunications, School of Computer Science and Technology, China
- affiliation: Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China
Other persons with the same name
- Peng Li — disambiguation page
- Peng Li 0001
— University of California, Santa Barbara, CA, USA (and 2 more)
- Peng Li 0002
— Shandong University, School of Control Science and Engineering, Jinan, China
- Peng Li 0003
— Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China
- Peng Li 0004
— Northwest A&F University, College of Life Science, Yangling, Shaanxi, China
- Peng Li 0005
— University of Alberta, Nanofab, Edmonton, AB, Canada
- Peng Li 0006
— University of Strathclyde, Electronic and Electrical Engineering Department, Glasgow, UK
- Peng Li 0007
— Beijing Jiaotong University, School of Electronic and Information Engineering, China
- Peng Li 0008
— North China Electric Power University, School of Economics and Management, Beijing, China
- Peng Li 0009
— Harbin University of Commerce, School of Management, China
- Peng Li 0010
— University of Wollongong, School of Mathematics & Applied Statistics, NSW, Australia (and 2 more)
- Peng Li 0012
— Chinese Academy of Sciences, Institute of Semiconductors, Beijing, China
- Peng Li 0013
— Hunan University of Technology, College of Electrical and Information Engineering, Zhuzhou, China
- Peng Li 0014
— Tianjin University, Key Laboratory of Smart Grid of the Ministry of Education, China (and 1 more)
- Peng Li 0015
— National University of Defense Technology, College of Mechatronics Engineering and Automation, Changsha, China
- Peng Li 0016
— Shaanxi Normal University, School of Computer Science, China (and 2 more)
- Peng Li 0017
— University of Aizu, School of Computer Science and Engineering, Aizuwakamatsu, Japan
- Peng Li 0018 — PUC-Rio Rio de Janeiro, Brazil (and 2 more)
- Peng Li 0019
— Harbin Institute of Technology, Shenzhen Graduate School, School of Mechatronical Engineering, China (and 3 more)
- Peng Li 0020 — Microsoft Corporation, Redmond, WA, USA (and 1 more)
- Peng Li 0021 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Peng Li 0022 — Halliburton Energy Services Inc., Houston, TX, USA
- Peng Li 0023 — University of Houston, Department of Mechanical Engineering, TX, USA
- Peng Li 0024
— Imperial College London, Department of Electrical and Electronic Engineering, UK
- Peng Li 0025
— China Academy of Engineering Physics, Beijing, China
- Peng Li 0026 — ByteDance Inc., Beijing, China (and 1 more)
- Peng Li 0027
— Dalian University of Technology, School of Software Technology, China (and 1 more)
- Peng Li 0028 — Intel Corporation, Hillsboro, OR, USA (and 1 more)
- Peng Li 0029
— Harbin Engineering University, Acoustic Science and Technology Laboratory / College of Underwater Acoustic Engineering, China
- Peng Li 0030
— Tsinghua University, Institute for AI Industry Research (AIR), Beijing, China (and 3 more)
- Peng Li 0031
— Tsinghua University, Suzhou Automotive Research Institute, Vehicle Technology Group, Beijing, China (and 3 more)
- Peng Li 0032 — Chinese Academy of Sciences, Institute of Automation, Beijing, China
- Peng Li 0033 — University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
- Peng Li 0034
— Zhejiang University, College of Optical Science and Engineering, State Key Laboratory of Modern Optical Instrumentation, China
- Peng Li 0035
— China University of Petroleum (East China), College of Information and Control Engineering, Qingdao, China
- Peng Li 0036
