default search action
Lisha Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jinghua Zhang, Lisha Peng, Shuzhi Wen, Songling Huang:
A Review on Concrete Structural Properties and Damage Evolution Monitoring Techniques. Sensors 24(2): 620 (2024) - [j13]Yufan Xue, Yuxiang Sun, Jiawei Zhou, Lisha Peng, Xianzhong Zhou:
Multiattribute Decision-Making in Wargames Leveraging the Entropy-Weight Method in Conjunction With Deep Reinforcement Learning. IEEE Trans. Games 16(1): 151-161 (2024) - [j12]Xiaohu Liu, Kang Ma, Jian Liu, Wei Zhao, Lisha Peng, Songling Huang, Shisong Li:
A Self-Healing Magnetic-Array-Type Current Sensor With Data-Driven Identification of Abnormal Magnetic Measurement Units. IEEE Trans. Instrum. Meas. 73: 1-12 (2024) - [j11]Hongyu Sun, Qibo Feng, Jiakun Li, Fajia Zheng, Lisha Peng, Shisong Li, Songling Huang, Yufei Xibei:
Rail Web Buried Defect Location and Quantification Methods in Hybrid High-Order Guided Wave Detection. IEEE Trans. Instrum. Meas. 73: 1-12 (2024) - [j10]Hongyu Sun, Jun Tu, Qibo Feng, Songling Huang, Lisha Peng, Qixin He, Jiakun Li, Shisong Li:
A High-Precision Defect Quantification Method Using a Unilateral Oblique Focusing Guided Wave EMAT and a Theory-Informed Explainable Progressive Residual Deep Convolutional Network. IEEE Trans. Instrum. Meas. 73: 1-9 (2024) - 2023
- [c14]Hongyu Sun, Songling Huang, Lisha Peng, Shisong Li, Fajia Zheng, Qibo Feng:
Quantification Method of Rail Web Buried Defect using Hybrid High-Order Guided Waves. I2MTC 2023: 1-5 - 2022
- [j9]Lisha Peng, Xianzhong Zhou, Junjie Zhao, Yuxiang Sun, Huaxiong Li:
Three-way multi-attribute decision making under incomplete mixed environments using probabilistic similarity. Inf. Sci. 614: 432-463 (2022) - [j8]Hongyu Sun, Lisha Peng, Songling Huang, Shisong Li, Yue Long, Shen Wang, Wei Zhao:
Development of a Physics-Informed Doubly Fed Cross-Residual Deep Neural Network for High-Precision Magnetic Flux Leakage Defect Size Estimation. IEEE Trans. Ind. Informatics 18(3): 1629-1640 (2022) - [j7]Hongyu Sun, Lisha Peng, Junming Lin, Shen Wang, Wei Zhao, Songling Huang:
Microcrack Defect Quantification Using a Focusing High-Order SH Guided Wave EMAT: The Physics-Informed Deep Neural Network GuwNet. IEEE Trans. Ind. Informatics 18(5): 3235-3247 (2022) - 2021
- [j6]Songling Huang, Hongyu Sun, Lisha Peng, Shen Wang, Qing Wang, Wei Zhao:
Defect Detection and Identification of Point-Focusing Shear-Horizontal EMAT for Plate Inspection. IEEE Trans. Instrum. Meas. 70: 1-9 (2021) - [j5]Yue Long, Songling Huang, Lisha Peng, Shen Wang, Wei Zhao:
A Characteristic Approximation Approach to Defect Opening Profile Recognition in Magnetic Flux Leakage Detection. IEEE Trans. Instrum. Meas. 70: 1-12 (2021) - [j4]Lisha Peng, Songling Huang, Shen Wang, Wei Zhao:
A Simplified Lift-Off Correction for Three Components of the Magnetic Flux Leakage Signal for Defect Detection. IEEE Trans. Instrum. Meas. 70: 1-9 (2021) - [j3]Hongyu Sun, Lisha Peng, Shen Wang, Songling Huang, Kaifeng Qu:
Development of Frequency-Mixed Point-Focusing Shear Horizontal Guided-Wave EMAT for Defect Inspection Using Deep Neural Network. IEEE Trans. Instrum. Meas. 70: 1-14 (2021) - [j2]Hongyu Sun, Lisha Peng, Shen Wang, Qing Wang, Wei Zhao, Songling Huang:
Effective Focal Area Dimension Optimization of Shear Horizontal Point-Focusing EMAT Using Orthogonal Test Method. IEEE Trans. Instrum. Meas. 70: 1-8 (2021) - [c13]Yue Long, Songling Huang, Lisha Peng, Wenzhi Wang, Shen Wang, Wei Zhao:
Internal and External Defects Discrimination of Pipelines Using Composite Magnetic Flux Leakage Detection. I2MTC 2021: 1-6 - [c12]Lisha Peng, Songling Huang, Shen Wang, Wei Zhao:
High Precision Identification Method of Fan Main Shaft Defects Based on Rotating Magnetic Field Detection. I2MTC 2021: 1-6 - [c11]Wenzhi Wang, Songling Huang, Lisha Peng, Yue Long, Shen Wang, Wei Zhao:
An Improved MFL Method Fusing Multi-Space Magnetic Field Information for The Surface Defect Inspecting. I2MTC 2021: 1-6 - [c10]Lisha Peng, Tao Zhang, Xiaoyu Zhang, Xianzhong Zhou:
Threat Assessment for Aerial Targets Based on Three-way Multi-criteria Decision Making. ICNSC 2021: 1-6 - [c9]Hongyu Sun, Songling Huang, Shen Wang, Wei Zhao, Lisha Peng:
Quantification of Defects with Point-Focusing Shear Horizontal Guided Wave EMAT Using Deep Residual Network. INDIN 2021: 1-6 - 2020
- [c8]Yue Long, Songling Huang, Lisha Peng, Shen Wang, Wei Zhao:
A New Dual Magnetic Sensor Probe for Lift-off Compensation in Magnetic Flux Leakage Detection. I2MTC 2020: 1-6 - [c7]Lisha Peng, Songling Huang, Shen Wang, Wei Zhao:
An Element-Combination Method for Arbitrary Defect Reconstruction from MFL Signals. I2MTC 2020: 1-6 - [c6]Wenzhi Wang, Songling Huang, Lisha Peng, Shen Wang, Wei Zhao:
Identifying Surface Defect Opening Profiles Based on the Uniform Magnetic Field Distortion. I2MTC 2020: 1-6 - [c5]Lisha Peng, Songling Huang, Shen Wang, Wei Zhao:
Data Recovery Method for MLF Signals Based on Sinc Fucntion for Oil & Gas Pipeline. IEEE SENSORS 2020: 1-4 - [c4]Hongyu Sun, Lisha Peng, Songling Huang, Shen Wang, Qing Wang, Wei Zhao:
Mode Identification of Denoised SH Guided Waves Using Variational Mode Decomposition Method. IEEE SENSORS 2020: 1-3
2010 – 2019
- 2019
- [j1]Songling Huang, Lisha Peng, Qing Wang, Shen Wang, Wei Zhao:
An Opening Profile Recognition Method for Magnetic Flux Leakage Signals of Defect. IEEE Trans. Instrum. Meas. 68(6): 2229-2236 (2019) - [c3]Lisha Peng, Songling Huang, Shen Wang, Wei Zhao:
A 3-D Pseudo Magnetic Flux Leakage (PMFL) Signal Processing Technique for Defect Imaging. I2MTC 2019: 1-5 - 2018
- [c2]Lisha Peng, Wenbin Qian, Yinglong Wang, Wenhao Shu:
A Three-Way Decisions Approach for Computing Approximations in Continuous Data. FSDM 2018: 374-380 - [c1]Lisha Peng, Songling Huang, Shen Wang, Wei Zhao:
A lift-off revision method for magnetic flux leakage measurement signal. I2MTC 2018: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint