Kun Peng
Orcid: 0009-0000-2433-8610
According to our database1,
Kun Peng
authored at least 110 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Decision-Making Approach for Complex Unsignalized Intersection by Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., November, 2024
IEEE Trans. Autom. Control., October, 2024
Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Proceedings of the Computational Science - ICCS 2024, 2024
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Rage of righteousness: Anger's role in promoting debunking effects during the COVID-19 pandemic.
Comput. Hum. Behav., November, 2023
J. Intell. Transp. Syst., March, 2023
A Neural Network-Based Model with Conditional-Deactivation Structure for Autonomous Vehicle Motivation Prediction at Intersections.
Proceedings of the 2023 International Conference on Power, 2023
Modified Vehicle Recognition Method Based on Attribute Fusion and Fuzzy Product Quantization.
Proceedings of the 8th IEEE International Conference on Intelligent Transportation Engineering, 2023
Research on constructing digital teaching technology of knowledge graph with three dimensional fusion characteristics.
Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Pattern Recognit., 2022
Brief Announcement: Secure and Efficient Participant Authentication - Application to Mobile E-Voting.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022
Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the Knowledge Science, Engineering and Management, 2022
2021
EURASIP J. Wirel. Commun. Netw., 2021
Perfect ZK Argument of Knowledge of Discrete Logarithm in A Cyclic Group with Unknown Order.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021
2020
To be attractive or to be authentic? How two competing motivations influence self-presentation in online dating.
Internet Res., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020
2019
Proceedings of the 13th IEEE International Conference on ASIC, 2019
2018
A Climate of Support: A Process-Oriented Analysis of the Impact of Rapport on Peer Tutoring.
Proceedings of the Rethinking learning in the digital age: Making the Learning Sciences count, 2018
2016
Proceedings of the 25th Wireless and Optical Communication Conference, 2016
2014
Efficient homomorphic sealed-bid auction free of bid validity check and equality test.
Secur. Commun. Networks, 2014
Assumptions and conditions for mix networks: analysis, clarification and improvement.
Int. J. Secur. Networks, 2014
2013
IEEE Trans. Pattern Anal. Mach. Intell., 2013
Int. J. Inf. Sec., 2013
IET Inf. Secur., 2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
Proceedings of the Progress in Cryptology, 2013
Proceedings of the Progress in Cryptology, 2013
2012
Pattern Recognit. Lett., 2012
J. Inf. Process. Syst., 2012
How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks.
Int. J. Secur. Networks, 2012
Threshold distributed access control with public verification: a practical application of PVSS.
Int. J. Inf. Sec., 2012
IET Inf. Secur., 2012
Enhanced personal autostereoscopic telepresence system using commodity depth cameras.
Comput. Graph., 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
J. Parallel Distributed Comput., 2011
Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting.
J. Inf. Process. Syst., 2011
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
Int. J. Inf. Sec., 2011
Int. J. Inf. Sec., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Vulnerability of a Non-membership Proof Scheme.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Geometric properties of multiple reflections in catadioptric camera with two planar mirrors.
Proceedings of the Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, 2010
Proceedings of the Progress in Cryptology, 2010
Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
2006
Comput. Commun., 2006
A Smart Identification Card System Using Facial Biometric: From Architecture to Application.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Proceedings of the Progress in Cryptology, 2005
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Pattern Recognition and Image Analysis, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Advanced Video and Signal Based Surveillance, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Security and Cryptology, 2004
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2000
ACM SIGOPS Oper. Syst. Rev., 2000