Peng Li
Orcid: 0000-0001-5026-5347Affiliations:
- Nanjing University of Posts and Telecommunications, School of Computer Science and Technology, China
- Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China
According to our database1,
Peng Li
authored at least 129 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SAC-RSM: A High-Performance UAV-Side Road Surveillance Model Based on Super-Resolution Assisted Learning.
IEEE Internet Things J., November, 2024
Appl. Intell., November, 2024
Improving Physical Layer Security for Distributed Antenna Systems With a Friendly Jammer.
IEEE Trans. Commun., August, 2024
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence.
IEEE Internet Things J., June, 2024
Multi-cluster high performance computing method based on multimodal tensor in enterprise resource planning system.
Phys. Commun., February, 2024
Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification.
Neural Networks, 2024
Appl. Soft Comput., 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
IEEE Trans. Veh. Technol., December, 2023
Neural Comput. Appl., December, 2023
Clust. Comput., October, 2023
Unmanned Aerial Vehicle Perspective Small Target Recognition Algorithm Based on Improved YOLOv5.
Remote. Sens., July, 2023
World Wide Web (WWW), May, 2023
Combining knowledge extension with convolution neural network for diabetes prediction.
Eng. Appl. Artif. Intell., 2023
BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train Decomposition.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Multi-attention Integration Mechanism for Region Destruction Detection of Remote Sensing Images.
Proceedings of the Advances in Computer Graphics, 2023
2022
Wirel. Pers. Commun., 2022
Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration.
IEEE Trans. Intell. Transp. Syst., 2022
Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors.
IEEE Trans. Commun., 2022
IEEE Trans. Commun., 2022
RFID Indoor Positioning Based on AP Clustering and Improved Particle Swarm Algorithm.
J. Sensors, 2022
J. Ambient Intell. Humaniz. Comput., 2022
Secrecy outage probability analysis of energy-aware relay selection for energy-harvesting cooperative systems.
IET Commun., 2022
Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting.
IET Commun., 2022
A Variable Sliding Window Algorithm Based on Concept Drift for Frequent Pattern Mining Over Data Streams<sup>*</sup>.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
2021
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes.
Frontiers Comput. Sci., February, 2021
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems.
Wirel. Commun. Mob. Comput., 2021
Dynamic Virtual Network Embedding of Mobile Cloud System Based on Global Resources in Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021
Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications.
Secur. Commun. Networks, 2021
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2021
Differential privacy distributed learning under chaotic quantum particle swarm optimization.
Computing, 2021
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021
Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type - Black Box Testing.
Proceedings of the Big Data and Security - Third International Conference, 2021
State Machine Inference Method of Unknown Binary Protocol Based on Recurrent Neural Network.
Proceedings of the Big Data and Security - Third International Conference, 2021
2020
Sensors, 2020
Int. J. Parallel Emergent Distributed Syst., 2020
计算机科学, 2020
J. Parallel Distributed Comput., 2020
Dual incremental fuzzy schemes for frequent itemsets discovery in streaming numeric data.
Inf. Sci., 2020
Vehicle Pedestrian Detection Method Based on Spatial Pyramid Pooling and Attention Mechanism.
Inf., 2020
Concurr. Comput. Pract. Exp., 2020
IEEE Commun. Mag., 2020
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020
Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor Networks.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
2019
J. Signal Process. Syst., 2019
Sensors, 2019
Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
Int. J. Inf. Comput. Secur., 2019
Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey.
Intell. Data Anal., 2019
PRDL: Relative Localization Method of RFID Tags via Phase and RSSI Based on Deep Learning.
IEEE Access, 2019
Absorbing Diagonal Algorithm for Enhancing Randomized SVD Algorithms in Collaborative Filtering✱.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient Computing.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Parallel Absorbing Diagonal Algorithm: A Scalable Iterative Parallel Fast Eigen-Solver for Symmetric Matrices.
Proceedings of the Data Science - 6th International Conference, 2019
Proceedings of the Data Science - 6th International Conference, 2019
Proceedings of the Data Science - 6th International Conference, 2019
Proceedings of the Data Science - 6th International Conference, 2019
Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
Sensors, 2018
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018
J. High Speed Networks, 2018
Int. J. Intell. Inf. Database Syst., 2018
Resource scheduling optimisation algorithm for containerised microservice architecture in cloud computing.
Int. J. High Perform. Syst. Archit., 2018
Research and Implementation of High Performance Traffic Processing Based on Intel DPDK.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Web Services - ICWS 2018, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Architecture and Implementation of Real-Time Analysis System Based on Cold Chain Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
2017
An RFID Indoor Positioning Algorithm Based on Bayesian Probability and <i>K</i>-Nearest Neighbor.
Sensors, 2017
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks.
Secur. Commun. Networks, 2017
J. Sensors, 2017
Int. J. Distributed Sens. Networks, 2017
Int. J. Bus. Data Commun. Netw., 2017
Int. J. Bus. Data Commun. Netw., 2017
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
Proceedings of the Advances in Internetworking, 2017
Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Design and Implementation of Food Safety Traceability System Based on RFID Technology.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
2015
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy.
Int. J. Distributed Sens. Networks, 2015
Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
2013
Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things.
Proceedings of the Advances in Wireless Sensor Networks, 2013
2012
Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine.
Proceedings of the Advances in Wireless Sensor Networks, 2012