— Xi'an University of Technology, School of Computer Science and Engineering, China (and 1 more)
- Peng Li 0037
— Dalian Polytechnic University, School of Information Science and Engineering, China (and 1 more)
- Peng Li 0038
— Chinese Academy of Sciences, Technology and Engineering Center for Space Utilization, Beijing, China
- Peng Li 0039
— Yunnan University, School of Information, Kunming, China
- Peng Li 0040
— Chuzhou University, School of Geographic Information and Tourism, China
- Peng Li 0041
— Center for Disease Control and Prevention of PLA, Beijing, China
- Peng Li 0042
— North China Electric Power University, Key Lab of Condition Monitoring and Control for Power Plant Equipment, Baoding, China
- Peng Li 0043
— Yanshan University, Institute of Electrical Engineering, Qinhuangdao, China
- Peng Li 0044
— Xi'an University of Technology, Faculty of Economics and Management, China (and 1 more)
- Peng Li 0045
— Ostwestfalen-Lippe University of Applied Science, inIT, Lemgo, Germany
- Peng Li 0046
— Wuhan University of Science and Technology, College of Computer Science and Technology / Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, China (and 1 more)
- Peng Li 0047 — Geo-Centers, Inc., USA
- Peng Li 0048 — France Telecom Orange Labs (Beijing), China
- Peng Li 0049 — Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao, China
- Peng Li 0050
— North China Electric Power University, Department of Mathematics and Physics, Baoding, China (and 1 more)
- Peng Li 0051
— Beijing University of Technology, Faculty of Information Technology, Department of Automation, China (and 1 more)
- Peng Li 0052
— University of Science and Technology Beijing, School of Computer and Communication Engineering, China
- Peng Li 0053
— Power China Zhongnan Engineering Corporation Ltd., China (and 2 more)
- Peng Li 0054
— Xiangtan University, School of Information Engineering, China (and 1 more)
- Peng Li 0055 — Loughborough University, UK
- Peng Li 0056 — Alibaba Group, Hangzhou, China (and 2 more)
- Peng Li 0057
— Beijing University of Technology, China (and 3 more)
- Peng Li 0058 — University of Utah, School of Computing, UT, USA
- Peng Li 0059 — University of North Carolina, Chapel Hill, USA
- Peng Li 0060
— Ocean University of China, Institute of Estuarine and Coastal Zone, College of Marine Geosciences, Qingdao, China
- Mike Peng Li (aka: Peng Mike Li, Peng Li 0061, Mike P. Li, Mike Li 0001) — Intel Corporation, SerDes, high-speed I/O, HSIO, Santa Clara, CA, USA (and 4 more)
- Peng Li 0062
— Georgia Institute of Technology, Atlanta, GA, USA
- Peng Li 0063
— Harbin Institute of Technology, School of Electronics and Information Engineering, China
- Peng Li 0064
— Nanjing University of Aeronautics and Astronautics, School of Computer Science and Technology, Shenzhen, China
- Peng Li 0065
— Chongqing University of Technology, College of Science, Department of mathematics, MOE-LSC, China
- Peng Li 0066 — Shandong Normal University, School of Mathematics and Statistics, Jinan, Shandong, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j60]Yunyun Sun
, Peng Li
, Hang Sun
, He Xu
, Ruchuan Wang:
Feature selection through adaptive sparse learning for scene recognition. Appl. Soft Comput. 169: 112439 (2025) - 2024
- [j59]Shuyan Cheng, Peng Li
, Jianguo Liu, He Xu, Yudong Yao:
Improving the transferability of adversarial attacks via self-ensemble. Appl. Intell. 54(21): 10608-10626 (2024) - [j58]Shuyan Cheng
, Peng Li
, Keji Han, He Xu
:
Feature-aware transferable adversarial attacks against image classification. Appl. Soft Comput. 161: 111729 (2024) - [j57]Shuyan Cheng
