default search action
Zhenpeng Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Sitong Li, Yifan Liu, Fan Feng, Yi Liu, Xiaofei Li, Zhenpeng Liu:
HierFedPDP:Hierarchical federated learning with personalized differential privacy. J. Inf. Secur. Appl. 86: 103890 (2024) - [j16]Zhenpeng Liu, Jialiang Zhang, Yi Liu, Fan Feng, Yifan Liu:
Data aggregation algorithm for wireless sensor networks with different initial energy of nodes. PeerJ Comput. Sci. 10: e1932 (2024) - 2023
- [j15]Zhenpeng Liu, Lele Ren, Yongjiang Feng, Shuo Wang, Jianhang Wei:
Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain. IEEE Access 11: 59263-59273 (2023) - [j14]Zhenpeng Liu, Mingxiao Jiang, Shengcong Zhang, Jialiang Zhang, Yi Liu:
A Smart Contract Vulnerability Detection Mechanism Based on Deep Learning and Expert Rules. IEEE Access 11: 77990-77999 (2023) - [j13]Zhenpeng Liu, Shuo Wang, Yi Liu:
Blockchain-based integrity auditing for shared data in cloud storage with file prediction. Comput. Networks 236: 110040 (2023) - [j12]Zhenpeng Liu, Dewei Miao, Ruilin Li, Yi Liu, Xiaofei Li:
Cache-Based Privacy Protection Scheme for Continuous Location Query. Entropy 25(2): 201 (2023) - [j11]Zhenpeng Liu, Shengcong Zhang, Jialiang Zhang, Mingxiao Jiang, Yi Liu:
HeteEdgeWalk: A Heterogeneous Edge Memory Random Walk for Heterogeneous Information Network Embedding. Entropy 25(7): 998 (2023) - [j10]Zhenpeng Liu, Yihang Wang, Fan Feng, Yifan Liu, Zelin Li, Yawei Shan:
A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks. Sensors 23(13): 6176 (2023) - [j9]Zhenpeng Liu, Jingyi Wang, Zilin Gao, Jianhang Wei:
Privacy-preserving edge computing offloading scheme based on whale optimization algorithm. J. Supercomput. 79(3): 3005-3023 (2023) - 2022
- [j8]Zhenpeng Liu, Yongjiang Feng, Lele Ren, Weihua Zheng:
Data Integrity Audit Scheme Based on Blockchain Expansion Technology. IEEE Access 10: 55900-55907 (2022) - [j7]Zhenpeng Liu, Lele Ren, Ruilin Li, Qiannan Liu, Yonggang Zhao:
ID-based sanitizable signature data integrity auditing scheme with privacy-preserving. Comput. Secur. 121: 102858 (2022) - [j6]Zhenpeng Liu, Qiannan Liu, Dewei Miao, Lele Ren, Yonggang Zhao:
A blockchain anonymity solution to prevent location homogeneity attacks. Concurr. Comput. Pract. Exp. 34(27) (2022) - [j5]Zhenpeng Liu, Qiannan Liu, Jianhang Wei, Dewei Miao, Jingyi Wang:
Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache. Inf. 13(9): 417 (2022) - 2021
- [j4]Zhenpeng Liu, Yi Liu, Xianwei Yang, Xiaofei Li:
Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree. IEEE Access 9: 75117-75131 (2021) - [j3]Zhenpeng Liu, Xianwei Yang, Yi Liu, Yonggang Zhao, Xiaofei Li:
ImReMuDF: Redundant Mutants Identification Method Based on Definition and Reference of Variables. Sci. Program. 2021: 7543896:1-7543896:10 (2021) - 2020
- [j2]Huaitao Shi, Jin Guo, Xiaotian Bai, Lei Guo, Zhenpeng Liu, Jie Sun:
Gearbox Incipient Fault Detection Based on Deep Recursive Dynamic Principal Component Analysis. IEEE Access 8: 57646-57660 (2020) - [j1]Zhenpeng Liu, Jiahuan Lu, Nan Su, Bin Zhang, Xiaofei Li:
Location-Constrained Virtual Machine Placement (LCVP) Algorithm. Sci. Program. 2020: 8846087:1-8846087:8 (2020)
2010 – 2019
- 2019
- [c7]Zhenpeng Liu, Yupeng He, Wensheng Wang, Shuo Wang, Xiaofei Li, Bin Zhang:
AEH-MTD: Adaptive Moving Target Defense Scheme for SDN. SmartIoT 2019: 142-147 - [c6]Yifan Liu, Bo Zhao, Xiaofei Li, Shuo Wang, Bin Zhang, Zhenpeng Liu:
A Trust Chain Assessment Method Based on Blockchain for SDN Network Nodes. SmartIoT 2019: 240-245 - 2017
- [c5]Zhenpeng Liu, Xiaodan Liu, Yawei Dong, Xuan Zhao, Bin Zhang:
CTS-SOS: Cloud Task Scheduling Based on the Symbiotic Organisms Search. PAAP 2017: 82-94 - 2014
- [c4]Zhenpeng Liu, Xianchao Zhu, Shouhua Zhang:
Multi-authority Attribute Based Encryption with Attribute Revocation. CSE 2014: 1872-1876 - [c3]Zhenpeng Liu, Ding Guo, Xizhong Zhang, Xu Wang, Xianchao Zhu:
An Improved Semi-supervised K-Means Algorithm Based on Information Gain. CSE 2014: 1960-1963 - 2012
- [c2]Shouhua Zhang, Kaiyu Shang, Shuai Cong, Bin Zhang, Zhenpeng Liu:
WIPOMTS: An Internet Public Opinion Monitoring System. ICICA (1) 2012: 1-8
2000 – 2009
- 2007
- [c1]Zhenpeng Liu, Ailan Li, Dongfang Wang, Wansheng Tang:
A Computer Security Model of Imitated Nature Immune and Its FSM. LSMS (1) 2007: 523-532
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint