Peidong Zhu

Orcid: 0000-0002-8670-3086

According to our database1, Peidong Zhu authored at least 110 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks, July, 2024

2023
Passive GNSS-based SAR imaging with sub-apertures combination.
Signal Image Video Process., July, 2023

2022
A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks With Fine-Grained Flow Classification.
IEEE Internet Things J., 2022

2021
Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems.
Sensors, 2021

A Self-Powered Hybrid SSHI Circuit with a Wide Operation Range for Piezoelectric Energy Harvesting.
Sensors, 2021

Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game.
Comput. Secur., 2021

CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack.
Comput. Secur., 2021

Network-based multidimensional moving target defense against false data injection attack in power system.
Comput. Secur., 2021

Decimetre Level Range Resolution for Beidou B3I Signal-Based Passive SAR Imaging - Proof-of-Concept Experimental Demonstrations.
IEEE Access, 2021

A Self-Powered Multi-Input Bridgeless Series-SSHI Circuit for Piezoelectric Energy Harvesting.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

2020
High resolution for software-defined GPS-based SAR imaging using waveform-modulated range-compressed pulse: field experimental demonstration.
Signal Image Video Process., 2020

Enhanced Passive GNSS-Based Radar Imaging Based on Coherent Integrated Multi-Satellite Signals.
Sensors, 2020

An RBF-ARX Model-Based Variable-Gain Feedback RMPC Algorithm.
IEEE Access, 2020

Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid.
Secur. Commun. Networks, 2019

6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space.
Comput. Networks, 2019

A Privacy-Preserving and Identity-Based Personalized Recommendation Scheme for Encrypted Tasks in Crowdsourcing.
IEEE Access, 2019

2018
False Data Injection Attack Based on Hyperplane Migration of Support Vector Machine in Transmission Network of the Smart Grid.
Symmetry, 2018

Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
Sensors, 2018

Critical Nodes Identification of Power Grids Based on Network Efficiency.
IEICE Trans. Inf. Syst., 2018

Successive direct load altering attack in smart grid.
Comput. Secur., 2018

Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Cross-Layer Attack Path Exploration for Smart Grid Based on Knowledge of Target Network.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Context based Detections against Legal False Price Data and Malicious Disconnect Commands in Smart Grid.
Proceedings of the 18th International Conference on Computational Science and Applications, 2018

Cascading Failure Based on Load Redistribution of a Smart Grid with Different Coupling Modes.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Trust on the Ratee: A Trust Management System for Social Internet of Vehicles.
Wirel. Commun. Mob. Comput., 2017

Command Disaggregation Attack and Mitigation in Industrial Internet of Things.
Sensors, 2017

An experimental study: An interpretative division method on principal component analysis.
J. Intell. Fuzzy Syst., 2017

Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory.
Int. J. Crit. Infrastructure Prot., 2017

Parallelization of skyline probability computation over uncertain preferences.
Concurr. Comput. Pract. Exp., 2017

Parallelization of group-based skyline computation for multi-core processors.
Concurr. Comput. Pract. Exp., 2017

Ratee-Based Trust Management System for Internet of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Multidimensional Trust-Based Anomaly Detection System in Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Enhance the robustness of cyber-physical systems by adding interdependency.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Load Scheduling of Thermostatical House-Hold Appliances Against Abrupt Changes in Smart Grid.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

An Interweaved Time Series Locally Connected Recurrent Neural Network Model on Crime Forecasting.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Top-k Skyline Groups Queries.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

An effective semi-supervised model for intrusion detection using feature selection based LapSVM.
Proceedings of the International Conference on Computer, 2017

Computing skyline groups: an experimental evaluation.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Using Trust of Social Ties for Recommendation.
IEICE Trans. Inf. Syst., 2016

Securing Power System State Estimation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Cooperation Stimulation and Security in Wireless Ad Hoc Networks - A Power-Efficient Bayesian Game Approach.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Discovering Multi-type Correlated Events with Time Series for Exception Detection of Complex Systems.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

2015
A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2015

Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks.
KSII Trans. Internet Inf. Syst., 2015

Preserving the Privacy of Social Recommendation with a Differentially Private Approach.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Matrix Factorization Approach Based on Temporal Hierarchical Dirichlet Process.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015

Social recommendation using quantified social tie strength.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Preserving network privacy with a hierarchical structure approach.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
SocAware: A Middleware for Social Applications in Online Social Networks.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
A layered encryption mechanism for networked critical infrastructures.
IEEE Netw., 2013

Worm Detection without Knowledge Base in Industrial Networks.
J. Commun., 2013

Scaling Inter-domain Routing System via Path Exploration Aggregation.
KSII Trans. Internet Inf. Syst., 2013

Secure process control system of industrial networks.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

Unveil the Spams in Weibo.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013

2012
AS Alliance based security enhancement for inter-domain routing protocol.
Math. Comput. Model., 2012

Shedding light on the use of AS relationships for path inference.
J. Commun. Networks, 2012

A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information.
IEICE Trans. Inf. Syst., 2012

2011
k-Fault tolerance of the Internet AS graph.
Comput. Networks, 2011

2010
On Evaluating BGP Routing Stress Attack.
J. Commun., 2010

EPSP: Enhancing Network Protocol with Social-Aware Plane.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
TTM Based Security Enhancement for Inter-domain Routing Protocol.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

A Packet-Based Anomaly Detection Model for Inter-domain Routing.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Routing Policy Conflict Detection without Violating ISP's Privacy.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

An Enhanced Router Topology Discovery Model.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Reputation Mechanism for Inter-domain Routing Security Management.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions.
Sci. China Ser. F Inf. Sci., 2008

The progress of the national first-rate course "computer networks" in NUDT.
Proceedings of the First ACM Summit on Computing Education in China, 2008

SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008

Security Broadcast Based on Linear Network Coding in WSN.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ROUSSEAU: A Monitoring System for Inter-domain Routing Security.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Cooperative Management Framework for Inter-domain Routing System.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

AS Alliance in Inter-Domain Routing.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Optimizing Network Configurations Based on Potential Profit Loss.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Credit based Fairness Control in Wireless Sensor Network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Evaluating Internal BGP Networks from the Data Plane.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks.
Proceedings of the Integrated Network Management, 2007

Does the Average Path Length Grow in the Internet?.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007

A Delay Sensitive Feedback Control Data Aggregation Approach in Wireless Sensor Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

On the Power-Law of the Internet and the Hierarchy of BGP Convergence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Research Algorithm Based on Ant-Cooperation for Grid Service.
Proceedings of the Grid and Cooperative Computing, 2007

Translator Trust for the Internet Inter-domain Routing.
Proceedings of the Future Generation Communication and Networking, 2007

Pricing Models of Inter-Domain Multicasting Applications.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Path Selection of Reliable Data Delivery in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET.
Proceedings of the Stabilization, 2006

The Hierarchy of BGP Convergence on the Self-Organized Internet.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Reliable Data Delivery in Wireless Sensor Networks: An Energy-Efficient, Cluster-Based Approach.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

A practical pricing model of inter-domain multicasting based on game theory.
Proceedings of the 5th Workshop on Network and System Support for Games, 2006

BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

BGPSep_D: An Improved Algorithm for Constructing Correct and Scalable IBGP Configurations Based on Vertexes Degree.
Proceedings of the High Performance Computing and Communications, 2006

Research on Self-Organized Evolution of P2P Network Structure.
Proceedings of the Grid and Cooperative Computing, 2006

Energy Efficient Multipath Routing Using Network Coding in Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

A Diversity-Controllable Genetic Algorithm for Optimal Fused Traffic Planning on Sensor Networks.
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006

A Systematic Compression Approach for Route Tables in a BGP Monitor.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
A New Price Mechanism Inducing Peers to Achieve Optimal Welfare.
Proceedings of the Networking, 2005

Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers.
Proceedings of the Networking, 2005

LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network.
Proceedings of the Networking, 2005

ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

An efficient random walks based approach to reducing file locating delay in unstructured P2P network.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Rule-Based Anomaly Detection of Inter-domain Routing System.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

2004
Systematic Robustness-Testing RI-Pro of BGP.
Proceedings of the Parallel and Distributed Processing and Applications, 2004


  Loading...