Peng Li
According to our database1,
Peng Li
authored at least 72 papers
between 2012 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2021
2020
Sensors, 2020
Int. J. Parallel Emergent Distributed Syst., 2020
计算机科学, 2020
J. Parallel Distributed Comput., 2020
Vehicle Pedestrian Detection Method Based on Spatial Pyramid Pooling and Attention Mechanism.
Inf., 2020
Concurr. Comput. Pract. Exp., 2020
IEEE Commun. Mag., 2020
2019
J. Signal Process. Syst., 2019
Sensors, 2019
Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
Int. J. Inf. Comput. Secur., 2019
Representing and reasoning fuzzy spatio- temporal knowledge with description logics: A survey.
Intell. Data Anal., 2019
PRDL: Relative Localization Method of RFID Tags via Phase and RSSI Based on Deep Learning.
IEEE Access, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Parallel Absorbing Diagonal Algorithm: A Scalable Iterative Parallel Fast Eigen-Solver for Symmetric Matrices.
Proceedings of the Data Science - 6th International Conference, 2019
Proceedings of the Data Science - 6th International Conference, 2019
Proceedings of the Data Science - 6th International Conference, 2019
Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
Sensors, 2018
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018
J. High Speed Networks, 2018
Int. J. Intell. Inf. Database Syst., 2018
Resource scheduling optimisation algorithm for containerised microservice architecture in cloud computing.
Int. J. High Perform. Syst. Archit., 2018
Research and Implementation of High Performance Traffic Processing Based on Intel DPDK.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Web Services - ICWS 2018, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Architecture and Implementation of Real-Time Analysis System Based on Cold Chain Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Research on Data Storage and Processing Optimization Based on Federation HDFS and Spark.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
2017
An RFID Indoor Positioning Algorithm Based on Bayesian Probability and <i>K</i>-Nearest Neighbor.
Sensors, 2017
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks.
Secur. Commun. Networks, 2017
J. Sensors, 2017
Int. J. Distributed Sens. Networks, 2017
Int. J. Bus. Data Commun. Netw., 2017
Int. J. Bus. Data Commun. Netw., 2017
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Research on Optimized Pre-copy Algorithm of Live Container Migration in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
Proceedings of the Advances in Internetworking, 2017
Design and Implementation of Urban Vehicle Positioning System Based on RFID, GPS and LBS.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Energy Optimization Algorithm Based on Data Density Correlation in Wireless Sensor Network.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Design and Implementation of Food Safety Traceability System Based on RFID Technology.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
Proceedings of the Advances on P2P, 2016
2015
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy.
Int. J. Distributed Sens. Networks, 2015
Location Privacy Protecting Based on Anonymous Technology in Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
2013
Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things.
Proceedings of the Advances in Wireless Sensor Networks, 2013
2012
Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine.
Proceedings of the Advances in Wireless Sensor Networks, 2012