Haipeng Peng

Orcid: 0000-0003-4415-0126

According to our database1, Haipeng Peng authored at least 132 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
An optimal bound for factoring unbalanced RSA moduli by solving Generalized Implicit Factorization Problem.
J. Supercomput., January, 2025

2024
MVC-RSN: A Malware Classification Method With Variant Identification Ability.
IEEE Internet Things J., November, 2024

An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption.
IEEE Trans. Intell. Transp. Syst., October, 2024

CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.
Sensors, July, 2024

A Novel Memristors Based Echo State Network Model Inspired by the Brain's Uni-hemispheric Slow-Wave Sleep Characteristics.
Cogn. Comput., July, 2024

A Survey of Security Protection Methods for Deep Learning Model.
IEEE Trans. Artif. Intell., April, 2024

Flexible Visually Meaningful Image Transmission Scheme in WSNs Using Fourier Optical Speckle-Based Compressive Sensing.
IEEE Internet Things J., April, 2024

Multitiered Reversible Data Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking.
IEEE Internet Things J., April, 2024

A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT.
IEEE Internet Things J., April, 2024

Graph Attention Network and Informer for Multivariate Time Series Anomaly Detection.
Sensors, March, 2024

Multilevel Privacy Protection for Social Media Based on 2-D Compressive Sensing.
IEEE Internet Things J., February, 2024

Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation.
IEEE Trans. Multim., 2024

Sequence prediction with different dimensions based on two novel deep echo state network models.
Trans. Inst. Meas. Control, 2024

Redactable Blockchain Based on Decentralized Trapdoor Verifiable Delay Functions.
IEEE Trans. Inf. Forensics Secur., 2024

A multi-level privacy-preserving scheme for extracting traffic images.
Signal Process., 2024

High-capacity medical information hiding scheme with P-tensor product secret image sharing for wireless body area networks.
Digit. Signal Process., 2024

Fishers Harvest Parallel Unlearning in Inherited Model Networks.
CoRR, 2024

Decentralized Federated Unlearning on Blockchain.
CoRR, 2024

Unsupervised Microservice Log Anomaly Detection Method Based on Graph Neural Network.
Proceedings of the Advances in Swarm Intelligence, 2024

2023
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation.
J. Syst. Archit., October, 2023

Strongly Synchronized Redactable Blockchain Based on Verifiable Delay Functions.
IEEE Internet Things J., October, 2023

A controllable delegation scheme for the subscription to multimedia platforms.
Inf. Sci., September, 2023

ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT.
IEEE Internet Things J., September, 2023

A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme.
J. Inf. Secur. Appl., June, 2023

Incorporating retrieval-based method for feature enhanced image captioning.
Appl. Intell., April, 2023

An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage.
J. Syst. Archit., March, 2023

Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function.
IEEE Internet Things J., March, 2023

A Chaotic Compressed Sensing-Based Multigroup Secret Image Sharing Method for IoT With Critical Information Concealment Function.
IEEE Internet Things J., January, 2023

Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences.
IEEE Trans. Serv. Comput., 2023

Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control.
IEEE Trans. Netw. Sci. Eng., 2023

One-Class Adversarial Fraud Detection Nets With Class Specific Representations.
IEEE Trans. Netw. Sci. Eng., 2023

Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Intrusion Detection Method Based on Complementary Adversarial Generation Network.
Proceedings of the Advances in Swarm Intelligence - 14th International Conference, 2023

Improved One-class Learning for Voice Spoofing Detection.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks.
IEEE Trans. Cloud Comput., 2022

Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing.
Signal Process., 2022

A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs.
Sensors, 2022

Construction of Structured Random Measurement Matrices in Semi-Tensor Product Compressed Sensing Based on Combinatorial Designs.
Sensors, 2022

An efficient secure data transmission and node authentication scheme for wireless sensing networks.
J. Syst. Archit., 2022

Aligned visual semantic scene graph for image captioning.
Displays, 2022

Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs.
Appl. Math. Comput., 2022

A Novel Intelligent Ant Colony System Based on Blockchain.
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022

CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data.
Proceedings of the Data Mining and Big Data - 7th International Conference, 2022

2021
Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry.
IEEE Trans. Inf. Theory, 2021

Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021

Flexible construction of compressed sensing matrices with low storage space and low coherence.
Signal Process., 2021

How does rumor spreading affect people inside and outside an institution.
Inf. Sci., 2021

Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021

Chaotic Deep Network for Mobile D2D Communication.
IEEE Internet Things J., 2021

Impact of Sudden Global Events on Cross-Field Research Cooperation.
Inf., 2021

Achieving flatness: Graph labeling can generate graphical honeywords.
Comput. Secur., 2021

High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network.
Sensors, 2020

A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks.
Neural Networks, 2020

Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System.
IEEE Internet Things J., 2020

Propagation analysis and prediction of the COVID-19.
CoRR, 2020

An effective algorithm for the spark of sparse binary measurement matrices.
Appl. Math. Comput., 2020

Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays.
IEEE Access, 2020

Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays.
IEEE Access, 2020

Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control.
IEEE Access, 2020

A Review of Face Recognition Technology.
IEEE Access, 2020

An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

2019
Pinning Synchronization of Coupled Memristive Recurrent Neural Networks with Mixed Time-Varying Delays and Perturbations.
Neural Process. Lett., 2019

Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019

Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Comput. Appl., 2019

P-Tensor Product in Compressed Sensing.
IEEE Internet Things J., 2019

Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet Things J., 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

General decay synchronization of complex multi-links time-varying dynamic network.
Commun. Nonlinear Sci. Numer. Simul., 2019

An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm.
IEEE Access, 2019

Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019

2018
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multim., 2018

Dynamic multi-swarm differential learning particle swarm optimizer.
Swarm Evol. Comput., 2018

General Theory of security and a study of hacker's behavior in big data era.
Peer-to-Peer Netw. Appl., 2018

Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation.
Neural Process. Lett., 2018

Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Process. Lett., 2018

Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018

A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Comput. Appl., 2018

Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Frankl. Inst., 2018

Image captioning with triple-attention and stack parallel LSTM.
Neurocomputing, 2018

Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018

Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks.
Commun. Nonlinear Sci. Numer. Simul., 2018

Adaptive synchronization of memristor-based BAM neural networks with mixed delays.
Appl. Math. Comput., 2018

Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018

Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays.
IEEE Access, 2018

An Efficient and Secure Transmission Model Based on Compressive Sensing.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017

Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multim. Tools Appl., 2017

Homomorphic Signatures from Chameleon Hash Functions.
Inf. Technol. Control., 2017

General Theory of Security and a Study Case in Internet of Things.
IEEE Internet Things J., 2017

Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017

Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017

Finite-time synchronization of memristor-based neural networks with mixed delays.
Neurocomputing, 2017

Particle swarm optimizer with two differential mutation.
Appl. Soft Comput., 2017

Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016

Short lattice signatures with constant-size public keys.
Secur. Commun. Networks, 2016

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Secur. Commun. Networks, 2016

Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Secur. Commun. Networks, 2016

A secure and efficient mutual authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2016

Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Process. Lett., 2016

Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Process. Lett., 2016

Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Process. Lett., 2016

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model.
KSII Trans. Internet Inf. Syst., 2016

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
KSII Trans. Internet Inf. Syst., 2016

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Inf. Technol. Control., 2016

Semi-tensor compressed sensing.
Digit. Signal Process., 2016

2015
A biometrics and smart cards-based authentication scheme for multi-server environments.
Secur. Commun. Networks, 2015

Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Process. Lett., 2015

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Syst., 2015

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2015

A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
Inf. Technol. Control., 2015

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
Int. J. Distributed Sens. Networks, 2015

The effect of randomness for dependency map on the robustness of interdependent lattices.
CoRR, 2015

2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014

Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014

Novel way to research nonlinear feedback shift register.
Sci. China Inf. Sci., 2014

2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013

Multiple routes transmitted epidemics on multiplex networks.
CoRR, 2013

Multiple Vectors Propagation of Epidemics in Complex Networks.
CoRR, 2013

Improving Chaotic Ant Swarm Performance with Three Strategies.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

2012
Modelling security message propagation in delay tolerant networks.
Secur. Commun. Networks, 2012

Synchronization of Time-Delay Chaotic System in Presence of Noise.
Int. J. Comput. Intell. Syst., 2012

A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Comput. Math. Appl., 2012

2010
An Extensible Hash Function Construction Based on Embedded Chaos Maps.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2007
Chaotic Ant Swarm.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Optimization Method Inspired by "chaotic" Ant Behavior.
Int. J. Bifurc. Chaos, 2006

2003
Time-Delayed Feedback Control of Time-Delay Chaotic Systems.
Int. J. Bifurc. Chaos, 2003


  Loading...