Zhenpeng Liu

Orcid: 0000-0002-7466-4622

According to our database1, Zhenpeng Liu authored at least 27 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DPCZK: Enhancing Device Privacy Through Certificate-Free Encryption and Zero-Knowledge Proof in Multidomain IoT Environments.
IEEE Internet Things J., June, 2025

Mask-based Self-supervised Network Intrusion Detection System.
Appl. Soft Comput., 2025

Distillation of Knowledge for Federated Learning Based on Multimodal Fusion.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

2024
Data aggregation algorithm for wireless sensor networks with different initial energy of nodes.
PeerJ Comput. Sci., 2024

HierFedPDP:Hierarchical federated learning with personalized differential privacy.
J. Inf. Secur. Appl., 2024

2023
Blockchain-based integrity auditing for shared data in cloud storage with file prediction.
Comput. Networks, November, 2023

A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks.
Sensors, July, 2023

HeteEdgeWalk: A Heterogeneous Edge Memory Random Walk for Heterogeneous Information Network Embedding.
Entropy, July, 2023

Cache-Based Privacy Protection Scheme for Continuous Location Query.
Entropy, February, 2023

Privacy-preserving edge computing offloading scheme based on whale optimization algorithm.
J. Supercomput., 2023

Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain.
IEEE Access, 2023

A Smart Contract Vulnerability Detection Mechanism Based on Deep Learning and Expert Rules.
IEEE Access, 2023

2022
Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache.
Inf., 2022

A blockchain anonymity solution to prevent location homogeneity attacks.
Concurr. Comput. Pract. Exp., 2022

ID-based sanitizable signature data integrity auditing scheme with privacy-preserving.
Comput. Secur., 2022

Data Integrity Audit Scheme Based on Blockchain Expansion Technology.
IEEE Access, 2022

2021
ImReMuDF: Redundant Mutants Identification Method Based on Definition and Reference of Variables.
Sci. Program., 2021

Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree.
IEEE Access, 2021

2020
Location-Constrained Virtual Machine Placement (LCVP) Algorithm.
Sci. Program., 2020

Gearbox Incipient Fault Detection Based on Deep Recursive Dynamic Principal Component Analysis.
IEEE Access, 2020

2019
A Trust Chain Assessment Method Based on Blockchain for SDN Network Nodes.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

AEH-MTD: Adaptive Moving Target Defense Scheme for SDN.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

2017
CTS-SOS: Cloud Task Scheduling Based on the Symbiotic Organisms Search.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

2014
Multi-authority Attribute Based Encryption with Attribute Revocation.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

An Improved Semi-supervised K-Means Algorithm Based on Information Gain.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2012
WIPOMTS: An Internet Public Opinion Monitoring System.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2007
A Computer Security Model of Imitated Nature Immune and Its FSM.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007


  Loading...