Peng Li

Orcid: 0000-0001-5026-5347

Affiliations:
  • Nanjing University of Posts and Telecommunications, School of Computer Science and Technology, China
  • Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China


According to our database1, Peng Li authored at least 129 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SAC-RSM: A High-Performance UAV-Side Road Surveillance Model Based on Super-Resolution Assisted Learning.
IEEE Internet Things J., November, 2024

Improving the transferability of adversarial attacks via self-ensemble.
Appl. Intell., November, 2024

Improving Physical Layer Security for Distributed Antenna Systems With a Friendly Jammer.
IEEE Trans. Commun., August, 2024

Differentially private federated learning with non-IID data.
Computing, July, 2024

ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence.
IEEE Internet Things J., June, 2024

Multi-cluster high performance computing method based on multimodal tensor in enterprise resource planning system.
Phys. Commun., February, 2024

Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification.
Neural Networks, 2024

Incremental high average-utility itemset mining: survey and challenges.
CoRR, 2024

Feature-aware transferable adversarial attacks against image classification.
Appl. Soft Comput., 2024

QTSRA: A Q-learning-based Trusted Routing Algorithm in SDN Wireless Sensor Networks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Secure Transmission for Wireless Communication Systems With Friendly Jammers.
IEEE Trans. Veh. Technol., December, 2023

MapReduce-based distributed tensor clustering algorithm.
Neural Comput. Appl., December, 2023

Privacy protection framework for face recognition in edge-based Internet of Things.
Clust. Comput., October, 2023

Unmanned Aerial Vehicle Perspective Small Target Recognition Algorithm Based on Improved YOLOv5.
Remote. Sens., July, 2023

Multi-objective optimisation based fuzzy association rule mining method.
World Wide Web (WWW), May, 2023

RF-Ray: Sensing Objects in the Package via RFID Systems.
IEEE Syst. J., March, 2023

Combining knowledge extension with convolution neural network for diabetes prediction.
Eng. Appl. Artif. Intell., 2023

BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train Decomposition.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Multi-attention Integration Mechanism for Region Destruction Detection of Remote Sensing Images.
Proceedings of the Advances in Computer Graphics, 2023

2022
Power Splitting and Source-Relay Selection in Energy Harvesting Wireless Network.
Wirel. Pers. Commun., 2022

Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration.
IEEE Trans. Intell. Transp. Syst., 2022

Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors.
IEEE Trans. Commun., 2022

Intelligent Jamming Strategies for Secure Spectrum Sharing Systems.
IEEE Trans. Commun., 2022

RFID Indoor Positioning Based on AP Clustering and Improved Particle Swarm Algorithm.
J. Sensors, 2022

A fuzzy spatial description logic for the semantic web.
J. Ambient Intell. Humaniz. Comput., 2022

Secrecy outage probability analysis of energy-aware relay selection for energy-harvesting cooperative systems.
IET Commun., 2022

Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting.
IET Commun., 2022

A Variable Sliding Window Algorithm Based on Concept Drift for Frequent Pattern Mining Over Data Streams<sup>*</sup>.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes.
Frontiers Comput. Sci., February, 2021

A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems.
Wirel. Commun. Mob. Comput., 2021

Dynamic Virtual Network Embedding of Mobile Cloud System Based on Global Resources in Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021

Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications.
Secur. Commun. Networks, 2021

Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2021

Dynamic spatio-temporal logic based on RCC-8.
Concurr. Comput. Pract. Exp., 2021

Differential privacy distributed learning under chaotic quantum particle swarm optimization.
Computing, 2021

Human behavior recognition model based on improved EfficientNet.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Anomaly detection of diabetes data based on hierarchical clustering and CNN.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Fuzzy Association Rules Mining based on Type-2 Fuzzy Sets over Data Stream.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type - Black Box Testing.
Proceedings of the Big Data and Security - Third International Conference, 2021

State Machine Inference Method of Unknown Binary Protocol Based on Recurrent Neural Network.
Proceedings of the Big Data and Security - Third International Conference, 2021

2020
A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems.
Sensors, 2020

SKINNY-Based RFID Lightweight Authentication Protocol.
Sensors, 2020

3DLRA: An RFID 3D Indoor Localization Method Based on Deep Learning.
Sensors, 2020

Cluster-based distributed dynamic cuckoo filter system for Redis.
Int. J. Parallel Emergent Distributed Syst., 2020

高性能计算与天文大数据研究综述 (High Performance Computing and Astronomical Data: A Survey).
计算机科学, 2020

Privacy preserving classification on local differential privacy in data centers.
J. Parallel Distributed Comput., 2020

Dual incremental fuzzy schemes for frequent itemsets discovery in streaming numeric data.
Inf. Sci., 2020

Vehicle Pedestrian Detection Method Based on Spatial Pyramid Pooling and Attention Mechanism.
Inf., 2020

Reconfigurable Fault-tolerance mapping of ternary N-cubes onto chips.
Concurr. Comput. Pract. Exp., 2020

Intelligent Resource Scheduling Based on Locality Principle in Data Center Networks.
IEEE Commun. Mag., 2020

Optimizing Multi-objective Functions in Fuzzy Association Rule Mining.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020

Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor Networks.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Algorithm for Determining Number of Clusters based on Dichotomy.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Anomaly Detection based on Feature Correlation and Influence Degree in SDN.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

