Yong Peng
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [j34]Zhi-Jie Wang, Xiao Lin, Mei-e Fang, Bin Yao, Yong Peng, Haibing Guan, Minyi Guo:
Re2l: An efficient output-sensitive algorithm for computing Boolean operations on circular-arc polygons and its applications. Computer-Aided Design 83: 1-14 (2017) - [j33]Yu Feng, Yong Peng, Ningbo Cui, Daozhi Gong, Kuandi Zhang:
Modeling reference evapotranspiration using extreme learning machine and generalized regression neural network only with temperature data. Computers and Electronics in Agriculture 136: 71-78 (2017) - [j32]Quanjun Yin, Long Qin, Yong Peng, Wei Duan:
Learning real-time search on c-space GVDs. Frontiers Comput. Sci. 11(6): 1036-1049 (2017) - [j31]Yong Peng, Bao-Liang Lu:
Discriminative extreme learning machine with supervised sparsity preserving for image classification. Neurocomputing 261: 242-252 (2017) - [j30]Yong Peng, Wanzeng Kong, Bing Yang:
Orthogonal extreme learning machine for image classification. Neurocomputing 266: 458-464 (2017) - [j29]He Tang, Yong Peng, Xiang Lu, Albert Z. Wang, Hai Wang:
A quantitative design methodology for high-speed interpolation/averaging ADCs. Integration 58: 215-224 (2017) - [j28]Yong Peng, Bao-Liang Lu:
Robust structured sparse representation via half-quadratic optimization for face recognition. Multimedia Tools Appl. 76(6): 8859-8880 (2017) - [c66]Wanzeng Kong, Qiaonan Fan, Luyun Wang, Bei Jiang, Yong Peng, Yanbin Zhang:
Task-Free Brainprint Recognition Based on Degree of Brain Networks. ICONIP (2) 2017: 709-717 - [c65]Shun Guo, Qi Zhou, Peng Xu, Qiong Gao, Tianyuan Luo, Yong Peng, Jian Kong, Kehong Wang, Jun Zhu:
Study on Lightweight Design and Connection of Dissimilar Metals of Titanium Alloy TC4/T2 Copper/304 Stainless Steel. LSMS/ICSEE (3) 2017: 229-237 - [c64]Hongyu Sun, Jun Zhu, Shun Guo, Yong Peng, Qi Zhou, Jun Huang, Yushan Chen:
Analysis on Al-Cu Dissimilar Materials Friction Stir Welding Butt Joint Based on J Integral Model. LSMS/ICSEE (2) 2017: 695-704 - [c63]Faqiang Liu, Xin Chen, Wei An, Yong Peng, Jiuyue Cao, Yan Zhang:
Multiple service function chaining under load balance in SDN/NFV networks. PIMRC 2017: 1-6 - [c62]Faqiang Liu, Xin Chen, Wei An, Yong Peng, Jiuyue Cao, Yan Zhang:
Minimizing transmission cost for multiple service function chains in SDN/NFV networks. PIMRC 2017: 1-6 - 2016
- [j27]Yong Peng, Wei-Long Zheng, Bao-Liang Lu:
An unsupervised discriminative extreme learning machine and its applications to data clustering. Neurocomputing 174: 250-264 (2016) - [j26]Yong Peng, Bao-Liang Lu:
Discriminative manifold extreme learning machine and applications to image and EEG signal classification. Neurocomputing 174: 265-277 (2016) - [j25]Xianzhong Long, Hongtao Lu, Yong Peng, Xianzhong Wang, Shaokun Feng:
Image classification based on improved VLAD. Multimedia Tools Appl. 75(10): 5533-5555 (2016) - [j24]Yong Peng, Mei Yang, Quanjun Yin, Yabing Zha:
An accurate interest matching algorithm based on prediction of the space-time intersection of regions for the distributed virtual environment. Simulation Modelling Practice and Theory 68: 54-79 (2016) - [c61]
- [c60]
- [c59]Yuangang Yao, Lei Zhang, Jin Yi, Yong Peng, Weihua Hu, Lei Shi:
A Framework for Big Data Security Analysis and the Semantic Technology. ICITCS 2016: 1-4 - 2015
- [j23]Yong Peng, Suhang Wang, Xianzhong Long, Bao-Liang Lu:
Discriminative graph regularized extreme learning machine and its application to face recognition. Neurocomputing 149: 340-353 (2015) - [j22]
- [j21]Xiaocheng Liu, Yabing Zha, Quanjun Yin, Yong Peng, Long Qin:
Scheduling parallel jobs with tentative runs and consolidation in the cloud. Journal of Systems and Software 104: 141-151 (2015) - [j20]Yong Peng, Bao-Liang Lu, Suhang Wang:
Enhanced low-rank representation via sparse manifold adaption for semi-supervised learning. Neural Networks 65: 1-17 (2015) - [j19]Yong Peng, Xianzhong Long, Bao-Liang Lu:
Graph Based Semi-Supervised Learning via Structure Preserving Low-Rank Representation. Neural Processing Letters 41(3): 389-406 (2015) - [c58]Yong Peng, Bao-Liang Lu:
Robust group sparse representation via half-quadratic optimization for face recognition. CCECE 2015: 146-151 - [c57]Yong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren:
Industrial Control System Fingerprinting and Anomaly Detection. Critical Infrastructure Protection 2015: 73-85 - [c56]Yong Peng, Yu Wang, Chong Xiang, Xifeng Liu, Zhe Wen, Dongqing Chen, Chaojun Zhang:
Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment. IIH-MSP 2015: 322-326 - [c55]Xianghui Zhao, Yong Peng, Zan Zhai, Yi Jin, Yuangang Yao:
Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining. IIH-MSP 2015: 327-332 - [c54]Haihui Gao, Yong Peng, Kebin Jia, Zhe Wen, Hanjing Li:
Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network. IIH-MSP 2015: 337-340 - [c53]Lei Zhang, Yong Peng, Jie Liang, Xifeng Liu, Jin Yi, Zhe Wen:
An Improved String Matching Algorithm for HTTP Data Reduction. IIH-MSP 2015: 345-348 - [i4]Chong Xiang, Li Yang, Yong Peng, Dongqing Chen:
The Classification of Quantum Symmetric-Key Encryption Protocols. CoRR abs/1501.04896 (2015) - 2014
- [j18]Tianbo Lu, Xiaobo Guo, Yang Li, Yong Peng, Xiaoyan Zhang, Feng Xie, Yang Gao:
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks. IJDSN 10 (2014) - [j17]Yong Peng, Li Di:
Clustering Method Study on High-Dimensional Trading Data. Journal of Multimedia 9(3): 340-347 (2014) - [j16]Xianzhong Long, Hongtao Lu, Yong Peng, Wenbin Li:
Graph regularized discriminative non-negative matrix factorization for face recognition. Multimedia Tools Appl. 72(3): 2679-2699 (2014) - [c52]Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han:
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges. CISIM 2014: 624-635 - [c51]Yong Peng, Jia-Yi Zhu, Wei-Long Zheng, Bao-Liang Lu:
EEG-based emotion recognition with manifold regularized extreme learning machine. EMBC 2014: 974-977 - [c50]Wei-Long Zheng, Jia-Yi Zhu, Yong Peng, Bao-Liang Lu:
EEG-based emotion classification using deep belief networks. ICME 2014: 1-6 - [c49]Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, Hanjing Li:
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation. Critical Infrastructure Protection 2014: 79-91 - [c48]Haihui Gao, Zhonghua Dai, Yong Peng, Huikang Lu:
Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering. IIH-MSP 2014: 524-527 - [c47]Zhonghua Dai, Haihui Gao, Yong Peng, Huikang Lu:
A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network. IIH-MSP 2014: 532-536 - [c46]Haihui Gao, Yong Peng, Zhonghua Dai, Hanjing Li:
Techniques and Research Trends of Network Testbed. IIH-MSP 2014: 537-541 - [c45]Jia-Yi Zhu, Wei-Long Zheng, Yong Peng, Ruo-Nan Duan, Bao-Liang Lu:
EEG-based emotion recognition using discriminative graph regularized extreme learning machine. IJCNN 2014: 525-532 - [c44]Yingying Jiao, Yong Peng, Bao-Liang Lu, Xiaoping Chen, Shanguang Chen, Chunhui Wang:
Recognizing slow eye movement for driver fatigue detection with machine learning approach. IJCNN 2014: 4035-4041 - 2013
- [j15]Yong Peng, Bao-Liang Lu:
A hierarchical particle swarm optimizer with latin sampling based memetic algorithm for numerical optimization. Appl. Soft Comput. 13(5): 2823-2836 (2013) - [j14]Tao Li, Qian-Zhong Li, Shuai Liu, Guo-Liang Fan, Yongchun Zuo, Yong Peng:
PreDNA: accurate prediction of DNA-binding sites in proteins by integrating sequence and geometric structure information. Bioinformatics 29(6): 678-685 (2013) - [j13]Ting Han, Shoushan Luo, Hongliang Zhu, Yang Xin, Yong Peng:
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks. JCP 8(11): 2743-2749 (2013) - [c43]He Tang, Yong Peng, Xiang Lu, Hai Wang, Albert Z. Wang:
Quantitative analysis for high speed interpolated/averaging ADC. ASICON 2013: 1-4 - [c42]Shengwei Yi, Jize Xu, Yong Peng, Qi Xiong, Ting Wang, Shilong Ma:
Mining Frequent Rooted Ordered Tree Generators Efficiently. CyberC 2013: 132-139 - [c41]Yong Peng, Suhang Wang, Shen Wang, Bao-Liang Lu:
Structure Preserving Low-Rank Representation for Semi-supervised Face Recognition. ICONIP (2) 2013: 148-155 - [c40]Yong Peng, Shen Wang, Bao-Liang Lu:
Marginalized Denoising Autoencoder via Graph Regularization for Domain Adaptation. ICONIP (2) 2013: 156-163 - [c39]Haihui Gao, Yong Peng, Kebin Jia, Zhonghua Dai, Ting Wang:
The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed). IIH-MSP 2013: 420-423 - [c38]Ting Wang, Qi Xiong, Haihui Gao, Yong Peng, Zhonghua Dai, Shengwei Yi:
Design and Implementation of Fuzzing Technology for OPC Protocol. IIH-MSP 2013: 424-428 - [c37]Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao:
Security Analysis on Cyber-physical System Using Attack Tree. IIH-MSP 2013: 429-432 - [c36]Wei Zhao, Feng Xie, Yong Peng, Yang Gao, Xuefeng Han, Haihui Gao, Dejin Wang:
Security Testing Methods and Techniques of Industrial Control Devices. IIH-MSP 2013: 433-436 - [c35]Fangfang Wang, Huazhong Wang, Dongqing Chen, Yong Peng:
Substation Communication Security Research Based on Hybrid Encryption of DES and RSA. IIH-MSP 2013: 437-441 - [c34]Yong Peng, Tianbo Lu, Jingli Liu, Yang Gao, Xiaobo Guo, Feng Xie:
Cyber-physical System Risk Assessment. IIH-MSP 2013: 442-447 - [c33]Tianbo Lu, Xiaobo Guo, Bing Xu, Lingling Zhao, Yong Peng, Hongyu Yang:
Next Big Thing in Big Data: The Security of the ICT Supply Chain. SocialCom 2013: 1066-1073 - 2012
- [j12]Huifeng Sun, Junliang Chen, Gang Yu, Chuanchang Liu, Yong Peng, Guang Chen, Bo Cheng:
JacUOD: A New Similarity Measurement for Collaborative Filtering. J. Comput. Sci. Technol. 27(6): 1252-1260 (2012) - [c32]Feng Xie, Tianbo Lu, Bing Xu, Dongqing Chen, Yong Peng:
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management. APSCC 2012: 43-49 - [c31]Feng Xie, Yong Peng, Wei Zhao, Dongqing Chen, Xiaoran Wang, Xingmei Huo:
A risk management framework for cloud computing. CCIS 2012: 476-480 - [c30]Haihui Gao, Yong Peng, Qingtang Zheng, Xi Chen, Zhonghua Dai, Yang Gao, Feng Xie, Wei Zhao, Qi Xiong:
The research and implementation of intelligent mobile video supervising system based on DSP. CCIS 2012: 657-660 - [c29]Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu:
Stability analysis of software networks. CCIS 2012: 681-684 - [c28]Yong Peng, Caroline Deck, Jikuang Yang, Rémy Willinger:
Modeling and Validation of Windscreen Laminated Glass Behavior during Fracture. ICDMA 2012: 541-544 - [c27]Haihui Gao, Yong Peng, Zhonghua Dai, Feng Xie:
A New Detection Algorithm of Moving Objects Based on Human Morphology. IIH-MSP 2012: 411-414 - [c26]Zhonghua Dai, Qi Xiong, Yong Peng, Haihui Gao:
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network. IIH-MSP 2012: 415-419 - [c25]Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai, Haihui Gao, Yang Gao:
Designated Verifier Signature Scheme over Circulant Matrices. IIH-MSP 2012: 420-423 - [c24]Yong Peng, Bao-Liang Lu:
Immune clonal algorithm based feature selection for epileptic EEG signal classification. ISSPA 2012: 848-853 - [c23]Jing Zhang, Yingchao Zhang, Qin Zhang Yu, Chuan fang Guan, Wei Li, Yong Peng:
Design and realization of the simulation component-based parallel framework for HLA Federate. SoSE 2012: 321-326 - 2011
- [j11]Yong Peng, Youakim Badr, Frédérique Biennier:
A pervasive environment for systemising innovative services in knowledge-intensive firms. IJEB 9(5/6): 429-453 (2011) - [j10]Yong Peng:
An Improved Artificial Fish Swarm Algorithm for Optimal Operation of Cascade Reservoirs. JCP 6(4): 740-746 (2011) - [j9]Huifeng Sun, Yong Peng, Junliang Chen, Chuanchang Liu, Yuzhuo Sun:
A New Similarity Measure Based on Adjusted Euclidean Distance for Memory-based Collaborative Filtering. JSW 6(6): 993-1000 (2011) - [c22]Yong Peng, Yunhui Wu, Yulin Yang, Runan Huang, Changqi Wu, Xiaowen Qi, Zhe Liu, Bin Jiang, Yingjie Liu:
Study on the control of biological behavior on carp induced by electrophysiological stimulation in the corpus cerebelli. EMEIT 2011: 502-505 - [c21]Zhengyong Duan, Yong Peng, Heng Wu:
Optimization and Control Researches into the Cooling System of Pneumatic Disc Brake. ICAIC (2) 2011: 644-652 - [c20]Yong Peng, Chongjie Dong, Huijun Zheng:
Research on Genetic Algorithm Based on Pyramid Model. IPTC 2011: 83-86 - 2010
- [j8]Yong Peng, Dinesh Rajan:
Half-duplex gaussian interference channel with transmitter and receiver cooperation. IEEE Communications Letters 14(5): 372-374 (2010) - [j7]Yong Peng, Dinesh Rajan:
Capacity Bounds for a Cognitive MIMO Gaussian Z-Interference Channel. IEEE Trans. Vehicular Technology 59(4): 1865-1876 (2010) - [c19]Bin He, Yanhui Liang, Yong Peng, Yufeng Lu:
Fuzzy optimization based comprehensive assessment on the best utilization order of multi-water sources in Dalian. FSKD 2010: 879-883 - [c18]Yong Peng, Guoli Wang, Bin He:
Optimal operation of cascade reservoirs based on generalized ant colony optimization method. ICNC 2010: 2647-2651 - [c17]Yong Peng, Youakim Badr, Frédérique Biennier:
A Dynamic Representation Model for Service Systems. ICSS 2010: 335-340 - [c16]Chunlong Shen, Miping Zhang, Kehong Wang, Yong Peng, Jianhua Xu:
Contour Map Plotting Algorithm for Evaluating Characteristics of Transient Electron Beam. ICSI (2) 2010: 221-228 - [c15]Youakim Badr, Yong Peng, Frédérique Biennier:
Digital Ecosystems for Business e-Services in Knowledge-Intensive Firms. BSME 2010: 16-31
2000 – 2009
- 2009
- [j6]Xiaojun Ye, Zhiwu Zhu, Yong Peng, Feng Xie:
Privacy Aware Engineering: A Case Study. JSW 4(3): 218-225 (2009) - [c14]Yong Peng, Chunguang Peng, Jian Huang, Kedi Huang:
An Ontology-Driven Paradigm for Component Representation and Retrieval. CIT (2) 2009: 187-192 - [c13]Yawei Zhang, Xiaojun Ye, Feng Xie, Yong Peng:
A Practical Database Intrusion Detection System Framework. CIT (1) 2009: 342-347 - [c12]Yong Peng, Guo-hua Liang:
A Fuzzy Optimization Neural Network Model Using Second Order Information. FSKD (4) 2009: 221-227 - [c11]Yong Peng, Dinesh Rajan:
Achievable Rate of Gaussian Cognitive Z-Interference Channel with Partial Side Information. GLOBECOM 2009: 1-5 - [c10]Yong Peng, Dinesh Rajan:
Capacity bounds of half-duplex gaussian cooperative interference channel. ISIT 2009: 2081-2085 - [c9]Yong Peng, Youakim Badr, Frédérique Biennier:
A generic service system for knowledge-intensive service firms. MEDES 2009: 422-426 - [i3]Yong Peng, Dinesh Rajan:
Capacity Bounds of Half-Duplex Gaussian Cooperative Interference Channel. CoRR abs/0901.2606 (2009) - [i2]Yong Peng, Dinesh Rajan:
Noisy DPC and Application to a Cognitive Channel. CoRR abs/0901.2934 (2009) - 2008
- [j5]Yong Peng, Kaushik Josiam, Dinesh Rajan:
Diversity Multiplexing Tradeoff in MIMO Frequency Selective Channels with Partial CSIT. IEEE Communications Letters 12(6): 408-410 (2008) - [i1]Yong Peng, Dinesh Rajan:
On the Capacity Equivalence with Side Information at Transmitter and Receiver. CoRR abs/0806.2643 (2008) - 2006
- [j4]Yong Peng, Shengshan Cui, Roy You:
Optimal pilot-to-data power ratio for diversity combining with imperfect channel estimation. IEEE Communications Letters 10(2): 97-99 (2006) - [c8]Chuanchang Liu, Yong Peng, Junliang Chen:
Web Services Description Ontology-Based Service Discovery Model. Web Intelligence 2006: 633-636 - [c7]Meng Xu, Junliang Chen, Yong Peng, Xiang Mei, Chuanchang Liu:
A Dynamic Semantic Association-Based Web Service Composition Method. Web Intelligence 2006: 666-672 - 2005
- [j3]Yong Peng, Shiduan Cheng, Junliang Chen:
RSAD: A Robust Distributed Contention-Based Adaptive Mechanism for IEEE 802.11 Wireless LANs. J. Comput. Sci. Technol. 20(2): 282-288 (2005) - 2004
- [j2]Yong Peng, Shiduan Cheng:
Performance Enhancement and Bandwidth Guarantee in IEEE 802.11 Wireless LANs. J. Comput. Sci. Technol. 19(2): 150-157 (2004) - 2003
- [j1]Haitao Wu, Yu Lin, Shiduan Cheng, Yong Peng, Keping Long:
IEEE 802.11 Distributed Coordination Function: Enhancement and Analysis. J. Comput. Sci. Technol. 18(5): 607-614 (2003) - [c6]Yong Peng, Shiduan Cheng, Yu Lin:
Design of a robust self-adapt DCF-based protocol. GLOBECOM 2003: 200-204 - [c5]Yu Lin, Geng-Sheng Kuo, Haitao Wu, Yong Peng, Shiduan Cheng:
MBTFRC: a TFRC enhancement for heterogeneous mobile networks. GLOBECOM 2003: 2880-2884 - [c4]Chonggang Wang, Bo Li, Kazem Sohraby, Yong Peng:
AFRED: An Adaptive Fuzzy-based Control Algorithm for Active Queue Management. LCN 2003: 12-20 - 2002
- [c3]Yong Peng, Haitao Wu, Shiduan Cheng, Keping Long:
A new self-adapt DCF algorithm. GLOBECOM 2002: 87-91 - [c2]Haitao Wu, Shiduan Cheng, Yong Peng, Keping Long, Jian Ma:
IEEE 802.11 distributed coordination function (DCF): analysis and enhancement. ICC 2002: 605-609 - [c1]Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, Jian Ma:
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement. INFOCOM 2002: 599-607
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-03-12 21:08 CET by the dblp team