default search action
Wei Peng 0005
Person information
- affiliation: National University of Defense Technology, College of Computer, Changsha, China
Other persons with the same name
- Wei Peng — disambiguation page
- Wei Peng 0001 — Xerox Innovation Group, Webster, NY, USA (and 1 more)
- Wei Peng 0002 — Michigan State University, Department of Media and Information, East Lansing, MI, USA (and 1 more)
- Wei Peng 0003 — Huazhong University of Science and Technology, School of Cyber Science and Engineering, Wuhan, China (and 3 more)
- Wei Peng 0004 — Kunming University of Science and Technology, Faculty of Information Engineering and Automation, Yunnan, China (and 1 more)
- Wei Peng 0006 — Shandong Jianzhu University, School of Information and Electrical Engineering, Jinan, China
- Wei Peng 0007 — Intel Corporation, Folsom, USA (and 1 more)
- Wei Peng 0008 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Wei Peng 0009 — Stanford University, Department of Psychiatry and Behavioral Sciences, Stanford, CA, USA (and 1 more)
- Wei Peng 0010 — Chinese Academy of Military Science, Defense Innovation Institute, Beijing, China (and 2 more)
- Wei Peng 0011 — Huawei Technologies, Shenzhen, China (and 2 more)
- Wei Peng 0012 — Changsha University of Science and Technology, School of Traffic and Transportation Engineering, Institute of Radar Remote Sensing Applications for Traffic Surveying and Mapping, Changsha, China (and 2 more)
- Wei Peng 0013 — New York University, Department of Computer Science, New York, NY, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]ZengRi Zeng, Peng Xun, Wei Peng, Baokang Zhao:
Toward identifying malicious encrypted traffic with a causality detection system. J. Inf. Secur. Appl. 80: 103644 (2024) - [c55]Zixuan Wu, Rongmao Chen, Yi Wang, Qiong Wang, Wei Peng:
An Efficient Hardware Implementation of Crystal-Dilithium on FPGA. ACISP (2) 2024: 64-83 - [c54]ZengRi Zeng, Wei Peng, Baokang Zhao:
Toward Intelligent Attack Detection with a Causal Explainable Method for Encrypting Traffic. ICC 2024: 140-146 - 2023
- [c53]Hang Yang, Rongmao Chen, Qiong Wang, Zixuan Wu, Wei Peng:
Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber. Inscrypt (2) 2023: 111-129 - [c52]Shang Song, Lin Liu, Rongmao Chen, Wei Peng, Yi Wang:
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing. ESORICS (3) 2023: 411-430 - [c51]Haojie Li, Hongzuo Xu, Wei Peng:
Deep Reinforced Active Learning for Time Series Anomaly Detection. ICIC (4) 2023: 115-128 - [c50]Haojie Li, Hongzuo Xu, Wei Peng, Chiran Shen, Xianwen Qiu:
Multi-Scale Sampling Based MLP Networks for Anomaly Detection in Multivariate Time Series. ICPADS 2023: 1421-1428 - [c49]Chaodong Yu, Geming Xia, Linxuan Song, Wei Peng, Jian Chen, Danlei Zhang, Hongfeng Li:
CET-AoTM: Cloud-Edge-Terminal Collaborative Trust Evaluation Scheme for AIoT Networks. ICSOC (2) 2023: 143-158 - 2022
- [j25]ZengRi Zeng, Wei Peng, Detian Zeng, Chong Zeng, Yifan Chen:
Intrusion detection framework based on causal reasoning for DDoS. J. Inf. Secur. Appl. 65: 103124 (2022) - [j24]Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng, Xinyi Huang:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. IEEE Trans. Dependable Secur. Comput. 19(5): 3168-3182 (2022) - [j23]ZengRi Zeng, Wei Peng, Detian Zeng:
Improving the Stability of Intrusion Detection With Causal Deep Learning. IEEE Trans. Netw. Serv. Manag. 19(4): 4750-4763 (2022) - [c48]Yifei Wang, Yuliang Lin, Yi Wang, Wei Peng, Lin Liu:
Algorithm Substitution Attacks on Identity-Based Encryption. SocialSec 2022: 15-31 - [c47]Tongwei Liu, Baokang Zhao, Wei Peng:
An Efficient Certificateless Authentication Scheme for Satellite Internet. TrustCom 2022: 331-338 - 2021
- [c46]Chen Duan, Wei Peng, Baosheng Wang:
CO-BPG: A Centralized Optimizer for Routing in BGP-Based Data Center Networks. AINA (1) 2021: 307-319 - [c45]Pengcheng Wang, Wei Peng, Wenxin Zhang, Gaofeng Lv:
Joint Channel and Power Allocation Algorithm for Flying Ad Hoc Networks Based on Bayesian Optimization. AINA (1) 2021: 320-331 - 2020
- [j22]Wenzheng Liu, Xiaofeng Wang, Wei Peng:
Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things. IEEE Access 8: 8754-8767 (2020) - [j21]Wenzheng Liu, Xiaofeng Wang, Wei Peng:
State of the Art: Secure Mobile Payment. IEEE Access 8: 13898-13914 (2020) - [j20]Wei Peng, Yi Wang, Tao Huang, Hai Wan, David Dai, Jianping Wang:
Editorial of special issue on time-sensitive networking. CCF Trans. Netw. 3(1): 1-3 (2020) - [c44]Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng:
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition. ACISP 2020: 309-329 - [c43]Wenzheng Liu, Xiaofeng Wang, Wei Peng:
NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment. ISCC 2020: 1-6 - [c42]Wei Peng, Shang Song, Wenzheng Liu:
An Improved Cryptanalysis Algorithm for Chebyshev Map-Based Discrete Logarithm Problem. SpaCCS 2020: 118-130
2010 – 2019
- 2019
- [j19]Wenzheng Liu, Xiaofeng Wang, Wei Peng, Qianqian Xing:
Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services. IEEE Access 7: 137770-137783 (2019) - [j18]Xing Zhou, Huaimin Wang, Wei Peng, Bo Ding, Rui Wang:
Solving multi-scenario cardinality constrained optimization problems via multi-objective evolutionary algorithms. Sci. China Inf. Sci. 62(9): 192104:1-192104:18 (2019) - [j17]Song Liu, Wei Peng, Biao Han:
Analysis and Optimization of Full-Duplex Access Point Deployment for WLANs. IEICE Trans. Commun. 102-B(6): 1209-1218 (2019) - [j16]Xing Zhou, Huaimin Wang, Bo Ding, Wei Peng, Rui Wang:
Multi-objective evolutionary computation for topology coverage assessment problem. Knowl. Based Syst. 177: 1-10 (2019) - 2018
- [j15]Song Liu, Biao Han, Wei Peng:
A Polling-Based Traffic-Aware MAC Protocol for Centralized Full-Duplex Wireless Networks. IEEE Access 6: 28225-28238 (2018) - [c41]Wei Peng, Dongxing Li, Wenping Deng:
Flow Control with Max-Min Fairness and Path Constraints in Software-Defined Networks. BlackSeaCom 2018: 1-5 - [c40]Fangyu Gai, Baosheng Wang, Wenping Deng, Wei Peng:
Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network. DASFAA (2) 2018: 666-681 - [c39]Song Liu, Wei Peng, Biao Han:
Exploiting Full-Duplex Communication in AP-Based Wireless Networks via a Novel MAC Protocol. ICC 2018: 1-7 - [c38]Dongxing Li, Wei Peng, Wenping Deng, Fangyu Gai:
A Blockchain-Based Authentication and Security Mechanism for IoT. ICCCN 2018: 1-6 - 2017
- [c37]Zechen Zhang, Wei Peng, Song Liu:
A secure and reliable coding scheme over wireless links in cyber-physical systems. ICC Workshops 2017: 1079-1085 - 2016
- [j14]Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing Resilience of Inter-Domain Routing System under Regional Failures. KSII Trans. Internet Inf. Syst. 10(4): 1630-1642 (2016) - [c36]Wei Peng, Dongxia Wang, Xinwen Jiang:
Empirical Study of Phase Transition of Hamiltonian Cycle Problem in Random Graphs with Degrees Greater Than One. FAW 2016: 194-204 - 2014
- [j13]Yongquan Fu, Yijie Wang, Wei Peng:
CommonFinder: A decentralized and privacy-preserving common-friend measurement method for the distributed online social networks. Comput. Networks 64: 369-389 (2014) - [j12]Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet. New Gener. Comput. 32(3-4): 237-255 (2014) - [j11]Yujing Liu, Wei Peng, Jinshu Su:
A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Networks 7(11): 2201-2210 (2014) - [j10]Wei Peng, Guohua Dong, Kun Yang, Jinshu Su:
A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks. IEEE Trans. Mob. Comput. 13(12): 2706-2718 (2014) - [c35]Xing Zhou, Wei Peng, Bo Yang:
GEAS: A GA-ES-mixed algorithm for parameterized optimization problems - Using CLS problem as an example. IEEE Congress on Evolutionary Computation 2014: 888-894 - [c34]Xing Zhou, Wei Peng:
A Preciser LP-Based Algorithm for Critical Link Set Problem in Complex Networks. CSOC 2014: 263-275 - 2013
- [j9]Yong Wang, Wei Peng, Qiang Dou, Zhenghu Gong:
Stationary Distribution for the Mobilities in Catastrophe Rescue Scenario. KSII Trans. Internet Inf. Syst. 7(2): 308-326 (2013) - [j8]Qiang Dou, Yong Wang, Wei Peng, Zhenghu Gong:
Closed Walk Ferry Route Design for Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 7(10): 2357-2375 (2013) - [j7]Feng Zhao, Baosheng Wang, Xiaofeng Hu, Wei Peng, Chunqing Wu:
Understanding the Influence of Network Topology and Network-layer Naming on the Scalability of Routing. J. Commun. 8(10): 672-680 (2013) - [c33]Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing Survivability of Inter-domain Routing System under Cascading Failures. ICoC 2013: 97-108 - [c32]Zhijian Huang, Wei Peng, Yongjun Wang, Ruiyuan Zhao:
A Study of LDoS Flows Variations Based on Similarity Measurement. IDCS 2013: 209-222 - [c31]Yanpeng Ma, Wei Peng, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Chunqing Wu:
A Location Management Algorithm for LEO Satellite Networks. TrustCom/ISPA/IUCC 2013: 1362-1366 - [c30]Yanpeng Ma, Wei Peng, Wanrong Yu, Jinshu Su, Chunqing Wu, Guohong Zhao:
A Distributed Routing Algorithm for LEO Satellite Networks. TrustCom/ISPA/IUCC 2013: 1367-1371 - 2012
- [j6]Baokang Zhao, Wei Peng, Ziming Song, Jinshu Su, Chunqing Wu, Wanrong Yu, Qiaolin Hu:
Towards efficient and practical network coding in delay tolerant networks. Comput. Math. Appl. 63(2): 588-600 (2012) - [j5]Wei Peng, Zimu Li, Yujing Liu, Jinshu Su:
Assessing the vulnerability of network topologies under large-scale regional failures. J. Commun. Networks 14(4): 451-460 (2012) - [c29]Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao:
The Relation on Prefix Hijacking and the Internet Hierarchy. IMIS 2012: 415-420 - [c28]Feng Zhao, Dan Zhao, Xiaofeng Hu, Wei Peng, Baosheng Wang, Zexin Lu:
A 3N Approach to Network Control and Management. IPDPS Workshops 2012: 1237-1242 - [c27]Wei Peng, Guohua Dong, Kun Yang, Jinshu Su, Jun Wu:
A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant Networks. MSN 2012: 140-146 - [c26]Chengjun Wang, Baokang Zhao, Wei Peng, Chunqing Wu, Zhenghu Gong:
Routing Algorithm Based on Ant Colony Optimization for DTN Congestion Control. NBiS 2012: 715-720 - [c25]Chengjun Wang, Baokang Zhao, Wei Peng, Chunqing Wu, Zhenghu Gong:
Following Routing: An Active Congestion Control Approach for Delay-Tolerant Networks. NBiS 2012: 727-732 - [c24]Wei Peng, Qingfu Zhang:
Network Topology Planning Using MOEA/D with Objective-Guided Operators. PPSN (2) 2012: 62-71 - [c23]Wei Peng, Xiaofeng Hu, Feng Zhao, Jinshu Su:
A Fast Algorithm to Find All-Pairs Shortest Paths in Complex Networks. ICCS 2012: 557-566 - 2011
- [c22]Wei Peng, Zimu Li, Jinshu Su, Muwei Dong:
Evaluation of Topological Vulnerability of the Internet under Regional Failures. ARES 2011: 164-175 - [c21]Baokang Zhao, Ziming Song, Jinshu Su, Wei Peng, Qiaolin Hu:
NTC: Towards Efficient Network Coding in Delay Tolerant Networks. IMIS 2011: 57-64 - [c20]Zhu Tang, Bo Liu, Baokang Zhao, Wanrong Yu, Chunqing Wu, Wei Peng, Bing Bai, Yanpeng Ma:
Building Practical Self Organization Networks on Heterogeneous Wireless Modems. IMIS 2011: 388-393 - [c19]Yujing Liu, Wei Peng, Jinshu Su:
Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning. TrustCom 2011: 922-926 - 2010
- [c18]Wei Peng, Baokang Zhao, Wanrong Yu, Chunqing Wu, Xiaorong Yan:
Ferry Route Design with Delay Bounds in Delay-Tolerant Networks. CIT 2010: 281-288 - [c17]Yong Wang, Wei Peng, Xilong Mao, Zhenghu Gong:
RWPAD: A Mobility Model for DTN Routing Performance Evaluation. EUC 2010: 460-465
2000 – 2009
- 2009
- [j4]Baokang Zhao, Jinshu Su, Wei Peng, YingZhi Zeng, Meng Wang:
An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems. Intell. Autom. Soft Comput. 15(3): 485-493 (2009) - 2008
- [j3]Lei Gao, Zhenghu Gong, Yaping Liu, Ming-che Lai, Wei Peng:
A TLP approach for BGP based on local speculation. Sci. China Ser. F Inf. Sci. 51(11): 1772-1784 (2008) - [c16]Wei Peng, Qingfu Zhang:
A Decomposition-based Multi-objective Particle Swarm Optimization Algorithm for Continuous Optimization Problems. GrC 2008: 534-537 - 2006
- [c15]Yantao Pan, Wei Peng, Xicheng Lu:
Traffic Management Genetic Algorithm Supporting Data Mining and QoS in Sensor Networks. ADMA 2006: 992-999 - [c14]Yantao Pan, Qiang Jian, Zexin Lu, Wei Peng:
Traffic Management Optimization on Power-Controllable Sensor Networks. GCC Workshops 2006: 444-451 - [c13]Yantao Pan, Wei Peng, Xicheng Lu:
A Vertex-Arc-United Bidirectional Adjustment Algorithm in Lifetime Optimization of Sensor Networks. ICICIC (1) 2006: 72-75 - [c12]Yantao Pan, Wei Peng, Xicheng Lu, Shen Ma, Peidong Zhu:
A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks. UIC 2006: 457-467 - [c11]Yantao Pan, Wei Peng, Xicheng Lu:
A Genetic Algorithm on Multi-sensor Networks Lifetime Optimization. WASA 2006: 295-306 - 2005
- [c10]Ming Li, Xicheng Lu, Wei Peng:
Dynamic Delaunay Triangulation for Wireless Ad Hoc Network. APPT 2005: 382-389 - [c9]Hui-Yao An, Xicheng Lu, Wei Peng:
Multipath Traffic Allocation Based on Ant Optimization Algorithm with Reusing Abilities in MANET. GCC 2005: 978-983 - [c8]Qianbing Zheng, Xicheng Lu, Peidong Zhu, Wei Peng:
An efficient random walks based approach to reducing file locating delay in unstructured P2P network. GLOBECOM 2005: 5 - [c7]Hui-Yao An, Xicheng Lu, Zhenghu Gong, Wei Peng:
A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET. HPCC 2005: 321-330 - [c6]Xiaozhe Zhang, Wei Peng, Peidong Zhu:
ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router. ICCNMC 2005: 752-761 - [c5]Xicheng Lu, Qianbing Zheng, Peidong Zhu, Wei Peng:
LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network. ICN (2) 2005: 793-799 - [c4]Hui-Yao An, Ling Zhong, Xicheng Lu, Wei Peng:
A cluster-based multipath dynamic source routing in MANET. WiMob (3) 2005: 369-376 - 2004
- [c3]Jianjun Bai, Xicheng Lu, Zexin Lu, Wei Peng:
A Distributed Hierarchical Routing Protocol for Non-GEO Satellite Networks. ICPP Workshops 2004: 148-154 - [c2]Qianbing Zheng, Wei Peng, Yongwen Wang, Xicheng Lu:
An Efficient Broadcast Algorithm Based on Connected Dominating Set in Unstructured Peer-to-Peer Network. WISE 2004: 724-729 - 2001
- [j2]Wei Peng, Xicheng Lu:
AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks. J. Comput. Sci. Technol. 16(2): 114-125 (2001) - 2000
- [c1]Wei Peng, Xicheng Lu:
On the reduction of broadcast redundancy in mobile ad hoc networks. MobiHoc 2000: 129-130
1990 – 1999
- 1999
- [j1]Wei Peng, Xicheng Lu:
An approach to support IP multicasting in networks with mobile hosts. J. Comput. Sci. Technol. 14(6): 529-538 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint