Hao Peng

Orcid: 0000-0002-8448-2179

Affiliations:
  • Zhejiang Normal University, Jinhua, China


According to our database1, Hao Peng authored at least 43 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Modeling and analysis of cascading failures in multilayer higher-order networks.
Reliab. Eng. Syst. Saf., 2025

2024
ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI.
ACM Trans. Knowl. Discov. Data, August, 2024

MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting.
IEEE Trans. Dependable Secur. Comput., 2024

TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024

Game-Theoretic Design of Quality-Aware Incentive Mechanisms for Hierarchical Federated Learning.
IEEE Internet Things J., 2024

Cascading failures on interdependent hypergraph.
Commun. Nonlinear Sci. Numer. Simul., 2024

2023
Efficient text-based evolution algorithm to hard-label adversarial attacks on text.
J. King Saud Univ. Comput. Inf. Sci., May, 2023

Query-efficient model extraction for text classification model in a hard label setting.
J. King Saud Univ. Comput. Inf. Sci., 2023

PGAN-KD:Member Privacy Protection of GANs Based on Knowledge Distillation.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism.
ISPRS Int. J. Geo Inf., December, 2022

Locating Sources in Multiplex Networks for Linear Diffusion Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Disintegrate hypergraph networks by attacking hyperedge.
J. King Saud Univ. Comput. Inf. Sci., 2022

Risk Assessment of CPS Composed of Edge Consumer Electronics Under Intentional Attack.
IEEE Consumer Electron. Mag., 2022

Percolation on simplicial complexes.
Appl. Math. Comput., 2022

A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing.
Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing, 2022

2021
A Security Scheme Based on Intranal-Adding Links for Integrated Industrial Cyber-Physical Systems.
Sensors, 2021

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems.
Mob. Networks Appl., 2021

System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Security Evaluation under Different Exchange Strategies Based on Heterogeneous CPS Model in Interdependent Sensor Networks.
Sensors, 2020

An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems.
IEEE Netw., 2020

Impact of the heterogeneity of adoption thresholds on behavior spreading in complex networks.
Appl. Math. Comput., 2020

Security Analysis of CPS Systems Under Different Swapping Strategies in IoT Environments.
IEEE Access, 2020

Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Differentially Private Location Preservation with Staircase Mechanism Under Temporal Correlations.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Multi-Level Two-Sided Rating Protocol Design for Service Exchange Contest Dilemma in Crowdsensing.
IEEE Access, 2019

2018
Supporting user authorization queries in RBAC systems by role-permission reassignment.
Future Gener. Comput. Syst., 2018

Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Two-Step Choice Privacy-Preservation Method for Check-in Data Publishing.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

2017
Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
计算机科学, 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
Int. J. High Perform. Comput. Netw., 2016

2015
(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

2013
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
J. Softw., 2013

2011
An Anti-attack Model Based on Complex Network Theory in P2P networks
CoRR, 2011

2010
An Anonymity Scheme Based on Pseudonym in P2P Networks.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010


  Loading...