default search action
Xiyuan Peng
- > Home > Persons > Xiyuan Peng
Publications
- 2024
- [j62]Bowen Yao, Liansheng Liu, Yu Peng, Xiyuan Peng:
Intelligent Measurement on Edge Devices Using Hardware Memory-Aware Joint Compression Enabled Neural Networks. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - 2020
- [j47]Benkuan Wang, Datong Liu, Yu Peng, Xiyuan Peng:
Multivariate Regression-Based Fault Detection and Recovery of UAV Flight Data. IEEE Trans. Instrum. Meas. 69(6): 3527-3537 (2020) - 2019
- [j43]Jingyue Pang, Datong Liu, Yu Peng, Xiyuan Peng:
Collective Anomalies Detection for Sensing Series of Spacecraft Telemetry with the Fusion of Probability Prediction and Markov Chain Model. Sensors 19(3): 722 (2019) - [j40]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang, Neeraj Suri, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS. ACM Trans. Cyber Phys. Syst. 3(1): 2:1-2:25 (2019) - 2018
- [j33]Jingyue Pang, Datong Liu, Yu Peng, Xiyuan Peng:
Intelligent pattern analysis and anomaly detection of satellite telemetry series with improved time series representation. J. Intell. Fuzzy Syst. 34(6): 3785-3798 (2018) - [j28]Jingyue Pang, Datong Liu, Yu Peng, Xiyuan Peng:
Optimize the Coverage Probability of Prediction Interval for Anomaly Detection of Sensor-Based Monitoring Series. Sensors 18(4): 967 (2018) - 2017
- [j27]Datong Liu, Jingyue Pang, Ge Song, Wei Xie, Yu Peng, Xiyuan Peng:
Fragment Anomaly Detection With Prediction and Statistical Analysis for Satellite Telemetry. IEEE Access 5: 19269-19281 (2017) - [j22]Yujie Zhang, Datong Liu, Jinxiang Yu, Yu Peng, Xiyuan Peng:
EMA remaining useful life prediction with weighted bagging GPR algorithm. Microelectron. Reliab. 75: 253-263 (2017) - [j21]Qinghua Luo, Yu Peng, Junbao Li, Xiyuan Peng:
MWPCA-ICURD: density-based clustering method discovering specific shape original features. Neural Comput. Appl. 28(9): 2545-2556 (2017) - [j20]Qinghua Luo, Abraham Hang-Yat Lam, Dan Wang, Dawei Pan, Daniel Wai-Tin Chan, Yu Peng, Xiyuan Peng:
Asynchronous and Selective Transmission for DeWiring of Building Management Systems. IEEE Trans. Ind. Informatics 13(2): 821-831 (2017) - [c27]Xiuhai Cui, Yu Peng, Xiyuan Peng:
A Universal Test System Framework and Its Application on Satellite Test. ICCDA 2017: 283-288 - 2016
- [j17]Xiuyuan Chen, Xiyuan Peng, Yu Peng, Jun-Bao Li:
The Classification of Synthetic Aperture Radar Image Target Based on Deep Learning. J. Inf. Hiding Multim. Signal Process. 7(6): 1345-1353 (2016) - [j15]Xiuyuan Chen, Xiyuan Peng, Jun-Bao Li, Yu Peng:
Overview of Deep Kernel Learning Based Techniques and Applications. J. Netw. Intell. 1(3): 83-98 (2016) - [j12]Yeyong Pang, Shaojun Wang, Yu Peng, Xiyuan Peng, Nicholas J. Fraser, Philip Heng Wai Leong:
A Microcoded Kernel Recursive Least Squares Processor Using FPGA Technology. ACM Trans. Reconfigurable Technol. Syst. 10(1): 5:1-5:22 (2016) - 2015
- [j8]Datong Liu, Jianbao Zhou, Haitao Liao, Yu Peng, Xiyuan Peng:
A Health Indicator Extraction and Optimization Framework for Lithium-Ion Battery Degradation Modeling and Prognostics. IEEE Trans. Syst. Man Cybern. Syst. 45(6): 915-928 (2015) - [c21]Jingyue Pang, Datong Liu, Yu Peng, Xiyuan Peng:
Detecting continual anomalies in monitoring data stream based on sampling GPR algorithm. ICPHM 2015: 1-7 - 2014
- [j7]Zhifeng Gao, Xiyuan Peng, Yu Peng:
Adaptive DOA Estimation in MIMO Radar based on Canonical Correlation Analysis Method. J. Comput. 9(9): 2100-2106 (2014) - [j6]Yu Peng, Miao Lei, Jun-Bao Li, Xiyuan Peng:
A novel hybridization of echo state networks and multiplicative seasonal ARIMA model for mobile communication traffic series forecasting. Neural Comput. Appl. 24(3-4): 883-890 (2014) - [j5]Qinghua Luo, Yu Peng, Xiyuan Peng, Abdulmotaleb El-Saddik:
Uncertain Data Clustering-Based Distance Estimation in Wireless Sensor Networks. Sensors 14(4): 6584-6605 (2014) - [c20]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang, Neeraj Suri, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
WiP abstract: A framework on profiling cross-domain noise propagation in control CPS. ICCPS 2014: 224 - 2013
- [j2]Yi Yuan, Dawei Pan, Dan Wang, XiaoHua Xu, Yu Peng, Xiyuan Peng, Peng-Jun Wan:
A study towards applying thermal inertia for energy conservation in rooms. ACM Trans. Sens. Networks 10(1): 7:1-7:25 (2013) - [c17]Dawei Pan, Dan Wang, Jiannong Cao, Yu Peng, Xiyuan Peng:
Minimizing building electricity costs in a dynamic power market: algorithms and impact on energy conservation. e-Energy 2013: 265-266 - [c15]Jianbao Zhou, Datong Liu, Yu Peng, Xiyuan Peng:
An optimized Relevance Vector Machine with incremental learning strategy for lithium-ion battery remaining useful life estimation. I2MTC 2013: 561-565 - [c12]Dawei Pan, Dan Wang, Jiannong Cao, Yu Peng, Xiyuan Peng:
Minimizing Building Electricity Costs in a Dynamic Power Market: Algorithms and Impact on Energy Conservation. RTSS 2013: 107-117 - 2012
- [c11]Qinghua Luo, Abraham Hang-Yat Lam, Dan Wang, Daniel Wai-Tin Chan, Yu Peng, Xiyuan Peng:
Demo Abstract: Towards a Wireless Building Management System with Minimum Change to the Building Protocols. ICCPS 2012: 223 - [c10]Dawei Pan, Yi Yuan, Dan Wang, XiaoHua Xu, Yu Peng, Xiyuan Peng, Peng-Jun Wan:
Thermal Inertia: Towards an energy conservation room management system. INFOCOM 2012: 2606-2610 - 2011
- [c9]Shaojun Wang, Yu Peng, Guangquan Zhao, Xiyuan Peng:
Accelerating on-line training of LS-SVM with run-time reconfiguration. FPT 2011: 1-6 - [c8]Yu Peng, Qinghua Luo, Xiyuan Peng:
UCK-means : A customized K-means for clustering uncertain measurement data. FSKD 2011: 1196-1200 - [c7]Xiyuan Peng, Jia Guo, Miao Lei, Yu Peng:
Analog Circuit Fault Diagnosis with Echo State Networks Based on Corresponding Clusters. ISNN (1) 2011: 437-444 - [c6]Jianmin Wang, Yu Peng, Xiyuan Peng:
Anti Boundary Effect Wavelet Decomposition Echo State Networks. ISNN (1) 2011: 445-454 - 2009
- [c4]Yu Peng, Jianmin Wang, Xiyuan Peng:
Traffic Prediction with Reservoir Computing for Mobile Networks. ICNC (2) 2009: 464-468 - 2003
- [c1]Yu Peng, Xiyuan Peng, Shengwei Meng:
Virtual instrument parameter calibration with particle swarm optimization. SIS 2003: 42-45
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint