Fei Peng

According to our database1, Fei Peng authored at least 161 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
IEEE Trans. Reliability, 2019

Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers.
IEEE Trans. Information Forensics and Security, 2019

Stepwise Magnetization Control Strategy for DC-Magnetized Memory Machine.
IEEE Trans. Industrial Electronics, 2019

General Analytical Modeling for Magnet Demagnetization in Surface Mounted Permanent Magnet Machines.
IEEE Trans. Industrial Electronics, 2019

A New Hybrid Method for Magnetic Field Calculation in IPMSM Accounting for Any Rotor Configuration.
IEEE Trans. Industrial Electronics, 2019

A New Application of Random Forest Algorithm to Estimate Coverage of Moss-Dominated Biological Soil Crusts in Semi-Arid Mu Us Sandy Land, China.
Remote Sensing, 2019

A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates.
Multimedia Tools Appl., 2019

Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.
Multimedia Tools Appl., 2019

Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree.
IJDCF, 2019

Establishment of cellular automata image model and its application in image dimension measurement.
EURASIP J. Image and Video Processing, 2019

Source identification of 3D printed objects based on inherent equipment distortion.
Computers & Security, 2019

Investigation Study of the Influence of Pole Numbers on Torque Density and Flux-Weakening Ability of Fractional Slot Concentrated Winding Wheel-Hub Machines.
IEEE Access, 2019

FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.
IEEE Access, 2019

2018
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification.
IEEE Trans. Multimedia, 2018

A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.
IEEE Trans. Information Forensics and Security, 2018

Face presentation attack detection using guided scale texture.
Multimedia Tools Appl., 2018

Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.
J. Visual Communication and Image Representation, 2018

Separable reversible data hiding and encryption for HEVC video.
J. Real-Time Image Processing, 2018

Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling.
IJDCF, 2018

A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
IJDCF, 2018

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
IJDCF, 2018

Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching.
Digital Signal Processing, 2018

Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Prototype Performance Analysis for V2V Communications using USRP-based Software Defined Radio Platform.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

Neural Representation Of Harmonic Single Sideband Encoder In Inferior Colliculus Of Guinea Pigs.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.
Sig. Proc.: Image Comm., 2017

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multimedia Tools Appl., 2017

A novel design and analysis of comparator with XNOR gate for QCA.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

Identifying source camera using guided image estimation and block weighted average.
J. Visual Communication and Image Representation, 2017

High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion.
Neurocomputing, 2017

An Improved Three-dimensional DV-Hop Localization Algorithm Optimized by Adaptive Cuckoo Search Algorithm.
Int. J. Online Eng., 2017

A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.
IJDCF, 2017

Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos.
I. J. Bifurcation and Chaos, 2017

A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Implementing automatic transfer scheme in a main-tie-main configuration using IEC 61850.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Active damping control of modular multilevel converter with output filter for high-speed PM motor drive.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

DC-bus design with hybrid capacitor bank in single-phase PV inverters.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Attitude and Position Control of Quadrotor UAV Using PD-Fuzzy Sliding Mode Control.
Proceedings of the Intelligent Robotics and Applications - 10th International Conference, 2017

Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017


Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

2016
Using an Insect Mushroom Body Circuit to Encode Route Memory in Complex Natural Environments.
PLoS Computational Biology, 2016

Image tamper detection based on noise estimation and lacunarity texture.
Multimedia Tools Appl., 2016

An Experimental Study on Multihop D2D Communications Based on Smartphones.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2016

Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Scalable Segment Abstraction Method for Advertising Campaign Admission and Inventory Allocation Optimization.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Analysis on temporal-spatial change of vegetation coverage in Hulunbuir Steppe (2000-2014).
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

OnSeS: A Novel Online Short Text Summarization Based on BM25 and Neural Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Neural representation of different mandarin tones in the inferior colliculus of the guinea pig.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

An Eye Tracking Research on Debugging Strategies towards Different Types of Bugs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Quantitative analysis of spine angle range of individuals with low back pain performing dynamic exercises.
Proceedings of the 13th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2016

Quantitative analysis of lumbar muscles performance of patients with lumbar disc herniation based on surface electromyography.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, 2016

2015
A Novel Adaptive Mobility-Aware MAC Protocol in Wireless Sensor Networks.
Wireless Personal Communications, 2015

A High-Frequency-Link Single-Phase PWM Rectifier.
IEEE Trans. Industrial Electronics, 2015

An energy-efficient mobility-supporting MAC protocol in wireless sensor networks.
Journal of Communications and Networks, 2015

A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization.
IJDCF, 2015

A Novel TDMA-MAC Protocol for VANET Using Cooperative and Opportunistic Transmissions.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Algorithms for the Hybrid Fleet Vehicle Routing Problem.
Proceedings of the 1st International Conference on Vehicle Technology and Intelligent Transport Systems, 2015

Vehicle Routing to Minimizing Hybrid Fleet Fuel Consumption.
Proceedings of the Smart Cities, Green Technologies, and Intelligent Transport Systems, 2015

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Efficient Implementation of MIPS Code Generator for the IonMonkey JavaScript Compiler.
Proceedings of the Advanced Parallel Processing Technologies, 2015

2014
Regenerative Braking System of Electric Vehicle Driven by Brushless DC Motor.
IEEE Trans. Industrial Electronics, 2014

The QoS Prediction of Web Service with Location Information Ensemble.
JSW, 2014

Population-based Algorithm Portfolios with automated constituent algorithms selection.
Inf. Sci., 2014

Interference Coordination with Vertical Beamforming in 3D MIMO-OFDMA Networks.
IEEE Communications Letters, 2014

Improved PVO-based reversible data hiding.
Digital Signal Processing, 2014

Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU.
Digital Investigation, 2014

Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting.
Computer-Aided Design, 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

A phase shifted full bridge converter with ZCS synchronous rectifier for auxiliary power units.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Short-wavelength near infrared stimulation of the inner ear hair cells.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Double Circulation Wear Leveling for PCM-Based Embedded Systems.
Proceedings of the Advanced Computer Architecture - 10th Annual Conference, 2014

2013
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos.
IEEE Trans. Information Forensics and Security, 2013

A reversible watermark scheme for 2D vector map based on reversible contrast mapping.
Security and Communication Networks, 2013

An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System.
IJDCF, 2013

Geo-location database based TV white space for interference mitigation in LTE femtocell networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

RNTP-based resource block allocation in LTE downlink indoor scenarios.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Separate Horizontal amp; Vertical Codebook Based 3D MIMO Beamforming Scheme in LTE-A Networks.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Wireless energy transfer system based on high Q flexible planar-Litz MEMS coils.
Proceedings of the 8th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2013

Consensus Predictive Control for 360MN Extrusion Machine.
Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, 2013

Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
An Application Oriented Power Saving MAC Protocol for Wireless Sensor Networks.
Wireless Personal Communications, 2012

Adaptive reversible data hiding scheme based on integer transform.
Signal Processing, 2012

A Wireless Magnetic Resonance Energy Transfer System for Micro Implantable Medical Sensors.
Sensors, 2012

Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features.
IJDCF, 2012

Bit error rate improvement for chaos shift keying chaotic communication systems.
IET Communications, 2012

Throughput Modeling of Differentiation Schemes for IEEE 802.11e MAC Protocol.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

TCP Performance Evaluation over GEO and LEO Satellite Links between Performance Enhancement Proxies.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

AntOM: Constructing multi-layer overlays for pervasive environments.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Information Systems And Hospital Work: A Structuralist Investigation.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Calibration Based Reliable Detector for Detecting LSB Matching Steganography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Comparative study on flight reference symbology for helmet-mounted display based on eye tracking technology.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

A framework for the autonomic management of multi-layer P2P overlays.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2012

Reviews on cognitive access to TV White Space.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Control system simulation for 360MN extrusion machine based on physical model.
Proceedings of the 2012 IEEE International Conference on Automation Science and Engineering, 2012

2011
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features.
IJDCF, 2011

An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM.
IJDCF, 2011

Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication.
IEEE Communications Letters, 2011

