Yanpeng Cui

According to our database1, Yanpeng Cui authored at least 24 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integrated Sensing and Communication Driven Digital Twin for Intelligent Machine Network.
CoRR, 2024

2023
Toward Intelligent and Efficient 6G Networks: JCSC Enabled On-Purpose Machine Communications.
IEEE Wirel. Commun., February, 2023

Toward Trusted and Swift UAV Communication: ISAC-Enabled Dual Identity Mapping.
IEEE Wirel. Commun., February, 2023

Integrated Sensing and Communication Neighbor Discovery for MANET with Gossip Mechanism.
CoRR, 2023

UD-MAC: Delay Tolerant Multiple Access Control Protocol for Unmanned Aerial Vehicle Networks.
CoRR, 2023

Game Theory and Coverage Optimization Based Multihop Routing Protocol for Network Lifetime in Wireless Sensor Networks.
CoRR, 2023

Energy-Efficient Routing Protocol Based on Multi-Threshold Segmentation in Wireless Sensors Networks for Precision Agriculture.
CoRR, 2023

Topology-Aware Resilient Routing Protocol for FANETs: An Adaptive Q-Learning Approach.
CoRR, 2023

A Dual-Cluster-Head Based Medium Access Control for Large-Scale UAV Ad-Hoc Networks.
CoRR, 2023

Seeing is Believing: Detecting Sybil Attack in FANET by Matching Visual and Auditory Domains.
Proceedings of the IEEE International Conference on Communications, 2023

Specific Beamforming for Multi-UAV Networks: A Dual Identity-Based ISAC Approach.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Dual Identities Enabled Low-Latency Visual Networking for UAV Emergency Communication.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Cyberbullying Detection, Based on the FastText and Word Similarity Schemes.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

2020
一种易部署的Android应用程序动态监测方案 (Easy-to-deploy Dynamic Monitoring Scheme for Android Applications).
计算机科学, 2020

改进的TLS指纹增强用户行为安全分析能力 (Improved TLS Fingerprint Enhance User Behavior Security Analysis Ability).
计算机科学, 2020

基于CNN的恶意Web请求检测技术 (Malicious Web Request Detection Technology Based on CNN).
计算机科学, 2020

A Survey on SQL Injection Attacks, Detection and Prevention.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

A Survey on XSS Attack Detection and Prevention in Web Applications.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

2019
A K-anonymous clustering algorithm based on the analytic hierarchy process.
J. Vis. Commun. Image Represent., 2019

基于层次聚类的警报处理方法 (Alert Processing Method Based on Hierarchical Clustering).
计算机科学, 2019

2018
基于XGBoost算法的Webshell检测方法研究 (Research of Webshell Detection Method Based on XGBoost Algorithm).
计算机科学, 2018

基于9_7提升小波和区域生长的目标检测算法 (Target Detection Algorithm Based on 9_7 Lifting Wavelet and Region Growth).
计算机科学, 2018

IKEv2 Protocol Fuzzing Test on Simulated ASA.
Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018

A Survey of Link Prediction in Information Networks.
Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018


  Loading...