Zhen Peng

According to our database1, Zhen Peng
  • authored at least 39 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptology ePrint Archive, 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Fault Diagnosis from Raw Sensor Data Using Deep Neural Networks Considering Temporal Coherence.
Sensors, 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

GrTEdb: the first web-based database of transposable elements in cotton (Gossypium raimondii).
Database, 2017

Rolling Element Bearing Fault Diagnosis Using Improved Manifold Learning.
IEEE Access, 2017

An information-theoretic on-line update principle for perception-action coupling.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

2016
Following Targets for Mobile Tracking in Wireless Sensor Networks.
TOSN, 2016

Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
IJDSN, 2016

Identification of low resistivity oil and gas reservoirs with multiple linear regression model.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
A boundary integral equation domain decomposition method for electromagnetic scattering from large and deep cavities.
J. Comput. Physics, 2015

Effective transmission conditions for domain decomposition methods applied to the time-harmonic curl-curl Maxwell's equations.
J. Comput. Physics, 2015

Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE.
IACR Cryptology ePrint Archive, 2015

A Star-based Independent Biclique Attack on Full Rounds SQUARE.
IACR Cryptology ePrint Archive, 2015

Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Developing neural networks with neurons competing for survival.
Proceedings of the 2015 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics, 2015

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A hill cipher-based remote data possession checking in cloud storage.
Security and Communication Networks, 2014

Silicon Photonic Transceiver Circuits With Microring Resonator Bias-Based Wavelength Stabilization in 65 nm CMOS.
J. Solid-State Circuits, 2014

Continuous tracking for mobile targets with mobility nodes in WSNs.
Proceedings of the International Conference on Smart Computing, 2014

Curiosity-driven learning with Context Tree Weighting.
Proceedings of the 4th International Conference on Development and Learning and on Epigenetic Robotics, 2014

2013
Nonconformal Domain Decomposition Methods for Solving Large Multiscale Electromagnetic Scattering Problems.
Proceedings of the IEEE, 2013

A ring-resonator-based silicon photonics transceiver with bias-based wavelength stabilization and adaptive-power-sensitivity receiver.
Proceedings of the 2013 IEEE International Solid-State Circuits Conference, 2013

Optimal Allocation of Operating Toll Booths at Highway Toll Station.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
A Scalable Nonoverlapping and Nonconformal Domain Decomposition Method for Solving Time-Harmonic Maxwell Equations in R3.
SIAM J. Scientific Computing, 2012

Co-simulations of electromagnetic and thermal effects in electronic circuits using non-conformal numerical methods.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

The Design Principles for User-centered Remote Data Possession Checking.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2010
Design and Implementation of a Digital Angular Rate Sensor.
Sensors, 2010

One way domain decomposition method with second order transmission conditions for solving electromagnetic wave problems.
J. Comput. Physics, 2010

Non-conformal domain decomposition method with second-order transmission conditions for time-harmonic electromagnetics.
J. Comput. Physics, 2010

Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint.
Communications and Network, 2010

2009
Cognitive radio spectrum allocation using evolutionary algorithms.
IEEE Trans. Wireless Communications, 2009

Research on KDD Process Model and an Improved Algorithm.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

One Knowledge Discovery Approach for Product Conceptual Design.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

RBFCM Based Heuristic Coordinator Algorithm for KDD.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Learning Algorithm of Fuzzy Cognitive Map in Document Classification.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A New Construction of Classification Based on Asymmetrical Fuzzy Cognitive Map.
Proceedings of The 2008 International Conference on Data Mining, 2008

2007
Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering.
Science in China Series F: Information Sciences, 2007


  Loading...