Haipeng Peng
Orcid: 0000-0003-4415-0126
According to our database1,
Haipeng Peng
authored at least 132 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
An optimal bound for factoring unbalanced RSA moduli by solving Generalized Implicit Factorization Problem.
J. Supercomput., January, 2025
2024
IEEE Internet Things J., November, 2024
An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption.
IEEE Trans. Intell. Transp. Syst., October, 2024
CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.
Sensors, July, 2024
A Novel Memristors Based Echo State Network Model Inspired by the Brain's Uni-hemispheric Slow-Wave Sleep Characteristics.
Cogn. Comput., July, 2024
IEEE Trans. Artif. Intell., April, 2024
Flexible Visually Meaningful Image Transmission Scheme in WSNs Using Fourier Optical Speckle-Based Compressive Sensing.
IEEE Internet Things J., April, 2024
Multitiered Reversible Data Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking.
IEEE Internet Things J., April, 2024
A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT.
IEEE Internet Things J., April, 2024
Sensors, March, 2024
IEEE Internet Things J., February, 2024
Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation.
IEEE Trans. Multim., 2024
Sequence prediction with different dimensions based on two novel deep echo state network models.
Trans. Inst. Meas. Control, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Signal Process., 2024
High-capacity medical information hiding scheme with P-tensor product secret image sharing for wireless body area networks.
Digit. Signal Process., 2024
Unsupervised Microservice Log Anomaly Detection Method Based on Graph Neural Network.
Proceedings of the Advances in Swarm Intelligence, 2024
2023
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation.
J. Syst. Archit., October, 2023
IEEE Internet Things J., October, 2023
Inf. Sci., September, 2023
IEEE Internet Things J., September, 2023
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme.
J. Inf. Secur. Appl., June, 2023
Appl. Intell., April, 2023
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage.
J. Syst. Archit., March, 2023
Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function.
IEEE Internet Things J., March, 2023
A Chaotic Compressed Sensing-Based Multigroup Secret Image Sharing Method for IoT With Critical Information Concealment Function.
IEEE Internet Things J., January, 2023
IEEE Trans. Serv. Comput., 2023
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Netw. Sci. Eng., 2023
IEEE ACM Trans. Audio Speech Lang. Process., 2023
Proceedings of the Advances in Swarm Intelligence - 14th International Conference, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2022
IEEE Trans. Cloud Comput., 2022
Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing.
Signal Process., 2022
A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs.
Sensors, 2022
Construction of Structured Random Measurement Matrices in Semi-Tensor Product Compressed Sensing Based on Combinatorial Designs.
Sensors, 2022
An efficient secure data transmission and node authentication scheme for wireless sensing networks.
J. Syst. Archit., 2022
Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs.
Appl. Math. Comput., 2022
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022
CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data.
Proceedings of the Data Mining and Big Data - 7th International Conference, 2022
2021
IEEE Trans. Inf. Theory, 2021
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021
Flexible construction of compressed sensing matrices with low storage space and low coherence.
Signal Process., 2021
Inf. Sci., 2021
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021
Comput. Secur., 2021
High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network.
Sensors, 2020
A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks.
Neural Networks, 2020
Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System.
IEEE Internet Things J., 2020
Appl. Math. Comput., 2020
Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays.
IEEE Access, 2020
Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays.
IEEE Access, 2020
Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control.
IEEE Access, 2020
An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
2019
Pinning Synchronization of Coupled Memristive Recurrent Neural Networks with Mixed Time-Varying Delays and Perturbations.
Neural Process. Lett., 2019
Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019
Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Comput. Appl., 2019
Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet Things J., 2019
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019
Commun. Nonlinear Sci. Numer. Simul., 2019
An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm.
IEEE Access, 2019
IEEE Access, 2019
2018
IEEE Trans. Multim., 2018
Swarm Evol. Comput., 2018
Peer-to-Peer Netw. Appl., 2018
Neural Process. Lett., 2018
Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Process. Lett., 2018
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018
IEEE Netw., 2018
Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Comput. Appl., 2018
Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Frankl. Inst., 2018
Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018
Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks.
Commun. Nonlinear Sci. Numer. Simul., 2018
Appl. Math. Comput., 2018
Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017
Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multim. Tools Appl., 2017
IEEE Internet Things J., 2017
Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017
Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017
Neurocomputing, 2017
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017
2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016
Secur. Commun. Networks, 2016
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Secur. Commun. Networks, 2016
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Process. Lett., 2016
Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Process. Lett., 2016
Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Process. Lett., 2016
KSII Trans. Internet Inf. Syst., 2016
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
KSII Trans. Internet Inf. Syst., 2016
An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Inf. Technol. Control., 2016
2015
A biometrics and smart cards-based authentication scheme for multi-server environments.
Secur. Commun. Networks, 2015
Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Process. Lett., 2015
An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Syst., 2015
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2015
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
Inf. Technol. Control., 2015
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
Int. J. Distributed Sens. Networks, 2015
The effect of randomness for dependency map on the robustness of interdependent lattices.
CoRR, 2015
2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014
Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014
2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013
2012
Secur. Commun. Networks, 2012
Int. J. Comput. Intell. Syst., 2012
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Comput. Math. Appl., 2012
2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2007
Proceedings of the Third International Conference on Natural Computation, 2007
2006
Int. J. Bifurc. Chaos, 2006
2003
Int. J. Bifurc. Chaos, 2003