Yong Peng

According to our database1, Yong Peng
  • authored at least 110 papers between 2002 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Design a batched information retrieval system based on a concept-lattice-like structure.
Knowl.-Based Syst., 2018

The Role of Exportin-5 in MicroRNA Biogenesis and Cancer.
Genomics, Proteomics & Bioinformatics, 2018

Investigation on the injuries of drivers and copilots in rear-end crashes between trucks based on real world accident data in China.
Future Generation Comp. Syst., 2018

Integrated Modeling, Simulation, and Visualization for Nanomaterials.
Complexity, 2018

Manifold Adaptive Kernelized Low-Rank Representation for Semisupervised Image Classification.
Complexity, 2018

Fine-grained leukocyte classification with deep residual learning for microscopic images.
Computer Methods and Programs in Biomedicine, 2018

2017
Robust structured sparse representation via half-quadratic optimization for face recognition.
Multimedia Tools Appl., 2017

A quantitative design methodology for high-speed interpolation/averaging ADCs.
Integration, 2017

Discriminative extreme learning machine with supervised sparsity preserving for image classification.
Neurocomputing, 2017

Orthogonal extreme learning machine for image classification.
Neurocomputing, 2017

Learning real-time search on c-space GVDs.
Frontiers Comput. Sci., 2017

Modeling reference evapotranspiration using extreme learning machine and generalized regression neural network only with temperature data.
Computers and Electronics in Agriculture, 2017

Re2l: An efficient output-sensitive algorithm for computing Boolean operations on circular-arc polygons and its applications.
Computer-Aided Design, 2017

Minimizing transmission cost for multiple service function chains in SDN/NFV networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Multiple service function chaining under load balance in SDN/NFV networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Analysis on Al-Cu Dissimilar Materials Friction Stir Welding Butt Joint Based on J Integral Model.
Proceedings of the Intelligent Computing, Networked Control, and Their Engineering Applications, 2017

Study on Lightweight Design and Connection of Dissimilar Metals of Titanium Alloy TC4/T2 Copper/304 Stainless Steel.
Proceedings of the Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration, 2017

Task-Free Brainprint Recognition Based on Degree of Brain Networks.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
An accurate interest matching algorithm based on prediction of the space-time intersection of regions for the distributed virtual environment.
Simulation Modelling Practice and Theory, 2016

Image classification based on improved VLAD.
Multimedia Tools Appl., 2016

An unsupervised discriminative extreme learning machine and its applications to data clustering.
Neurocomputing, 2016

Discriminative manifold extreme learning machine and applications to image and EEG signal classification.
Neurocomputing, 2016

A Framework for Big Data Security Analysis and the Semantic Technology.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Malware detection method for the industrial control systems.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A control flow obfuscation method for Android applications.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Graph Based Semi-Supervised Learning via Structure Preserving Low-Rank Representation.
Neural Processing Letters, 2015

Enhanced low-rank representation via sparse manifold adaption for semi-supervised learning.
Neural Networks, 2015

Scheduling parallel jobs with tentative runs and consolidation in the cloud.
Journal of Systems and Software, 2015

Hybrid learning clonal selection algorithm.
Inf. Sci., 2015

Discriminative graph regularized extreme learning machine and its application to face recognition.
Neurocomputing, 2015

The Classification of Quantum Symmetric-Key Encryption Protocols.
CoRR, 2015

Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

An Improved String Matching Algorithm for HTTP Data Reduction.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Cyber-Physical Systems Testbed Based on Cloud Computing and Software Defined Network.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Industrial Control System Fingerprinting and Anomaly Detection.
Proceedings of the Critical Infrastructure Protection IX, 2015

Robust group sparse representation via half-quadratic optimization for face recognition.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
Graph regularized discriminative non-negative matrix factorization for face recognition.
Multimedia Tools Appl., 2014

Clustering Method Study on High-Dimensional Trading Data.
Journal of Multimedia, 2014

Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
IJDSN, 2014

EEG-based emotion recognition using discriminative graph regularized extreme learning machine.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Recognizing slow eye movement for driver fatigue detection with machine learning approach.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Techniques and Research Trends of Network Testbed.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation.
Proceedings of the Critical Infrastructure Protection VIII, 2014

EEG-based emotion classification using deep belief networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

EEG-based emotion recognition with manifold regularized extreme learning machine.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks.
JCP, 2013

PreDNA: accurate prediction of DNA-binding sites in proteins by integrating sequence and geometric structure information.
Bioinformatics, 2013

A hierarchical particle swarm optimizer with latin sampling based memetic algorithm for numerical optimization.
Appl. Soft Comput., 2013

Next Big Thing in Big Data: The Security of the ICT Supply Chain.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Security Testing Methods and Techniques of Industrial Control Devices.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Security Analysis on Cyber-physical System Using Attack Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Design and Implementation of Fuzzing Technology for OPC Protocol.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Substation Communication Security Research Based on Hybrid Encryption of DES and RSA.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Cyber-physical System Risk Assessment.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

The Design of ICS Testbed Based on Emulation, Physical, and Simulation (EPS-ICS Testbed).
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Structure Preserving Low-Rank Representation for Semi-supervised Face Recognition.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Marginalized Denoising Autoencoder via Graph Regularization for Domain Adaptation.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Mining Frequent Rooted Ordered Tree Generators Efficiently.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Quantitative analysis for high speed interpolated/averaging ADC.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

2012
JacUOD: A New Similarity Measurement for Collaborative Filtering.
J. Comput. Sci. Technol., 2012

Design and realization of the simulation component-based parallel framework for HLA Federate.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Immune clonal algorithm based feature selection for epileptic EEG signal classification.
Proceedings of the 11th International Conference on Information Science, 2012

Designated Verifier Signature Scheme over Circulant Matrices.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A New Detection Algorithm of Moving Objects Based on Human Morphology.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Modeling and Validation of Windscreen Laminated Glass Behavior during Fracture.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

A risk management framework for cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

The research and implementation of intelligent mobile video supervising system based on DSP.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
A New Similarity Measure Based on Adjusted Euclidean Distance for Memory-based Collaborative Filtering.
JSW, 2011

An Improved Artificial Fish Swarm Algorithm for Optimal Operation of Cascade Reservoirs.
JCP, 2011

A pervasive environment for systemising innovative services in knowledge-intensive firms.
IJEB, 2011

Research on Genetic Algorithm Based on Pyramid Model.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Optimization and Control Researches into the Cooling System of Pneumatic Disc Brake.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Study on the control of biological behavior on carp induced by electrophysiological stimulation in the corpus cerebelli.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Capacity Bounds for a Cognitive MIMO Gaussian Z-Interference Channel.
IEEE Trans. Vehicular Technology, 2010

Half-duplex gaussian interference channel with transmitter and receiver cooperation.
IEEE Communications Letters, 2010

Digital Ecosystems for Business e-Services in Knowledge-Intensive Firms.
Proceedings of the Business System Management and Engineering, 2010

Contour Map Plotting Algorithm for Evaluating Characteristics of Transient Electron Beam.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

A Dynamic Representation Model for Service Systems.
Proceedings of the International Conference on Service Sciences, 2010

Optimal operation of cascade reservoirs based on generalized ant colony optimization method.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Fuzzy optimization based comprehensive assessment on the best utilization order of multi-water sources in Dalian.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Privacy Aware Engineering: A Case Study.
JSW, 2009

Noisy DPC and Application to a Cognitive Channel
CoRR, 2009

Capacity Bounds of Half-Duplex Gaussian Cooperative Interference Channel
CoRR, 2009

A generic service system for knowledge-intensive service firms.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009

Capacity bounds of half-duplex gaussian cooperative interference channel.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Achievable Rate of Gaussian Cognitive Z-Interference Channel with Partial Side Information.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Fuzzy Optimization Neural Network Model Using Second Order Information.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Practical Database Intrusion Detection System Framework.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

An Ontology-Driven Paradigm for Component Representation and Retrieval.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Diversity Multiplexing Tradeoff in MIMO Frequency Selective Channels with Partial CSIT.
IEEE Communications Letters, 2008

On the Capacity Equivalence with Side Information at Transmitter and Receiver
CoRR, 2008

2006
Optimal pilot-to-data power ratio for diversity combining with imperfect channel estimation.
IEEE Communications Letters, 2006

A Dynamic Semantic Association-Based Web Service Composition Method.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Web Services Description Ontology-Based Service Discovery Model.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

2005
RSAD: A Robust Distributed Contention-Based Adaptive Mechanism for IEEE 802.11 Wireless LANs.
J. Comput. Sci. Technol., 2005

2004
Performance Enhancement and Bandwidth Guarantee in IEEE 802.11 Wireless LANs.
J. Comput. Sci. Technol., 2004

2003
IEEE 802.11 Distributed Coordination Function: Enhancement and Analysis.
J. Comput. Sci. Technol., 2003

AFRED: An Adaptive Fuzzy-based Control Algorithm for Active Queue Management.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Design of a robust self-adapt DCF-based protocol.
Proceedings of the Global Telecommunications Conference, 2003

MBTFRC: a TFRC enhancement for heterogeneous mobile networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

IEEE 802.11 distributed coordination function (DCF): analysis and enhancement.
Proceedings of the IEEE International Conference on Communications, 2002

A new self-adapt DCF algorithm.
Proceedings of the Global Telecommunications Conference, 2002


  Loading...