default search action
Haipeng Peng
Person information
Other persons with a similar name
- Haipeng Chen (aka: Hai-Peng Chen) — disambiguation page
- Hai-Peng Deng
- Hai-Peng Fu
- Haipeng Li (aka: Hai-Peng Li) — disambiguation page
- Hai-Peng Liu
- Haipeng Ren (aka: Hai-Peng Ren) — disambiguation page
- Haipeng Ren 0001 (aka: Hai-Peng Ren 0001) — Xi'an University of Technology, Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing, China
- Hai-Peng Shi
- Haipeng Wang (aka: Hai-Peng Wang) — disambiguation page
- Haipeng Wang 0003 (aka: Hai-Peng Wang 0003) — Sanjiang University, Nanjing, China (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j112]Ran Zhang, Jingguo Bi, Lixiang Li, Haipeng Peng:
An optimal bound for factoring unbalanced RSA moduli by solving Generalized Implicit Factorization Problem. J. Supercomput. 81(1): 102 (2025) - 2024
- [j111]Jingyu Sun, Lixiang Li, Haipeng Peng, Yin Meng:
A Novel Memristors Based Echo State Network Model Inspired by the Brain's Uni-hemispheric Slow-Wave Sleep Characteristics. Cogn. Comput. 16(4): 1470-1483 (2024) - [j110]Lanlan Wang, Haipeng Peng, Lixiang Li, Shuang Bao, Junying Liang:
High-capacity medical information hiding scheme with P-tensor product secret image sharing for wireless body area networks. Digit. Signal Process. 146: 104365 (2024) - [j109]Xiaofei He, Lixiang Li, Fenghua Tong, Haipeng Peng:
Multilevel Privacy Protection for Social Media Based on 2-D Compressive Sensing. IEEE Internet Things J. 11(4): 6878-6892 (2024) - [j108]Xu He, Lixiang Li, Haipeng Peng:
A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. IEEE Internet Things J. 11(7): 11381-11394 (2024) - [j107]Zhufeng Suo, Chao Xia, Donghua Jiang, Haipeng Peng, Fenghua Tong, Xiaoming Chen:
Multitiered Reversible Data Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking. IEEE Internet Things J. 11(7): 11524-11539 (2024) - [j106]Lanlan Wang, Haipeng Peng, Lixiang Li, Shuang Bao:
Flexible Visually Meaningful Image Transmission Scheme in WSNs Using Fourier Optical Speckle-Based Compressive Sensing. IEEE Internet Things J. 11(8): 13524-13539 (2024) - [j105]Wei Wu, Haipeng Peng, Haotian Zhu, Lixiang Li:
MVC-RSN: A Malware Classification Method With Variant Identification Ability. IEEE Internet Things J. 11(21): 35654-35668 (2024) - [j104]Mengmeng Zhao, Haipeng Peng, Lixiang Li, Yeqing Ren:
Graph Attention Network and Informer for Multivariate Time Series Anomaly Detection. Sensors 24(5): 1522 (2024) - [j103]Wei Wu, Haipeng Peng, Haotian Zhu, Derun Zhang:
CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing. Sensors 24(13): 4253 (2024) - [j102]Xiaofei He, Lixiang Li, Haipeng Peng, Fenghua Tong:
A multi-level privacy-preserving scheme for extracting traffic images. Signal Process. 220: 109445 (2024) - [j101]Haipeng Peng, Shuang Bao, Lixiang Li:
A Survey of Security Protection Methods for Deep Learning Model. IEEE Trans. Artif. Intell. 5(4): 1533-1553 (2024) - [j100]Wei Wang, Licheng Wang, Junke Duan, Xiaofei Tong, Haipeng Peng:
Redactable Blockchain Based on Decentralized Trapdoor Verifiable Delay Functions. IEEE Trans. Inf. Forensics Secur. 19: 7492-7507 (2024) - [j99]Jingyu Sun, Lixiang Li, Haipeng Peng, Guanhua Chen, Shengyu Liu:
Sequence prediction with different dimensions based on two novel deep echo state network models. Trans. Inst. Meas. Control 46(11): 2062-2076 (2024) - [j98]Xiaofei He, Lixiang Li, Haipeng Peng, Fenghua Tong:
An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption. IEEE Trans. Intell. Transp. Syst. 25(10): 14958-14972 (2024) - [j97]Yeqing Ren, Haipeng Peng, Lixiang Li, Yixian Yang:
Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation. IEEE Trans. Multim. 26: 4360-4374 (2024) - [c13]Xue Liang, Lixiang Li, Haipeng Peng:
Unsupervised Microservice Log Anomaly Detection Method Based on Graph Neural Network. ICSI 2024: 197-208 - [i8]Xiao Liu, Mingyuan Li, Xu Wang, Guangsheng Yu, Wei Ni, Lixiang Li, Haipeng Peng, Ren Ping Liu:
Decentralized Federated Unlearning on Blockchain. CoRR abs/2402.16294 (2024) - [i7]Xiao Liu, Mingyuan Li, Xu Wang, Guangsheng Yu, Wei Ni, Lixiang Li, Haipeng Peng, Ren Ping Liu:
Fishers Harvest Parallel Unlearning in Inherited Model Networks. CoRR abs/2408.08493 (2024) - 2023
- [j96]Shanshan Zhao, Lixiang Li, Haipeng Peng:
Incorporating retrieval-based method for feature enhanced image captioning. Appl. Intell. 53(8): 9731-9743 (2023) - [j95]Wei Wu, Haipeng Peng, Fenghua Tong, Lixiang Li:
A Chaotic Compressed Sensing-Based Multigroup Secret Image Sharing Method for IoT With Critical Information Concealment Function. IEEE Internet Things J. 10(2): 1192-1207 (2023) - [j94]Wei Wu, Haipeng Peng, Fenghua Tong, Lixiang Li:
Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function. IEEE Internet Things J. 10(5): 4557-4578 (2023) - [j93]Lijuan Xu, Xiao Ding, Haipeng Peng, Dawei Zhao, Xin Li:
ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT. IEEE Internet Things J. 10(18): 15931-15942 (2023) - [j92]Wei Wang, Junke Duan, Licheng Wang, Xiaoya Hu, Haipeng Peng:
Strongly Synchronized Redactable Blockchain Based on Verifiable Delay Functions. IEEE Internet Things J. 10(19): 16778-16792 (2023) - [j91]Xu He, Lixiang Li, Haipeng Peng:
A controllable delegation scheme for the subscription to multimedia platforms. Inf. Sci. 641: 119086 (2023) - [j90]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Shuang Bao, Lanlan Wang:
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. J. Inf. Secur. Appl. 75: 103487 (2023) - [j89]Xu He, Lixiang Li, Haipeng Peng:
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage. J. Syst. Archit. 136: 102833 (2023) - [j88]Yeqing Ren, Haipeng Peng, Lixiang Li, Xiaopeng Xue, Yang Lan, Yixian Yang:
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation. J. Syst. Archit. 143: 102981 (2023) - [j87]Yeqing Ren, Haipeng Peng, Lixiang Li, Xiaopeng Xue, Yang Lan, Yixian Yang:
Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation. IEEE ACM Trans. Audio Speech Lang. Process. 31: 2461-2475 (2023) - [j86]Dawei Zhao, Shudong Li, Zhen Wang, Haipeng Peng:
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control. IEEE Trans. Netw. Sci. Eng. 10(4): 2307-2318 (2023) - [j85]Haipeng Peng, Jie Zhao, Lixiang Li, Yeqing Ren, Shanshan Zhao:
One-Class Adversarial Fraud Detection Nets With Class Specific Representations. IEEE Trans. Netw. Sci. Eng. 10(6): 3793-3803 (2023) - [j84]Yanzhao Tian, Lixiang Li, Haipeng Peng, Ding Wang, Yixian Yang:
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences. IEEE Trans. Serv. Comput. 16(6): 4567-4579 (2023) - [c12]Lixiang Li, Xiaopeng Xue, Haipeng Peng, Yeqing Ren, Mengmeng Zhao:
Improved One-class Learning for Voice Spoofing Detection. APSIPA ASC 2023: 1978-1983 - [c11]Lixiang Li, Yuxuan Liu, Haipeng Peng:
Intrusion Detection Method Based on Complementary Adversarial Generation Network. ICSI (2) 2023: 260-271 - 2022
- [j83]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Yixian Yang:
Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs. Appl. Math. Comput. 420: 126901 (2022) - [j82]Shanshan Zhao, Lixiang Li, Haipeng Peng:
Aligned visual semantic scene graph for image captioning. Displays 74: 102210 (2022) - [j81]Lixiang Li, Sirui Li, Haipeng Peng, Jingguo Bi:
An efficient secure data transmission and node authentication scheme for wireless sensing networks. J. Syst. Archit. 133: 102760 (2022) - [j80]Wei Wu, Haipeng Peng, Fenghua Tong, Lixiang Li, Binzhu Xie:
