Zhen Peng

According to our database1, Zhen Peng authored at least 47 papers between 2007 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019

Manifold Regularization Graph Structure Auto-Encoder to Detect Loop Closure for Visual SLAM.
IEEE Access, 2019

Anomaly Detection in Time-Evolving Attributed Networks.
Proceedings of the Database Systems for Advanced Applications, 2019

Heterogeneous Information Network Hashing for Fast Nearest Neighbor Search.
Proceedings of the Database Systems for Advanced Applications, 2019

Compression principles for sensorimotor learning.
PhD thesis, 2018

Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks.
IACR Cryptology ePrint Archive, 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

ANOMALOUS: A Joint Modeling Approach for Anomaly Detection on Attributed Networks.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Feature Regions Segmentation Based RGB-D Visual Odometry in Dynamic Environment.
Proceedings of the IECON 2018, 2018

Graphphi: efficient parallel graph processing on emerging throughput-oriented architectures.
Proceedings of the 27th International Conference on Parallel Architectures and Compilation Techniques, 2018

Fault Diagnosis from Raw Sensor Data Using Deep Neural Networks Considering Temporal Coherence.
Sensors, 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

GrTEdb: the first web-based database of transposable elements in cotton (Gossypium raimondii).
Database, 2017

Rolling Element Bearing Fault Diagnosis Using Improved Manifold Learning.
IEEE Access, 2017

An information-theoretic on-line update principle for perception-action coupling.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

Following Targets for Mobile Tracking in Wireless Sensor Networks.
TOSN, 2016

Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
IJDSN, 2016

Identification of low resistivity oil and gas reservoirs with multiple linear regression model.
Proceedings of the 12th International Conference on Natural Computation, 2016

A boundary integral equation domain decomposition method for electromagnetic scattering from large and deep cavities.
J. Comput. Physics, 2015

Effective transmission conditions for domain decomposition methods applied to the time-harmonic curl-curl Maxwell's equations.
J. Comput. Physics, 2015

Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE.
IACR Cryptology ePrint Archive, 2015

A Star-based Independent Biclique Attack on Full Rounds SQUARE.
IACR Cryptology ePrint Archive, 2015

Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Developing neural networks with neurons competing for survival.
Proceedings of the 2015 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics, 2015

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A hill cipher-based remote data possession checking in cloud storage.
Security and Communication Networks, 2014

Silicon Photonic Transceiver Circuits With Microring Resonator Bias-Based Wavelength Stabilization in 65 nm CMOS.
J. Solid-State Circuits, 2014

Continuous tracking for mobile targets with mobility nodes in WSNs.
Proceedings of the International Conference on Smart Computing, 2014

Curiosity-driven learning with Context Tree Weighting.
Proceedings of the 4th International Conference on Development and Learning and on Epigenetic Robotics, 2014

Nonconformal Domain Decomposition Methods for Solving Large Multiscale Electromagnetic Scattering Problems.
Proceedings of the IEEE, 2013

A ring-resonator-based silicon photonics transceiver with bias-based wavelength stabilization and adaptive-power-sensitivity receiver.
Proceedings of the 2013 IEEE International Solid-State Circuits Conference, 2013

Optimal Allocation of Operating Toll Booths at Highway Toll Station.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

A Scalable Nonoverlapping and Nonconformal Domain Decomposition Method for Solving Time-Harmonic Maxwell Equations in R3.
SIAM J. Scientific Computing, 2012

Co-simulations of electromagnetic and thermal effects in electronic circuits using non-conformal numerical methods.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

The Design Principles for User-centered Remote Data Possession Checking.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Design and Implementation of a Digital Angular Rate Sensor.
Sensors, 2010

One way domain decomposition method with second order transmission conditions for solving electromagnetic wave problems.
J. Comput. Physics, 2010

Non-conformal domain decomposition method with second-order transmission conditions for time-harmonic electromagnetics.
J. Comput. Physics, 2010

Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint.
Communications and Network, 2010

Cognitive radio spectrum allocation using evolutionary algorithms.
IEEE Trans. Wireless Communications, 2009

Research on KDD Process Model and an Improved Algorithm.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

One Knowledge Discovery Approach for Product Conceptual Design.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

RBFCM Based Heuristic Coordinator Algorithm for KDD.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Learning Algorithm of Fuzzy Cognitive Map in Document Classification.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A New Construction of Classification Based on Asymmetrical Fuzzy Cognitive Map.
Proceedings of The 2008 International Conference on Data Mining, 2008

Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering.
Science in China Series F: Information Sciences, 2007