, Peng Li
, Ruchuan Wang, He Xu:
Differentially private federated learning with non-IID data. Computing 106(7): 2459-2488 (2024) - [j56]Feng Zhu
, Zidong Cheng
, Peng Li
, He Xu
:
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence. IEEE Internet Things J. 11(11): 20867-20878 (2024) - [j55]Wenlong Zheng
, He Xu
, Peng Li
, Ruchuan Wang, Xing Shao
:
SAC-RSM: A High-Performance UAV-Side Road Surveillance Model Based on Super-Resolution Assisted Learning. IEEE Internet Things J. 11(22): 36066-36083 (2024) - [j54]Yunyun Sun
, Peng Li
, He Xu
, Ruchuan Wang:
Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification. Neural Networks 179: 106511 (2024) - [j53]Hongjun Zhang
, Ruoyan Xia, Hao Ye, Desheng Shi, Peng Li, Weibei Fan:
Multi-cluster high performance computing method based on multimodal tensor in enterprise resource planning system. Phys. Commun. 62: 102231 (2024) - [j52]Xiao Jiang
, Peng Li
, Yuling Shang, Yulong Zou
, Bin Li
, Peishun Yan
:
Improving Physical Layer Security for Distributed Antenna Systems With a Friendly Jammer. IEEE Trans. Commun. 72(8): 4756-4773 (2024) - [c69]Yujie Zhang, Peng Li, Weibei Fan, Ruchuan Wang:
QTSRA: A Q-learning-based Trusted Routing Algorithm in SDN Wireless Sensor Networks. CSCWD 2024: 1881-1886 - [i1]Jing Chen, Shengyi Yang, Weiping Ding, Peng Li, Aijun Liu, Hongjun Zhang, Tian Li:
Incremental high average-utility itemset mining: survey and challenges. CoRR abs/2407.11425 (2024) - 2023
- [j51]Yun Xie
, Peng Li, Nadia Nedjah, Brij B. Gupta
, David Taniar, Jindan Zhang:
Privacy protection framework for face recognition in edge-based Internet of Things. Clust. Comput. 26(5): 3017-3035 (2023) - [j50]Haitao Cheng
, Jingshu Zhu
, Peng Li
, He Xu
:
Combining knowledge extension with convolution neural network for diabetes prediction. Eng. Appl. Artif. Intell. 125: 106658 (2023) - [j49]Hongjun Zhang
, Peng Li
, Fanshuo Meng, Weibei Fan, Zhuangzhuang Xue:
MapReduce-based distributed tensor clustering algorithm. Neural Comput. Appl. 35(35): 24633-24649 (2023) - [j48]He Xu
, Wenlong Zheng, Fengxuan Liu, Peng Li
, Ruchuan Wang:
Unmanned Aerial Vehicle Perspective Small Target Recognition Algorithm Based on Improved YOLOv5. Remote. Sens. 15(14): 3583 (2023) - [j47]He Xu
, Xianzhen Yin
, Feng Zhu
, Peng Li
:
RF-Ray: Sensing Objects in the Package via RFID Systems. IEEE Syst. J. 17(1): 558-568 (2023) - [j46]Xiao Jiang
, Peng Li
, Yulong Zou
, Bin Li
, Ruchuan Wang:
Secure Transmission for Wireless Communication Systems With Friendly Jammers. IEEE Trans. Veh. Technol. 72(12): 16308-16322 (2023) - [j45]Hui Zheng
, Jing He, Qing Liu, Jianhua Li
, Guang-Li Huang, Peng Li:
Multi-objective optimisation based fuzzy association rule mining method. World Wide Web (WWW) 26(3): 1055-1072 (2023) - [c68]Hang Sun
, Yunyun Sun
, Peng Li
, He Xu
:
Multi-attention Integration Mechanism for Region Destruction Detection of Remote Sensing Images. CGI (3) 2023: 198-210 - [c67]Fanshuo Meng, Peng Li, Weibei Fan, Hongjun Zhang, Zhuangzhuang Xue, Haitao Cheng:
BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train Decomposition. CSCWD 2023: 1245-1250 - 2022
- [j44]Xiao Jiang
, Peng Li
, Bin Li, Yulong Zou
, Ruchuan Wang:
Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting. IET Commun. 16(3): 227-245 (2022) - [j43]Yujie Zhang
, Peng Li, Weibei Fan, Ruchuan Wang:
Secrecy outage probability analysis of energy-aware relay selection for energy-harvesting cooperative systems. IET Commun. 16(10): 1119-1129 (2022) - [j42]Haitao Cheng