A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs. Sensors 22(15): 5909 (2022) - [j79]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong:
Construction of Structured Random Measurement Matrices in Semi-Tensor Product Compressed Sensing Based on Combinatorial Designs. Sensors 22(21): 8260 (2022) - [j78]Fenghua Tong, Lixiang Li, Haipeng Peng, Dawei Zhao:
Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing. Signal Process. 194: 108435 (2022) - [j77]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks. IEEE Trans. Cloud Comput. 10(3): 2038-2049 (2022) - [c10]Wei Wu, Haipeng Peng, Lixiang Li:
CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data. DMBD (1) 2022: 255-270 - [c9]Wei Wu, Haipeng Peng, Lixiang Li, Harry Eugene Stanley, Licheng Wang, Jürgen Kurths:
A Novel Intelligent Ant Colony System Based on Blockchain. ICSI (1) 2022: 230-246 - 2021
- [j76]Yanzhao Tian, Lixiang Li, Haipeng Peng, Yixian Yang:
Achieving flatness: Graph labeling can generate graphical honeywords. Comput. Secur. 104: 102212 (2021) - [j75]Zhongkai Dang, Lixiang Li, Haipeng Peng, Jiaxuan Zhang:
Impact of Sudden Global Events on Cross-Field Research Cooperation. Inf. 12(1): 26 (2021) - [j74]Xiangjian Zuo, Lixiang Li, Shoushan Luo, Haipeng Peng, Yixian Yang, Linming Gong:
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks. IEEE Internet Things J. 8(6): 4590-4603 (2021) - [j73]Lixiang Li, Yixin Chen, Haipeng Peng, Yixian Yang:
Chaotic Deep Network for Mobile D2D Communication. IEEE Internet Things J. 8(10): 8078-8096 (2021) - [j72]Zhongkai Dang, Lixiang Li, Wei Ni, Ren Ping Liu, Haipeng Peng, Yixian Yang:
How does rumor spreading affect people inside and outside an institution. Inf. Sci. 574: 377-393 (2021) - [j71]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
Flexible construction of compressed sensing matrices with low storage space and low coherence. Signal Process. 182: 107951 (2021) - [j70]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Syst. J. 15(1): 395-406 (2021) - [j69]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry. IEEE Trans. Inf. Theory 67(8): 5548-5561 (2021) - [c8]Yuan Fang, Lixiang Li, Yixiao Li, Haipeng Peng:
High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network. DSC 2021: 670-676 - 2020
- [j68]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang, Chuan Chen:
Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays. IEEE Access 8: 7103-7116 (2020) - [j67]Xiaoli Qin, Cong Wang, Lixiang Li, Haipeng Peng, Lu Ye:
Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control. IEEE Access 8: 55398-55410 (2020) - [j66]Lixiang Li, Xiaohui Mu, Siying Li, Haipeng Peng:
A Review of Face Recognition Technology. IEEE Access 8: 139110-139120 (2020) - [j65]Shaofang Wang, Lixiang Li, Haipeng Peng, Yixian Yang, Mingwen Zheng:
Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays. IEEE Access 8: 169966-169981 (2020) - [j64]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
An effective algorithm for the spark of sparse binary measurement matrices. Appl. Math. Comput. 371 (2020) - [j63]Haipeng Peng, Bo Yang, Lixiang Li, Yixian Yang:
Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System. IEEE Internet Things J. 7(3): 2432-2451 (2020) - [j62]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Hui Zhao:
A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks. Neural Networks 123: 412-419 (2020) - [j61]Yuan Fang, Lixiang Li, Yixiao Li, Haipeng Peng, Yixian Yang:
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network. Sensors 20(5): 1264 (2020) - [c7]Lixiang Li, Jin Yan, Haipeng Peng, Yixian Yang:
An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments. ICBCT 2020: 105-109 - [i6]Lixiang Li, Zihang Yang, Zhongkai Dang, Cui Meng, Jingze Huang, Hao Tian Meng, Deyu Wang, Guanhua Chen, Jiaxuan Zhang, Haipeng Peng:
Propagation analysis and prediction of the COVID-19. CoRR abs/2003.06846 (2020)
2010 – 2019
- 2019
- [j60]Fan Zhang, Wen Chen, Tao Li, Xiaochun Cao, Haipeng Peng:
An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm. IEEE Access 7: 51886-51898 (2019) - [j59]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang:
Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product. IEEE Access 7: 81599-81611 (2019) - [j58]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
General decay synchronization of complex multi-links time-varying dynamic network. Commun. Nonlinear Sci. Numer. Simul. 67: 108-123 (2019) - [j57]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Lianhai Wang:
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks. Neurocomputing 349: 290-300 (2019) - [j56]Lixiang Li, Lifei Liu, Haipeng Peng, Yixian Yang, Shizhuo Cheng:
Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks. IEEE Internet Things J. 6(2): 3212-3227 (2019) - [j55]Haipeng Peng, Yaqi Mi, Lixiang Li, Harry Eugene Stanley, Yixian Yang:
P-Tensor Product in Compressed Sensing. IEEE Internet Things J. 6(2): 3492-3511 (2019) - [j54]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang:
Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation. Neural Comput. Appl. 31(8): 4031-4047 (2019) - [j53]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Fixed-time synchronization of inertial memristor-based neural networks with discrete delay. Neural Networks 109: 81-89 (2019) - [j52]Manman Yuan, Xiong Luo, Weiping Wang, Lixiang Li, Haipeng Peng:
Pinning Synchronization of Coupled Memristive Recurrent Neural Networks with Mixed Time-Varying Delays and Perturbations. Neural Process. Lett. 49(1): 239-262 (2019) - 2018
- [j51]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang:
Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers. IEEE Access 6: 12085-12102 (2018) - [j50]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays. IEEE Access 6: 40768-40777 (2018) - [j49]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl. Math. Comput. 322: 100-110 (2018) - [j48]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks. Commun. Nonlinear Sci. Numer. Simul. 59: 272-291 (2018) - [j47]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang:
Incremental general non-negative matrix factorization without dimension matching constraints. Neurocomputing 311: 344-352 (2018) - [j46]Xinxin Zhu, Lixiang Li, Jing Liu, Ziyi Li, Haipeng Peng, Xinxin Niu:
Image captioning with triple-attention and stack parallel LSTM. Neurocomputing 319: 55-65 (2018) - [j45]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay. J. Frankl. Inst. 355(14): 6780-6809 (2018) - [j44]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Hui Zhao:
Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control. Neural Comput. Appl. 30(7): 2217-2227 (2018) - [j43]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng:
A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 14-19 (2018) - [j42]Hui Zhao, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation. Neural Process. Lett. 47(2): 509-533 (2018) - [j41]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations. Neural Process. Lett. 47(2): 679-696 (2018) - [j40]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang:
Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks. Neural Process. Lett. 48(3): 1431-1458 (2018) - [j39]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng, Jingfeng Ren, Haochun Qi:
General Theory of security and a study of hacker's behavior in big data era. Peer-to-Peer Netw. Appl. 11(2): 210-219 (2018) - [j38]Yonggang Chen, Lixiang Li, Haipeng Peng, Jinghua Xiao, Qingtao Wu:
Dynamic multi-swarm differential learning particle swarm optimizer. Swarm Evol. Comput. 39: 209-221 (2018) - [j37]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang:
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization. IEEE Trans. Multim. 20(8): 1973-1986 (2018) - [c6]Lixiang Li, Haipeng Peng, Liwei Liu, Yixian Yang:
An Efficient and Secure Transmission Model Based on Compressive Sensing. SocialSec 2018: 27-32 - [c5]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang:
An evaluation method of image scrambling degree based on pixel distribution. SocialSec 2018: 33-38 - 2017
- [j36]Yonggang Chen, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yuhui Shi:
Particle swarm optimizer with two differential mutation. Appl. Soft Comput. 61: 314-330 (2017) - [j35]Hui Zhao, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Mingwen Zheng:
Finite-time topology identification and stochastic synchronization of complex network with multiple time delays. Neurocomputing 219: 39-49 (2017) - [j34]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Finite-time synchronization of memristor-based neural networks with mixed delays. Neurocomputing 235: 83-89 (2017) - [j33]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Hui Zhao:
Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method. Neurocomputing 238: 67-75 (2017) - [j32]Yixian Yang, Haipeng Peng, Lixiang Li, Xinxin Niu:
General Theory of Security and a Study Case in Internet of Things. IEEE Internet Things J. 4(2): 592-600 (2017) - [j31]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Homomorphic Signatures from Chameleon Hash Functions. Inf. Technol. Control. 46(2): 274-286 (2017) - [j30]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multim. Tools Appl. 76(2): 1801-1815 (2017) - [j29]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay. Neural Networks 96: 47-54 (2017) - [j28]Haipeng Peng, Ye Tian, Jürgen Kurths, Lixiang Li, Yixian Yang, Daoshun Wang:
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks. IEEE Trans. Biomed. Circuits Syst. 11(3): 558-573 (2017) - [j27]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 96(1): 813-832 (2017) - [c4]Zhengjun Liu, Hui Zhao, Wen Chen, Xiaochun Cao, Haipeng Peng, Jin Yang, Tao Yang, Ping Lin:
Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune. NCTCS 2017: 133-143 - 2016
- [j26]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Semi-tensor compressed sensing. Digit. Signal Process. 58: 85-92 (2016) - [j25]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Inf. Technol. Control. 45(4): 393-400 (2016) - [j24]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks. KSII Trans. Internet Inf. Syst. 10(3): 1273-1288 (2016) - [j23]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model. KSII Trans. Internet Inf. Syst. 10(5): 2427-2445 (2016) - [j22]Weiping Wang, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations. Neural Process. Lett. 43(1): 49-63 (2016) - [j21]Weiping Wang, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays. Neural Process. Lett. 43(1): 269-283 (2016) - [j20]Hui Zhao, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang:
Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay. Neural Process. Lett. 44(3): 665-679 (2016) - [j19]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 9(2): 449-459 (2016) - [j18]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. Secur. Commun. Networks 9(11): 1321-1330 (2016) - [j17]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. Secur. Commun. Networks 9(11): 1331-1339 (2016) - [j16]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Short lattice signatures with constant-size public keys. Secur. Commun. Networks 9(18): 5490-5501 (2016) - [j15]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks. Sensors 16(6): 837 (2016) - 2015
- [j14]Yanrong Lu, Lixiang Li, Haipeng Peng, Xing Yang, Yixian Yang:
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture. Int. J. Distributed Sens. Networks 11: 635890:1-635890:9 (2015) - [j13]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications. Inf. Technol. Control. 44(4): 404-409 (2015) - [j12]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem. J. Medical Syst. 39(3): 32 (2015) - [j11]Yanrong Lu, Lixiang Li, Haipeng Peng, Dong Xie, Yixian Yang:
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Medical Syst. 39(6): 65:1-65:10 (2015) - [j10]Weiping Wang, Haipeng Peng, Lixiang Li, Jinghua Xiao, Yixian Yang:
Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay. Neural Process. Lett. 41(1): 71-88 (2015) - [j9]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A biometrics and smart cards-based authentication scheme for multi-server environments. Secur. Commun. Networks 8(17): 3219-3228 (2015) - [i5]Jing Yuan, Lixiang Li, Haipeng Peng, Jürgen Kurths, Xiaojing Hua, Yixian Yang:
The effect of randomness for dependency map on the robustness of interdependent lattices. CoRR abs/1509.05117 (2015) - 2014
- [j8]Dawei Zhao, Haipeng Peng, Lixiang Li, SiLi Hui, Yixian Yang:
Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci. 57(9): 1-14 (2014) - [j7]Weiping Wang, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang:
Synchronization control of memristor-based recurrent neural networks with perturbations. Neural Networks 53: 8-14 (2014) - [j6]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 78(1): 247-269 (2014) - 2013
- [c3]Yu-Ying Li, Lixiang Li, Haipeng Peng:
Improving Chaotic Ant Swarm Performance with Three Strategies. ICSI (1) 2013: 268-277 - [i4]Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang:
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350 (2013) - [i3]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A secure and effective anonymous authentication scheme for roaming service in global mobility networks. CoRR abs/1306.4726 (2013) - [i2]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple Vectors Propagation of Epidemics in Complex Networks. CoRR abs/1307.1834 (2013) - [i1]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple routes transmitted epidemics on multiplex networks. CoRR abs/1312.6931 (2013) - 2012
- [j5]Dawei Zhao, Haipeng Peng, Cong Wang, Yixian Yang:
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4): 611-615 (2012) - [j4]Min Lei, Haipeng Peng, Chunyu Yang, Lixiang Li:
Synchronization of Time-Delay Chaotic System in Presence of Noise. Int. J. Comput. Intell. Syst. 5(5): 834-840 (2012) - [j3]Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang, Shize Guo:
Modelling security message propagation in delay tolerant networks. Secur. Commun. Networks 5(1): 51-58 (2012) - 2010
- [c2]Xiaohong Zhang, Yixian Yang, Lixiang Li, Haipeng Peng:
An Extensible Hash Function Construction Based on Embedded Chaos Maps. CIT 2010: 2407-2414
2000 – 2009
- 2007
- [c1]Hongyu Zhu, Zhuzhi Jia, Haipeng Peng, Lixiang Li:
Chaotic Ant Swarm. ICNC (3) 2007: 446-450 - 2006
- [j2]Lixiang Li, Yixian Yang, Haipeng Peng, Xiangdong Wang:
An Optimization Method Inspired by "chaotic" Ant Behavior. Int. J. Bifurc. Chaos 16(8): 2351-2364 (2006) - 2003
- [j1]Xinping Guan, Cailian Chen, Haipeng Peng, Zhengping Fan:
Time-Delayed Feedback Control of Time-Delay Chaotic Systems. Int. J. Bifurc. Chaos 13(1): 193-205 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint