Hao Peng
Orcid: 0000-0002-8448-2179Affiliations:
- Zhejiang Normal University, Jinhua, China
According to our database1,
Hao Peng
authored at least 43 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Reliab. Eng. Syst. Saf., 2025
2024
ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI.
ACM Trans. Knowl. Discov. Data, August, 2024
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024
Game-Theoretic Design of Quality-Aware Incentive Mechanisms for Hierarchical Federated Learning.
IEEE Internet Things J., 2024
Commun. Nonlinear Sci. Numer. Simul., 2024
2023
J. King Saud Univ. Comput. Inf. Sci., May, 2023
Query-efficient model extraction for text classification model in a hard label setting.
J. King Saud Univ. Comput. Inf. Sci., 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism.
ISPRS Int. J. Geo Inf., December, 2022
IEEE Trans. Netw. Sci. Eng., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Risk Assessment of CPS Composed of Edge Consumer Electronics Under Intentional Attack.
IEEE Consumer Electron. Mag., 2022
A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing.
Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing, 2022
2021
A Security Scheme Based on Intranal-Adding Links for Integrated Industrial Cyber-Physical Systems.
Sensors, 2021
Mob. Networks Appl., 2021
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
2020
Security Evaluation under Different Exchange Strategies Based on Heterogeneous CPS Model in Interdependent Sensor Networks.
Sensors, 2020
An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems.
IEEE Netw., 2020
Impact of the heterogeneity of adoption thresholds on behavior spreading in complex networks.
Appl. Math. Comput., 2020
Security Analysis of CPS Systems Under Different Swapping Strategies in IoT Environments.
IEEE Access, 2020
Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Differentially Private Location Preservation with Staircase Mechanism Under Temporal Correlations.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
Multi-Level Two-Sided Rating Protocol Design for Service Exchange Contest Dilemma in Crowdsensing.
IEEE Access, 2019
2018
Supporting user authorization queries in RBAC systems by role-permission reassignment.
Future Gener. Comput. Syst., 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018
2017
Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
计算机科学, 2016
Int. J. High Perform. Comput. Netw., 2016
2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
2014
Inf. Process. Lett., 2014
2013
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
J. Softw., 2013
2011
2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010