Zhiyong Peng
Orcid: 0000-0002-1062-0970Affiliations:
- Wuhan University, Wuhan, Hubei, China
According to our database1,
Zhiyong Peng
authored at least 96 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Commun., 2025
E2RLIXT: An end-to-end framework for robust index tuning based on reinforcement learning.
Comput. Electr. Eng., 2025
Joinable Search Over Multi-Source Spatial Datasets: Overlap, Coverage, and Efficiency.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
On Simplifying Large-Scale Spatial Vectors: Fast, Memory-Efficient, and Cost-Predictable $k$-Means.
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
2024
Differentially private trajectory event streams publishing under data dependence constraints.
Inf. Sci., February, 2024
Int. J. Softw. Informatics, 2024
On ADMM in Heterogeneous Federated Learning: Personalization, Robustness, and Fairness.
CoRR, 2024
2023
IEEE Trans. Knowl. Data Eng., October, 2023
IEEE Trans. Netw. Sci. Eng., 2023
Proc. ACM Manag. Data, 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
2022
IEEE Trans. Knowl. Data Eng., 2022
Weakly supervised setting for learning concept prerequisite relations using multi-head attention variational graph auto-encoders.
Knowl. Based Syst., 2022
Public integrity verification for data sharing in cloud with asynchronous revocation.
Digit. Commun. Networks, 2022
Learning Concept Prerequisite Relations from Educational Data via Multi-Head Attention Variational Graph Auto-Encoders.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022
Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the 30th International Conference on Advances in Geographic Information Systems, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
2021
CoRR, 2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021
2020
Towards an Optimal Outdoor Advertising Placement: When a Budget Constraint Meets Moving Trajectories.
ACM Trans. Knowl. Discov. Data, 2020
Deep Reinforcement Learning-Based Approach to Tackle Topic-Aware Influence Maximization.
Data Sci. Eng., 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020
2019
Frontiers Comput. Sci., 2019
Proceedings of the Theoretical Computer Science - 37th National Conference, 2019
Select the Best for Me: Privacy-Preserving Polynomial Evaluation Algorithm over Road Network.
Proceedings of the Database Systems for Advanced Applications, 2019
Proceedings of the Web and Big Data - Third International Joint Conference, 2019
2018
一种面向密文基因数据的子序列外包查询方法 (Subsequence Outsourcing Query Method over Encrypted Genomic Data).
计算机科学, 2018
基于差分隐私的多源数据关联规则挖掘方法 (Mining Method of Association Rules Based on Differential Privacy).
计算机科学, 2018
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
2017
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017
Knowl. Based Syst., 2017
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017
Data Knowl. Eng., 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
2016
Tri-Training for authorship attribution with limited training data: a comprehensive study.
Neurocomputing, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
Multim. Tools Appl., 2015
一种支持多版权的地理数据增量水印方法 (Geographical Watermarking Method Supporting Incremental and Multiple Watermark Embedding).
计算机科学, 2015
Proceedings of the Natural Language Processing and Chinese Computing - 4th CCF Conference, 2015
Proceedings of the Conceptual Modeling - 34th International Conference, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
2014
Secur. Commun. Networks, 2014
Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Proceedings of the Database Systems for Advanced Applications, 2014
A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014
A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014
Proceedings of the 11th Web Information System and Application Conference, 2014
2012
Multim. Tools Appl., 2012
2011
Electron. Commer. Res., 2011
Proceedings of the Web-Age Information Management, 2011
Proceedings of the 8th Web Information Systems and Applications Conference, 2011
2010
Proceedings of the Advances in Web Technologies and Applications, 2010
2009
Simultaneously Finding Fundamental Articles and New Topics Using a Community Tracking Method.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Using object deputy database to realize multi-representation geographic information system.
Proceedings of the 15th ACM International Symposium on Geographic Information Systems, 2007
2006
A Scientific Workflow Framework Integrated with Object Deputy Model for Data Provenance.
Proceedings of the Advances in Web-Age Information Management, 2006
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
Int. J. Pervasive Comput. Commun., 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the Database Systems for Advanced Applications, 2005
2004
Proceedings of the Web Information Systems, 2004
Object-Oriented Realization of Workflow Views for Web Services - An Object Deputy Model Based Approach.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004
Extension of Multi-Version Concurrency Control Mechanisms for Long-Duration Transaction Based on Nested Transaction Model.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004