default search action
Jialiang Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Juyan Li, Mingyan Yan, Jialiang Peng, Haodong Huang, Ahmed A. Abd El-Latif:
A lattice-based efficient certificateless public key encryption for big data security in clouds. Future Gener. Comput. Syst. 158: 255-266 (2024) - [j24]Weixiang Han, Jialiang Peng, Jiahua Yu, Jiawen Kang, Jiaxun Lu, Dusit Niyato:
Heterogeneous Data-Aware Federated Learning for Intrusion Detection Systems via Meta-Sampling in Artificial Intelligence of Things. IEEE Internet Things J. 11(8): 13340-13354 (2024) - [j23]Ruofan Zhang, Jialiang Peng, Hailin Chen, Hao Peng, Yi Wang, Ping Jiang:
Enhancing Aboveground Biomass Prediction through Integration of the SCDR Paradigm into the U-Like Hierarchical Residual Fusion Model. Sensors 24(8): 2464 (2024) - [j22]Jialiang Peng, Cheng Ouyang, Hao Peng, Wenwu Hu, Yi Wang, Ping Jiang:
MultiFuseYOLO: Redefining Wine Grape Variety Recognition through Multisource Information Fusion. Sensors 24(9): 2953 (2024) - [j21]Pei Li, Zhijun Liu, Jialiang Peng, Lili Zhou, Tongjun Liu, Yi Wu, Ahmed A. Abd El-Latif:
Personalized Federated Learning for Goods Classification in Wireless Sensor-Assisted Smart Warehouses. IEEE Trans. Consumer Electron. 70(1): 4178-4186 (2024) - [c11]Weixiang Han, Chengjun Cai, Yu Guo, Jialiang Peng:
ERL-MR: Harnessing the Power of Euler Feature Representations for Balanced Multi-modal Learning. ACM Multimedia 2024: 4591-4600 - 2022
- [j20]Xin Nie, Jialiang Peng, Yi Wu, Brij B. Gupta, Ahmed A. Abd El-Latif:
Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach. Big Data Res. 28: 100313 (2022) - [j19]Xiaomei Zhou, Xin Guan, Di Sun, Haiyang Jiang, Jialiang Peng, Yan Jin, Yan Zhang:
Transient Stability Assessment Based on Gated Graph Neural Network With Imbalanced Data in Internet of Energy. IEEE Internet Things J. 9(12): 9320-9331 (2022) - [j18]Minrui Xu, Jialiang Peng, Brij B. Gupta, Jiawen Kang, Zehui Xiong, Zhenni Li, Ahmed A. Abd El-Latif:
Multiagent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22095-22108 (2022) - [j17]Juyan Li, Zhiqi Qiao, Jialiang Peng:
Asymmetric Group Key Agreement Protocol Based on Blockchain and Attribute for Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(11): 8326-8335 (2022) - [j16]Yi Liu, Ruihui Zhao, Jiawen Kang, Abdulsalam Yassine, Dusit Niyato, Jialiang Peng:
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things. ACM Trans. Internet Techn. 22(3): 59:1-59:22 (2022) - [j15]Xiangyun Tang, Liehuang Zhu, Meng Shen, Jialiang Peng, Jiawen Kang, Dusit Niyato, Ahmed A. Abd El-Latif:
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things. IEEE Wirel. Commun. 29(3): 14-22 (2022) - [i4]Pei Li, Zhijun Liu, Luyi Chang, Jialiang Peng, Yi Wu:
FedBA: Non-IID Federated Learning Framework in UAV Networks. CoRR abs/2210.04699 (2022) - 2021
- [j14]Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Irfan Mehmood, Khan Muhammad, Salvador E. Venegas-Andraca, Jialiang Peng:
Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities. Inf. Process. Manag. 58(4): 102549 (2021) - [j13]Jialiang Peng, Bian Yang, Brij B. Gupta, Ahmed A. Abd El-Latif:
A biometric cryptosystem scheme based on random projection and neural network. Soft Comput. 25(11): 7657-7670 (2021) - [j12]Jialiang Peng, Bian Yang, Brij B. Gupta, Ahmed A. Abd El-Latif:
Correction to: A biometric cryptosystem scheme based on random projection and neural network. Soft Comput. 25(11): 7671 (2021) - [j11]Alexander Paramonov, Jialiang Peng, Dmitry Kashkarov, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif:
Study and Analysis of Multiconnectivity for Ultrareliable and Low-Latency Features in Networks and V2X Communications. Wirel. Commun. Mob. Comput. 2021: 1718099:1-1718099:10 (2021) - 2020
- [j10]Yi Wu, Yi Liu, Syed Hassan Ahmed, Jialiang Peng, Ahmed A. Abd El-Latif:
Dominant Data Set Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation. IEEE Internet Things J. 7(5): 4347-4360 (2020) - [j9]Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif:
A Secure Federated Learning Framework for 5G Networks. IEEE Wirel. Commun. 27(4): 24-31 (2020) - [c10]Zhiqiang Xu, Dawei Hao, Yi Wu, Jialiang Peng:
A Random Binarization Scheme for Deep Face Feature Protection. CSAE 2020: 125:1-125:5 - [i3]Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif:
A Secure Federated Learning Framework for 5G Networks. CoRR abs/2005.05752 (2020) - [i2]Yi Liu, Ruihui Zhao, Jiawen Kang, Abdulsalam Yassine, Dusit Niyato, Jialiang Peng:
Towards Communication-efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things. CoRR abs/2012.04436 (2020)
2010 – 2019
- 2019
- [c9]Yi Liu, Jialiang Peng, James Jian Qiao Yu, Yi Wu:
PPGAN: Privacy-Preserving Generative Adversarial Network. ICPADS 2019: 985-989 - [i1]Yi Liu, Jialiang Peng, James Jian Qiao Yu, Yi Wu:
PPGAN: Privacy-preserving Generative Adversarial Network. CoRR abs/1910.02007 (2019) - 2017
- [c8]Jialiang Peng, Bian Yang:
A Novel Binarization Scheme for Real-Valued Biometric Feature. COMPSAC (2) 2017: 724-729 - [c7]Jialiang Peng, Ahmed A. Abd El-Latif, Akram Belazi, Zbigniew Kotulski:
Efficient chaotic nonlinear component for secure cryptosystems. ICUFN 2017: 989-993 - 2015
- [j8]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystem based on score-level fusion. Int. J. Comput. Appl. Technol. 51(2): 120-130 (2015) - [j7]Fanglin Wang, Jialiang Peng, Yongjie Li:
Hypergraph based feature fusion for 3-D object retrieval. Neurocomputing 151: 612-619 (2015) - [j6]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics. Multim. Tools Appl. 74(13): 4469-4486 (2015) - [j5]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xuehu Yan, Xiamu Niu:
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9(Supplement-1): 99-109 (2015) - 2014
- [j4]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystems: fusion strategy and template security. J. Electronic Imaging 23(2): 023001 (2014) - [j3]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multim. Tools Appl. 72(3): 2339-2358 (2014) - [c6]Gang Wang, Zhifeng Zhao, Jialiang Peng, Rongpeng Li, Honggang Zhang:
An approximate algorithm of controller configuration in multi-domain SDN architecture. ChinaCom 2014: 601-605 - [c5]Jialiang Peng, Qiong Li, Xiamu Niu:
A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm. IIH-MSP 2014: 239-242 - 2013
- [j2]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Ning Wang, Xiamu Niu:
Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns. IEICE Trans. Inf. Syst. 96-D(8): 1886-1889 (2013) - [j1]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification. J. Electronic Imaging 22(2): 023013 (2013) - [c4]Jialiang Peng, Qiong Li, Qi Han, Xiamu Niu:
Feature-Level Fusion of Finger Biometrics Based on Multi-set Canonical Correlation Analysis. CCBR 2013: 216-224 - [c3]Ahmed A. Abd El-Latif, Ning Wang, Jialiang Peng, Qiong Li, Xiamu Niu:
A new encryption scheme for color images based on quantum chaotic system in transform domain. ICDIP 2013: 88781S - [c2]Jialiang Peng, Qiong Li, Ning Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
An effective preprocessing method for finger vein recognition. ICDIP 2013: 887808 - 2012
- [c1]Jialiang Peng, Ning Wang, Ahmed A. Abd El-Latif, Qiong Li, Xiamu Niu:
Finger-vein Verification Using Gabor Filter and SIFT Feature Matching. IIH-MSP 2012: 45-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint