Tu Peng

Orcid: 0000-0003-3436-7049

According to our database1, Tu Peng authored at least 25 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023

2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022

2020
Implementation of High-Performance Blockchain Network Based on Cross-Chain Technology for IoT Applications.
Sensors, 2020

2019
An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings.
J. Inf. Sci. Eng., 2019

A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019

2018
A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2018

2017
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.
Sensors, 2017

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2017

Machine Learning for Analyzing Malware.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Listwise Approach for Learning to Rank Based on Query Normalization Network.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2014
Program Verification by Reachability Searching over Dynamic Call Tree.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

Multi-angle Evaluations of Test Cases Based on Dynamic Analysis.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2012
Formal specification and automated verification of UML2.0 sequence diagrams.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

2011
On Instantiation and Integration Commutability of Design Pattern.
Comput. J., 2011

2010
Modeling enterprise service-oriented architectural styles.
Serv. Oriented Comput. Appl., 2010

Automated verification of security pattern compositions.
Inf. Softw. Technol., 2010

2009
Ontology Classification for Semantic-Web-Based Software Engineering.
IEEE Trans. Serv. Comput., 2009

A Review of Design Pattern Mining Techniques.
Int. J. Softw. Eng. Knowl. Eng., 2009

2008
A Generic Model of Enterprise Service-Oriented Architecture.
Proceedings of the Fourth IEEE International Symposium on Service-Oriented System Engineering, 2008

A Class of Optimal Frequency Hopping Sequences Based upon the Theory of Power Residues.
Proceedings of the Sequences and Their Applications, 2008

An Adaptive User Interface Generation Framework for Web Services.
Proceedings of the 2008 IEEE World Congress on Services, 2008

Verifying Behavioral Correctness of Design Pattern Implementation.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

2007
Commutability of Design Pattern Instantiation and Integration.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Architecture and Design Pattern Discovery Techniques - A Review.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Model Checking Security Pattern Compositions.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007


  Loading...