Lingxi Peng
Orcid: 0000-0002-7376-2925
According to our database1,
Lingxi Peng
authored at least 58 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Pattern Recognit., 2025
2024
Optimal energy management strategy based on neural network algorithm for fuel cell hybrid vehicle considering fuel cell lifetime and fuel consumption.
Soft Comput., October, 2024
Optimal α-Variable Model-Free Adaptive Barrier Function Fractional Order Nonlinear Sliding Mode Control for Four Area Interconnected Hybrid Power System With Nonlinearities.
IEEE Access, 2024
2023
A Grasping System with Structured Light 3D Machine Vision Guided Strategy Optimization.
Proceedings of the Knowledge Science, Engineering and Management, 2023
MixUNet: A Hybrid Retinal Vessels Segmentation Model Combining The Latest CNN and MLPs.
Proceedings of the Knowledge Science, Engineering and Management, 2023
2022
Research on covert communication channel based on modulation of common compressed speech codec.
Neural Comput. Appl., 2022
IEEE Access, 2022
2021
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021
Research on information security in text emotional steganography based on machine learning.
Enterp. Inf. Syst., 2021
A Deep-Learning-Inspired Person-Job Matching Model Based on Sentence Vectors and Subject-Term Graphs.
Complex., 2021
2020
Int. J. Secur. Networks, 2020
The Small-Signal Stability of Offshore Wind Power Transmission Inspired by Particle Swarm Optimization.
Complex., 2020
Stabilisation of a Flexible Spacecraft Subject to External Disturbance and Uncertainties.
Complex., 2020
2019
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Clust. Comput., 2017
Proceedings of the Fuzzy Systems and Data Mining III, 2017
2016
Comput. Methods Programs Biomed., 2016
2015
An improved lower bound for approximating the Minimum Integral Solution Problem with Preprocessing over ℓ<sub>∞</sub> norm.
J. Comb. Optim., 2015
Algorithms for the Densest Subgraph with at Least k Vertices and with a Specified Subset.
Proceedings of the Combinatorial Optimization and Applications, 2015
2014
Theor. Comput. Sci., 2014
Research of privacy-preserving data aggregation algorithm for wireless sensor network.
Int. J. Sens. Networks, 2014
Multi-objective cloud estimation of distribution particle swarm optimizer using maximum ranking.
Proceedings of the 10th International Conference on Natural Computation, 2014
Privacy-Preserving Data Mining Algorithm Based on Modified Particle Swarm Optimization.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014
2013
Inapproximability results for the minimum integral solution problem with preprocessing over <i>ℓ</i><sub><i>∞</i></sub>ℓ∞ norm.
Theor. Comput. Sci., 2013
An Automated Diagnosis System of Liver Disease using Artificial Immune and Genetic Algorithms.
J. Medical Syst., 2013
J. Comput., 2013
Archimedean copula-based estimation of distribution algorithm for multi-objective optimisation.
Int. J. Trust. Manag. Comput. Commun., 2013
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013
EDA-Based Multi-objective Optimization Using Preference Order Ranking and Multivariate Gaussian Copula.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013
Multi-objective opposition-based learning fully informed particle swarm optimizer with favour ranking.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013
2012
Int. J. Comput. Intell. Syst., 2012
Int. J. Comput. Intell. Syst., 2012
Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology.
Proceedings of the Eighth International Conference on Natural Computation, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012
Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012
2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Opposition-Based Learning Estimation of Distribution Algorithm with Gaussian Copulas and Its Application to Placement of RFID Readers.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011
2010
A Collision Detection Algorithm Based on Self-adaptive Genetic Method in Virtual Environment.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
Proceedings of the Life System Modeling and Intelligent Computing, 2010
Proceedings of the Sixth International Conference on Natural Computation, 2010
Research of Modified Quantum Genetic Algorithm and It's Application in Collision Detection.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010
2009
Proceedings of the Advances in Neural Networks, 2009
2007
Proceedings of the Workshop on Intelligent Information Technology Application, 2007
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006