Sancheng Peng

According to our database1, Sancheng Peng
  • authored at least 28 papers between 2008 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
New deep learning method to detect code injection attacks on hybrid applications.
Journal of Systems and Software, 2018

Influence analysis in social networks: A survey.
J. Network and Computer Applications, 2018

Social networking big data: Opportunities, solutions, and challenges.
Future Generation Comp. Syst., 2018

2017
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges.
IEEE Network, 2017

Social influence modeling using information theory in mobile social networks.
Inf. Sci., 2017

A hybrid index for temporal big data.
Future Generation Comp. Syst., 2017

Virtual network embedding with pre-transformation and incentive convergence mechanism.
Concurrency and Computation: Practice and Experience, 2017

FuzzyDP: Fuzzy-based big data publishing against inquiry attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
Modeling and Propagation Analysis on Social Influence Using Social Big Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator.
Proceedings of the Smart Computing and Communication, 2016

A Virtual Network Embedding Algorithm Based on Hybrid Particle Swarm Optimization.
Proceedings of the Smart Computing and Communication, 2016

Communities Detection Algorithm Based on General Stochastic Block Model in Mobile Social Networks.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Entropy-Based Social Influence Evaluation in Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Detection and Prevention of Code Injection Attacks on HTML5-Based Apps.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Smartphone Malware and Its Propagation Modeling: A Survey.
IEEE Communications Surveys and Tutorials, 2014

Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Computers & Security, 2014

Containing smartphone worm propagation with an influence maximization algorithm.
Computer Networks, 2014

2013
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013

Modeling Malware Propagation in Smartphone Social Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks.
IEICE Transactions, 2010

2008
Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Multipath-Based Segment-by-Segment Routing Protocol in MANETs.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Fast Algorithm to Estimate Mutual Information for Image Registration.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...