, Zong-Min Ma
, Peng Li:
A fuzzy spatial description logic for the semantic web. J. Ambient Intell. Humaniz. Comput. 13(11): 4991-5009 (2022) - [j41]Manman Zhang, Peng Li, He Xu
, Ruchuan Wang:
RFID Indoor Positioning Based on AP Clustering and Improved Particle Swarm Algorithm. J. Sensors 2022: 1-19 (2022) - [j40]Xiao Jiang
, Peng Li
, Bin Li
, Yulong Zou
, Ruchuan Wang:
Intelligent Jamming Strategies for Secure Spectrum Sharing Systems. IEEE Trans. Commun. 70(2): 1153-1167 (2022) - [j39]Xiao Jiang
, Peng Li
, Yulong Zou
, Bin Li
, Ruchuan Wang:
Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors. IEEE Trans. Commun. 70(9): 6164-6180 (2022) - [j38]He Xu
, Mingtao Guo
, Nadia Nedjah
, Jindan Zhang
, Peng Li
:
Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration. IEEE Trans. Intell. Transp. Syst. 23(10): 19760-19771 (2022) - [j37]Xiao Jiang, Peng Li, Ruchuan Wang:
Power Splitting and Source-Relay Selection in Energy Harvesting Wireless Network. Wirel. Pers. Commun. 124(3): 2141-2160 (2022) - [c66]Yue Yin, Peng Li, Jing Chen:
A Variable Sliding Window Algorithm Based on Concept Drift for Frequent Pattern Mining Over Data Streams*. ICPADS 2022: 818-825 - 2021
- [j36]Yun Xie
, Peng Li, Jindan Zhang, Marek R. Ogiela:
Differential privacy distributed learning under chaotic quantum particle swarm optimization. Computing 103(3): 449-472 (2021) - [j35]Haitao Cheng
, Peng Li, Ruchuan Wang, He Xu:
Dynamic spatio-temporal logic based on RCC-8. Concurr. Comput. Pract. Exp. 33(22) (2021) - [j34]Weibei Fan, Jianxi Fan, Zhijie Han
, Peng Li, Yujie Zhang, Ruchuan Wang:
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes. Frontiers Comput. Sci. 15(1) (2021) - [j33]Peng Li, Chao Xu, He Xu:
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks. Int. J. Inf. Secur. Priv. 15(1): 1-23 (2021) - [j32]Xiao Jiang
, Peng Li
, Bin Li, Yulong Zou
, Ruchuan Wang:
Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications. Secur. Commun. Networks 2021: 5599334:1-5599334:16 (2021) - [j31]Weibei Fan
, Peng Li
, Zhijie Han
, Jianxi Fan
, Jing He
, Zhili Wang, Ruchuan Wang:
Dynamic Virtual Network Embedding of Mobile Cloud System Based on Global Resources in Internet of Vehicles. IEEE Trans. Veh. Technol. 70(8): 8161-8174 (2021) - [j30]He Xu
, Xin Chen
, Feng Zhu
, Peng Li
:
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems. Wirel. Commun. Mob. Comput. 2021: 8844178:1-8844178:14 (2021) - [c65]Weiqing Fang
, Peng Li
, YuJie Zhang
, Yang Chen
:
Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type - Black Box Testing. ICBDS 2021: 284-298 - [c64]Yang Chen
, Peng Li
, Yujie Zhang
, Weiqing Fang
:
State Machine Inference Method of Unknown Binary Protocol Based on Recurrent Neural Network. ICBDS 2021: 607-616 - [c63]Jinhai Fang, Zuoling Xie, Haitao Cheng, Bin Fan, He Xu, Peng Li:
Anomaly detection of diabetes data based on hierarchical clustering and CNN. ITQM 2021: 71-78 - [c62]Chen-Yun Luo, Shuyan Cheng, He Xu, Peng Li:
Human behavior recognition model based on improved EfficientNet. ITQM 2021: 369-376 - [c61]Jing Chen, Peng Li, Weiqing Fang, Ning Zhou, Yue Yin, He Xu, Hui Zheng:
Fuzzy Association Rules Mining based on Type-2 Fuzzy Sets over Data Stream. ITQM 2021: 456-462 - [c60]Yi Lu, Peng Li, He Xu:
A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things. ITQM 2021: 629-636 - 2020
- [j29]Weibei Fan, Jing He, Zhijie Han
, Peng Li, Ruchuan Wang:
Intelligent Resource Scheduling Based on Locality Principle in Data Center Networks. IEEE Commun. Mag. 58(10): 94-100 (2020) - [j28]Weibei Fan
, Jing He
, Zhijie Han
, Peng Li
, Ruchuan Wang:
Reconfigurable Fault-tolerance mapping of ternary N-cubes onto chips. Concurr. Comput. Pract. Exp. 32(11) (2020) - [j27]Mingtao Guo, Donghui Xue, Peng Li
, He Xu
:
Vehicle Pedestrian Detection Method Based on Spatial Pyramid Pooling and Attention Mechanism. Inf. 11(12): 583 (2020) - [j26]Hui Zheng
, Peng Li, Qing Liu, Jinjun Chen, Guang-Li Huang
, Junfeng Wu, Yun Xue, Jing He
:
Dual incremental fuzzy schemes for frequent itemsets discovery in streaming numeric data. Inf. Sci. 514: 15-43 (2020) - [j25]Weibei Fan, Jing He
, Mengjiao Guo, Peng Li, Zhijie Han
, Ruchuan Wang:
Privacy preserving classification on local differential privacy in data centers. J. Parallel Distributed Comput. 135: 70-82 (2020) - [j24]Yang Wang, Peng Li, Yimu Ji, Weibei Fan, Yujie Zhang, Ruchuan Wang, Guoliang Chen:
高性能计算与天文大数据研究综述 (High Performance Computing and Astronomical Data: A Survey). 计算机科学 47(1): 1-6 (2020) - [j23]Peng Li
, Baozhou Luo, Wenjun Zhu, He Xu:
Cluster-based distributed dynamic cuckoo filter system for Redis. Int. J. Parallel Emergent Distributed Syst. 35(3): 340-353 (2020) - [j22]Liang Xiao, He Xu
, Feng Zhu
, Ruchuan Wang, Peng Li
:
SKINNY-Based RFID Lightweight Authentication Protocol. Sensors 20(5): 1366 (2020) - [j21]Shuyan Cheng
, Shujun Wang, Wenbai Guan, He Xu
, Peng Li
:
3DLRA: An RFID 3D Indoor Localization Method Based on Deep Learning. Sensors 20(9): 2731 (2020) - [j20]Feng Zhu
, Peng Li
, He Xu
, Ruchuan Wang:
A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems. Sensors 20(17): 4846 (2020) - [c59]Zhuang Xu, Yue Yin, Haitao Chen, He Xu, Peng Li:
Algorithm for Determining Number of Clusters based on Dichotomy. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 180-185 - [c58]Jiajia Qin, Xun Zhang, Peng Li:
Anomaly Detection based on Feature Correlation and Influence Degree in SDN. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 186-192 - [c57]Zhengcai Li, Mingtao Guo, He Xu, Peng Li:
Prediction of diabetes using Multi-type data. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 204-210 - [c56]Yang Li, He Xu, Peng Li:
RFID-Based WIMEC-LANDMARC Indoor Location Algorithm. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 448-455 - [c55]Hanxiao Zhi, He Xu, Peng Li:
Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor Networks. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 456-461 - [c54]Hui Zheng, Peng Li:
Optimizing Multi-objective Functions in Fuzzy Association Rule Mining. WI/IAT 2020: 606-610
2010 – 2019
- 2019
- [j19]Leixian Shen, Qingyun Zhang
, Jiayi Pang, He Xu
, Peng Li:
PRDL: Relative Localization Method of RFID Tags via Phase and RSSI Based on Deep Learning. IEEE Access 7: 20249-20261 (2019) - [j18]Haitao Cheng
, Ruchuan Wang, Peng Li, He Xu:
Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey. Intell. Data Anal. 23(S1): 113-132 (2019) - [j17]He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang:
Novel implementation of defence strategy of relay attack based on cloud in RFID systems. Int. J. Inf. Comput. Secur. 11(2): 120-144 (2019) - [j16]Leixian Shen, Qingyun Zhang
, Jiayi Pang, He Xu
, Peng Li
, Donghui Xue:
ANTspin: Efficient Absolute Localization Method of RFID Tags via Spinning Antenna. Sensors 19(9): 2194 (2019) - [j15]Feng Zhu
, Peng Li
, He Xu
, Ruchuan Wang:
A Lightweight RFID Mutual Authentication Protocol with PUF. Sensors 19(13): 2957 (2019) - [j14]Weibei Fan, Zhijie Han
, Peng Li, Jingya Zhou, Jianxi Fan, Ruchuan Wang:
A Live Migration Algorithm for Containers Based on Resource Locality. J. Signal Process. Syst. 91(10): 1077-1089 (2019) - [c53]Donghui Xue, He Xu, Peng Li:
An Indoor 3D Positioning Technology Based on NB-IoT. AINA Workshops 2019: 35-43 - [c52]Jiayi Pang, Leixian Shen, Qingyun Zhang
, He Xu, Peng Li:
Design of Modern Logistics Management System Based on RFID and NB-IoT. AINA Workshops 2019: 561-569 - [c51]Hao Wu, He Xu, Peng Li:
Design and Implementation of Cloud Service System Based on Face Recognition. CISIS 2019: 629-636 - [c50]Ke Zang, He Xu, Feng Zhu, Peng Li:
Analysis and Design of Group RFID Tag Security Authentication Protocol. CISIS 2019: 637-645 - [c49]Sujun Hu, Haiping Huang, Xuemei Wang, Peng Li, Ruchuan Wang:
Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course. ICCSE 2019: 814-819 - [c48]Jing Chen, Hui Zheng, Peng Li, Zhenjiang Zhang, Huawei Li, Wei Liu:
Fuzzy Association Rule Mining Algorithm Based on Load Classifier. ICDS 2019: 178-191 - [c47]Yuan Shen, Yunxiao Wang, Fangxin Wang, He Xu, Peng Li:
A Novel Heat-Proof Clothing Design Algorithm Based on Heat Conduction Theory. ICDS 2019: 266-274 - [c46]Canshuai Wang, Wenjun Zhu, Haocheng Zhou, Zhuang Xu, Peng Li:
Multi-core Processor Performance Evaluation Model Based on DPDK Affinity Setting. ICDS 2019: 652-662 - [c45]Junfeng Wu
, Hui Zheng
, Peng Li
:
Parallel Absorbing Diagonal Algorithm: A Scalable Iterative Parallel Fast Eigen-Solver for Symmetric Matrices. ICDS 2019: 663-676 - [c44]Weibei Fan, Yang Wang, Jing Sun, Zhijie Han
, Peng Li, Ruchuan Wang:
Fault-Tolerant Cycle Embedding into 3-Ary n-Cubes with Structure Faults. ISPA/BDCloud/SocialCom/SustainCom 2019: 451-457 - [c43]Peixin He, Jing He
, Haichang Yao, Peng Li, Yimu Ji:
Application of Data Distribution Technology in Smart Cities. ITQM 2019: 324-330 - [c42]Bao Feng, Peixin He, Peng Li, Haichang Yao, Yimu Ji, Jing He
:
Developing a smart healthcare framework with an 'Aboriginal lens'. ITQM 2019: 347-354 - [c41]Bao Feng, Peixin He, Yunyao Li, Junfeng Wu, Peng Li, Haichang Yao, Yimu Ji, Chao Min, Jiekui Zhang, Youtao Li, Peizhuang Wang, Yong Shi, Jing He
, Hui Zheng, Yang Wang:
Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient Computing. PAAP 2019: 492-506 - [c40]Junfeng Wu
, Yuanyuan Wu
, Jing He
, Chi-Hung Chi, Guang-Li Huang, Peng Li, Yimu Ji, Haichang Yao:
Absorbing Diagonal Algorithm for Enhancing Randomized SVD Algorithms in Collaborative Filtering✱. WI (Companion) 2019: 132-139 - 2018
- [j13]He Xu, Jie Ding, Peng Li, Daniele Sgandurra, Ruchuan Wang:
An improved SMURF scheme for cleaning RFID data. Int. J. Grid Util. Comput. 9(2): 170-178 (2018) - [j12]Peng Li, Jinquan Song, He Xu, Lu Dong, Yang Zhou:
Resource scheduling optimisation algorithm for containerised microservice architecture in cloud computing. Int. J. High Perform. Syst. Archit. 8(1/2): 51-58 (2018) - [j11]He Xu, Jie Ding, Peng Li, Ruchuan Wang:
Edge computing-based security authentication algorithm for multiple RFID tags. Int. J. Intell. Inf. Database Syst. 11(2/3): 132-152 (2018) - [j10]Peng Li, Lu Dong, He Xu, Ting Fung Lau:
Spark's operation time predictive in cloud computing environment based on SRC-WSVR. J. High Speed Networks 24(1): 49-62 (2018) - [j9]He Xu
, Jie Ding, Peng Li
, Feng Zhu, Ruchuan Wang:
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function. Sensors 18(3): 760 (2018) - [j8]He Xu
, Manxing Wu, Peng Li
, Feng Zhu, Ruchuan Wang:
An RFID Indoor Positioning Algorithm Based on Support Vector Regression. Sensors 18(5): 1504 (2018) - [c39]Bo Cai, Xuanxuan Wang, Peng Li, Zhijie Han
:
A Summary of Data Analysis Based on Differential Privacy. BigDataSecurity/HPSC/IDS 2018: 79-82 - [c38]Mengxiao Jin, Canshuai Wang, Peng Li, Zhijie Han
:
Survey of Load Balancing Method Based on DPDK. BigDataSecurity/HPSC/IDS 2018: 222-224 - [c37]Baozhou Luo, Wenjun Zhu, Peng Li, Zhijie Han
:
Distributed Dynamic Cuckoo Filter System Based on Redis Cluster. BigDataSecurity/HPSC/IDS 2018: 244-247 - [c36]Xiaoyu Shan, Hanxiao Zhi, Peng Li, Zhijie Han
:
A Survey on Computation Offloading for Mobile Edge Computing Information. BigDataSecurity/HPSC/IDS 2018: 248-251 - [c35]Hanxiao Zhi, Peng Li, He Xu, Feng Zhu:
Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks. CISIS 2018: 196-205 - [c34]Wenkang Xie, Peng Li, He Xu:
Architecture and Implementation of Real-Time Analysis System Based on Cold Chain Data. CISIS 2018: 497-505 - [c33]Lu Dong, Peng Li, He Xu, Cheng Yang:
Analysis of Localization Algorithms in Wireless Sensor Networks. CISIS 2018: 573-582 - [c32]Fangzhou Chen, Peng Li, He Xu, Wenkang Xie:
Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark. CISIS 2018: 1047-1057 - [c31]Weibei Fan, Jianxi Fan, Cheng-Kuan Lin, Zhijie Han
, Peng Li, Ruchuan Wang:
Embedding Exchanged Hypercubes into Rings and Ladders. ICA3PP (2) 2018: 3-17 - [c30]Feng Zhu, Youngtae Yun, Jinpeng Wei, Brent ByungHoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, Ruchuan Wang:
A Reflective Covert Channel Attack Anchored on Trusted Web Services. ICWS 2018: 84-99 - [c29]Haowen Sun, Peng Li, He Xu, Feng Zhu:
An Improvement RFID Security Authentication Protocol Based on Hash Function. IMIS 2018: 375-384 - [c28]Hongyu Gan, Chenghao Wu, Jie Xu, Peng Li, He Xu:
Design and Implementation of Cognitive System of Children's Education Based on RFID. IMIS 2018: 448-455 - [c27]Jie Ding, He Xu, Peng Li, Feng Zhu:
Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code. IMIS 2018: 517-526 - [c26]Hui Zheng, Jing He
, Peng Li, Mengjiao Guo, Hui Jin, Jie Shen, Zhijun Xie, Chi-Hung Chi:
Glucose Screening Measurements and Noninvasive Glucose Monitor Methods. ITQM 2018: 613-621 - [c25]Wenjun Zhu, Peng Li, Baozhou Luo, He Xu, Yujie Zhang:
Research and Implementation of High Performance Traffic Processing Based on Intel DPDK. PAAP 2018: 62-68 - [c24]Xuanxuan Wang, Peng Li, He Xu, Zhuang Xu, Yujie Zhang:
Analysis and Research Based on Differential Privacy Protection Related Algorithms. PAAP 2018: 126-133 - [c23]Yang Zhou, Peng Li, He Xu:
Research on Container Load Strategy Based on Microservices. PAAP 2018: 134-139 - 2017
- [j7]Peng Li, Huqing Nie, He Xu, Lu Dong:
A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment. Int. J. Bus. Data Commun. Netw. 13(2): 15-27 (2017) - [j6]He Xu, Ye Ding, Peng Li, Ruchuan Wang:
Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags. Int. J. Bus. Data Commun. Netw. 13(2): 69-82 (2017) - [j5]Peng Li, Huqing Nie, Lingfeng Qiu, Ruchuan Wang:
Energy optimization of ant colony algorithm in wireless sensor network. Int. J. Distributed Sens. Networks 13(4) (2017) - [j4]He Xu
, Weiwei Shen
, Peng Li
, Daniele Sgandurra, Ruchuan Wang:
VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks. J. Sensors 2017: 3186482:1-3186482:11 (2017) - [j3]Peng Li
, Xiaotian Yu
, He Xu
, Jiewei Qian, Lu Dong
, Huqing Nie
:
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. Secur. Commun. Networks 2017: 6102780:1-6102780:12 (2017) - [j2]He Xu
, Ye Ding, Peng Li
, Ruchuan Wang, Yizhu Li:
An RFID Indoor Positioning Algorithm Based on Bayesian Probability and K-Nearest Neighbor. Sensors 17(8): 1806 (2017) - [c22]Liangde Li, Peng Li, He Xu, Fangzhou Chen:
A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform. CISIS 2017: 537-546 - [c21]Wanyuan Jiang, Peng Li, He Xu, Huqing Nie:
Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network. CISIS 2017: 589-598 - [c20]Cong Qian, He Xu, Peng Li, Yizhuo Wang:
Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS. CISIS 2017: 599-608 - [c19]Jie Ding, He Xu, Peng Li, Runyu Xie:
Design and Implementation of Food Safety Traceability System Based on RFID Technology. CISIS 2017: 657-666 - [c18]Wei Liu, Weibei Fan, Peng Li, Liangde Li:
Survey of Big Data Platform Based on Cloud Computing Container Technology. CISIS 2017: 954-963 - [c17]Weiwei Shen, Han Wu, He Xu, Peng Li:
A New Middleware Architecture for RFID Data Management. EIDWT 2017: 212-221 - [c16]He Xu, Chengcheng Yuan, Peng Li, Yizhuo Wang:
Design and implementation of action recognition system based on RFID sensor. ICNC-FSKD 2017: 3021-3025 - [c15]Peng Li, Cheng Yang, He Xu, Ting Fung Lau, Ruchuan Wang:
User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment. PAAP 2017: 59-69 - [c14]Lu Dong, Peng Li, He Xu, Baozhou Luo, Yu Mi:
Performance Prediction of Spark Based on the Multiple Linear Regression Analysis. PAAP 2017: 70-81 - [c13]Huqing Nie, Peng Li, He Xu, Lu Dong, Jinquan Song, Ruchuan Wang:
Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment. PAAP 2017: 554-565 - [c12]He Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan Wang:
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks. SpaCCS Workshops 2017: 291-301 - 2016
- [c11]He Xu, Jie Ding, Peng Li, Wei Li:
A Review on Data Cleaning Technology for RFID Network. 3PGCIC 2016: 373-382 - [c10]He Xu, Weiwei Shen, Peng Li, Cong Qian:
An Efficient RFID Reader Network Planning Strategy Based on P2P Computing. 3PGCIC 2016: 383-390 - [c9]Peng Li, Wanyuan Jiang, He Xu, Wei Liu:
Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-B. 3PGCIC 2016: 391-404 - [c8]He Xu, Ye Ding, Peng Li, Ruchuan Wang:
A Novel Cloud Computing Architecture Oriented Internet of Vehicles. 3PGCIC 2016: 447-458 - [c7]Peng Li, Lu Dong, Haiping Huang, Sujun Hu, Ruchuan Wang:
Research on practice and incentive mechanism of flipped classroom based on small private online course. ICCSE 2016: 377-381 - [c6]Ye Ding, He Xu, Peng Li, Jie Ding:
Review of Virtual Memory Optimization in Cloud Environment. INCoS 2016: 53-58 - [c5]Jiewei Qian, He Xu, Peng Li:
A Novel Secure Architecture for the Internet of Things. INCoS 2016: 398-401 - 2015
- [j1]Peng Li, Chao Xu, Long Chen, Ruchuan Wang:
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy. Int. J. Distributed Sens. Networks 11: 146409:1-146409:9 (2015) - [c4]Xiaoyan Wang, Lu Dong, Chao Xu, Peng Li:
Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor Networks. PAAP 2015: 229-235 - [c3]Lingfeng Qiu, Wanyuan Jiang, Wei Zhang, Peng Li:
Wireless Injection Attacks Based on Fake Data Injection in TinyOS. PAAP 2015: 236-242 - 2013
- [c2]Peng Li, Ruchuan Wang, Xiao-yu Su, Long Chen:
Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things. CWSN 2013: 345-355 - 2012
- [c1]Peng Li, Ruchuan Wang, Yanting Zhou, Qiuyu Dai:
Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine. CWSN 2012: 181-190
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-14 17:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint