Haipeng Peng

According to our database1, Haipeng Peng authored at least 64 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Pinning Synchronization of Coupled Memristive Recurrent Neural Networks with Mixed Time-Varying Delays and Perturbations.
Neural Processing Letters, 2019

Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019

Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Computing and Applications, 2019

P-Tensor Product in Compressed Sensing.
IEEE Internet of Things Journal, 2019

Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet of Things Journal, 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm.
IEEE Access, 2019

Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019

2018
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multimedia, 2018

Dynamic multi-swarm differential learning particle swarm optimizer.
Swarm and Evolutionary Computation, 2018

General Theory of security and a study of hacker's behavior in big data era.
Peer-to-Peer Networking and Applications, 2018

Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation.
Neural Processing Letters, 2018

Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Processing Letters, 2018

Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Processing Letters, 2018

A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.
IEEE Network, 2018

Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Computing and Applications, 2018

Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Franklin Institute, 2018

Image captioning with triple-attention and stack parallel LSTM.
Neurocomputing, 2018

Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018

Adaptive synchronization of memristor-based BAM neural networks with mixed delays.
Applied Mathematics and Computation, 2018

Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018

Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays.
IEEE Access, 2018

An Efficient and Secure Transmission Model Based on Compressive Sensing.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wireless Personal Communications, 2017

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits and Systems, 2017

Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multimedia Tools Appl., 2017

Homomorphic Signatures from Chameleon Hash Functions.
ITC, 2017

General Theory of Security and a Study Case in Internet of Things.
IEEE Internet of Things Journal, 2017

Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017

Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017

Finite-time synchronization of memristor-based neural networks with mixed delays.
Neurocomputing, 2017

Particle swarm optimizer with two differential mutation.
Appl. Soft Comput., 2017

Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016

Short lattice signatures with constant-size public keys.
Security and Communication Networks, 2016

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Security and Communication Networks, 2016

Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Security and Communication Networks, 2016

A secure and efficient mutual authentication scheme for session initiation protocol.
Peer-to-Peer Networking and Applications, 2016

Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Processing Letters, 2016

Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Processing Letters, 2016

Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Processing Letters, 2016

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model.
TIIS, 2016

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
TIIS, 2016

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
ITC, 2016

Semi-tensor compressed sensing.
Digital Signal Processing, 2016

2015
A biometrics and smart cards-based authentication scheme for multi-server environments.
Security and Communication Networks, 2015

Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Processing Letters, 2015

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Systems, 2015

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Systems, 2015

A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
ITC, 2015

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
IJDSN, 2015

2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2014

Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014

Novel way to research nonlinear feedback shift register.
SCIENCE CHINA Information Sciences, 2014

2013
Improving Chaotic Ant Swarm Performance with Three Strategies.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

2012
Modelling security message propagation in delay tolerant networks.
Security and Communication Networks, 2012

Synchronization of Time-Delay Chaotic System in Presence of Noise.
Int. J. Comput. Intell. Syst., 2012

A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Computers & Mathematics with Applications, 2012

2010
An Extensible Hash Function Construction Based on Embedded Chaos Maps.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2007
Chaotic Ant Swarm.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Optimization Method Inspired by "chaotic" Ant Behavior.
I. J. Bifurcation and Chaos, 2006

2003
Time-Delayed Feedback Control of Time-Delay Chaotic Systems.
I. J. Bifurcation and Chaos, 2003


  Loading...