RFID-Based WIMEC-LANDMARC Indoor Location Algorithm.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Prediction of diabetes using Multi-type data.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
A Live Migration Algorithm for Containers Based on Resource Locality.
J. Signal Process. Syst., 2019

A Lightweight RFID Mutual Authentication Protocol with PUF.
Sensors, 2019

ANTspin: Efficient Absolute Localization Method of RFID Tags via Spinning Antenna.
Sensors, 2019

Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
Int. J. Inf. Comput. Secur., 2019

Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey.
Intell. Data Anal., 2019

PRDL: Relative Localization Method of RFID Tags via Phase and RSSI Based on Deep Learning.
IEEE Access, 2019

Absorbing Diagonal Algorithm for Enhancing Randomized SVD Algorithms in Collaborative Filtering✱.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient Computing.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

Application of Data Distribution Technology in Smart Cities.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Developing a smart healthcare framework with an 'Aboriginal lens'.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Fault-Tolerant Cycle Embedding into 3-Ary n-Cubes with Structure Faults.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Parallel Absorbing Diagonal Algorithm: A Scalable Iterative Parallel Fast Eigen-Solver for Symmetric Matrices.
Proceedings of the Data Science - 6th International Conference, 2019

Multi-core Processor Performance Evaluation Model Based on DPDK Affinity Setting.
Proceedings of the Data Science - 6th International Conference, 2019

A Novel Heat-Proof Clothing Design Algorithm Based on Heat Conduction Theory.
Proceedings of the Data Science - 6th International Conference, 2019

Fuzzy Association Rule Mining Algorithm Based on Load Classifier.
Proceedings of the Data Science - 6th International Conference, 2019

Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Analysis and Design of Group RFID Tag Security Authentication Protocol.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Design and Implementation of Cloud Service System Based on Face Recognition.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

An Indoor 3D Positioning Technology Based on NB-IoT.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Design of Modern Logistics Management System Based on RFID and NB-IoT.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
An RFID Indoor Positioning Algorithm Based on Support Vector Regression.
Sensors, 2018

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018

Spark's operation time predictive in cloud computing environment based on SRC-WSVR.
J. High Speed Networks, 2018

Edge computing-based security authentication algorithm for multiple RFID tags.
Int. J. Intell. Inf. Database Syst., 2018

Resource scheduling optimisation algorithm for containerised microservice architecture in cloud computing.
Int. J. High Perform. Syst. Archit., 2018

An improved SMURF scheme for cleaning RFID data.
Int. J. Grid Util. Comput., 2018

Research and Implementation of High Performance Traffic Processing Based on Intel DPDK.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

Research on Container Load Strategy Based on Microservices.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

Analysis and Research Based on Differential Privacy Protection Related Algorithms.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

Glucose Screening Measurements and Noninvasive Glucose Monitor Methods.
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018

An Improvement RFID Security Authentication Protocol Based on Hash Function.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Design and Implementation of Cognitive System of Children's Education Based on RFID.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

Embedding Exchanged Hypercubes into Rings and Ladders.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Architecture and Implementation of Real-Time Analysis System Based on Cold Chain Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Analysis of Localization Algorithms in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

A Survey on Computation Offloading for Mobile Edge Computing Information.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Distributed Dynamic Cuckoo Filter System Based on Redis Cluster.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

Survey of Load Balancing Method Based on DPDK.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

A Summary of Data Analysis Based on Differential Privacy.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
An RFID Indoor Positioning Algorithm Based on Bayesian Probability and <i>K</i>-Nearest Neighbor.
Sensors, 2017

Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks.
Secur. Commun. Networks, 2017

VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks.
J. Sensors, 2017

Energy optimization of ant colony algorithm in wireless sensor network.
Int. J. Distributed Sens. Networks, 2017

Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags.
Int. J. Bus. Data Commun. Netw., 2017

A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment.
Int. J. Bus. Data Commun. Netw., 2017

Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Performance Prediction of Spark Based on the Multiple Linear Regression Analysis.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Design and implementation of action recognition system based on RFID sensor.
Proceedings of the 13th International Conference on Natural Computation, 2017

A New Middleware Architecture for RFID Data Management.
Proceedings of the Advances in Internetworking, 2017

Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Survey of Big Data Platform Based on Cloud Computing Container Technology.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Design and Implementation of Food Safety Traceability System Based on RFID Technology.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
A Novel Secure Architecture for the Internet of Things.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Review of Virtual Memory Optimization in Cloud Environment.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

An Efficient RFID Reader Network Planning Strategy Based on P2P Computing.
Proceedings of the Advances on P2P, 2016

A Novel Cloud Computing Architecture Oriented Internet of Vehicles.
Proceedings of the Advances on P2P, 2016

A Review on Data Cleaning Technology for RFID Network.
Proceedings of the Advances on P2P, 2016

Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-B.
Proceedings of the Advances on P2P, 2016

2015
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy.
Int. J. Distributed Sens. Networks, 2015

Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Wireless Injection Attacks Based on Fake Data Injection in TinyOS.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

2013
Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things.
Proceedings of the Advances in Wireless Sensor Networks, 2013

2012
Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine.
Proceedings of the Advances in Wireless Sensor Networks, 2012


  Loading...