A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Computer-Aided Design, 2011

Bio-inspired monitoring of pervasive environments.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Alleviate the Hypervolume Degeneration Problem of NSGA-II.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Reversible image water marking based on prediction-error expansion and compensation.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

A self-management framework for efficient resource discovery in pervasive environments.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

Optimising P2P Overlays for Pervasive Environments.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Population-Based Algorithm Portfolios for Numerical Optimization.
IEEE Trans. Evolutionary Computation, 2010

Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs.
European Transactions on Telecommunications, 2010

Mobile Networks Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs.
European Transactions on Telecommunications, 2010

A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation.
Computer-Aided Design, 2010

Why Requirements Engineering Fails: A Survey Report from China.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Improved DE-Based Reversible Watermarking Using Sorting and Histogram Shifting.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Understanding Hospital Information Systems Adoption in China.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

The Impact of Two-Factor Authentication Technology on the Adoption of Internet Banking.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

Understanding the Adoption of Electronic Banking in China.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Understanding Chinese Characteristics of Requirements Engineering.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.
Proceedings of the Information Security and Digital Forensics, 2009

Optimizing quantum teleportation circuit using genetic algorithm.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Multi-start JADE with knowledge transfer for numerical optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
MLSD Bounds and Receiver Designs for Clipped OFDM Channels.
IEEE Trans. Wireless Communications, 2008

MEGORE: Multimedia Enhanced Goal-Oriented Requirement Elicitation Experience in China.
Proceedings of the 2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering, 2008

Exploring the National Context in Electronic Commerce Adoption in Developing Countries.
Proceedings of the Pacific Asia Conference on Information Systems, 2008

Semantic Feature Extraction for Brain CT Image Clustering Using Nonnegative Matrix Factorization.
Proceedings of the Medical Biometrics, First International Conference, 2008

A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Pre-Processing of CT Brain Images for Content-Based Image Retrieval.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Coded Non-Ideal OFDM Systems: Analysis and Receiver Designs.
PhD thesis, 2007

Enhancing Fairness and Throughput of TCP in Heterogeneous Wireless Access Networks.
IJWIN, 2007

Adaptive Modulation and Coding for IEEE 802.11n.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

On Residual Carrier Frequency Offset Mitigation for 802.11N.
Proceedings of the IEEE International Conference on Acoustics, 2007

MLSD Bounds for Clipped OFDM Systems Over Frequency-Selective Quasi-Static Fading Channels.
Proceedings of the Global Communications Conference, 2007

MLSD Bounds and Near-Optimum Receiver Designs for Clipped OFDM Channels.
Proceedings of the Global Communications Conference, 2007

2006
Simplified eIRA code design and performance analysis for correlated Rayleigh fading channels.
IEEE Trans. Wireless Communications, 2006

Cross-layer enhancement of TCP split-connections over satellites links.
Int. J. Satellite Communications Networking, 2006

Surrogate-channel design of universal LDPC codes.
IEEE Communications Letters, 2006

Design of structured eIRA codes with applications to wireless channels.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Low-complexity soft demapper for OFDM fading channels with ICI.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Software Project Level Estimation Model Framework based on Bayesian Belief Networks.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

On the Capacity of Clipped OFDM Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Analysis of Burst Transmission in IEEE 802.11e Wireless LANs.
Proceedings of IEEE International Conference on Communications, 2006

2005
A novel flow control scheme for improving TCP fairness and throughput over heterogeneous networks with wired and wireless links.
Proceedings of IEEE International Conference on Communications, 2005

New approaches to clipped OFDM channels: modeling and receiver design.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Dynamic congestion control for satellite networks employing TCP performance enhancement proxies.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Dynamic Congestion Control to Improve Performance of TCP Split-Connections over Satellite Links.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Design and analysis of eIRA codes on correlated fading channels.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Enhancing fairness and throughput of TCP in heterogeneous wireless networks.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

A novel fair bandwidth allocation algorithm for TCP window control.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

2002
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

2000
Delay performance analysis of token-based fast TCP in window limit systems.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...