代表性论文:
1) Min Chen, Weizhuo Gao, GaoyangLiu, Kai Peng, Chen Wang. BoundaryUnlearning: Rapid Forgetting of Deep Networks via Shifting the DecisionBoundary. In Proc. of 34th IEEE/CVF Conference onComputer Vision and Pattern Recognition, Vancouver, Canada, 2023. CCF A
2) C. Wang, M. Yuan, R. Zhang, K.Peng* and L. Liu. "Efficient Point-of-Interest Recommendation Serviceswith Heterogenous Hypergraph Embedding." IEEE Transactions on ServicesComputing. 2022, CCF A
3) M. Hu, M. Xiao, C. Cai, Y.Dong, K. Peng*. "Traffic Engineering for Software Defined LEO Constellations." IEEE Transactions on network and service management.2022,
4) M. Hu, K. Peng*, et al."QoS-Aware Software Defined Multicast in LEO Satellite Networks. IEEETransactions on Aerospace and Electronic Systems." 2022,
5) L. Liu, Y. Wang, G. Liu, K.Peng and C. Wang. "Membership Inference Attacks against Machine LearningModels via Prediction Sensitivity." IEEE Transactions on Dependable andSecure Computing. 2022, CCF A
6) J. Chen, Y. Gao, J. Shan, K.Peng, C. Wang and H. Jiang. "Manipulating Supply Chain Demand Forecastingwith Targeted Poisoning Attacks." IEEE Transactions on IndustrialInformatics. 2022, 中科院 1区
7) X. Ma, F. Ding, K. Peng, Y.Yang and C. Wang. "CP-Link: Exploiting Continuous Spatio-Temporal Check-inPatterns for User Identity Linkage." IEEE Transactions on MobileComputing. 2022 CCF A
8) Tianping Deng, Xiaohui Xu,Zeyan Ding, Xiao Xiao, Ming Zhu, Kai Peng,Automatic collaborative water surfacecoverage and cleaning strategy of UAV and USVs,Digital Communications andNetworks,2022
9) Jian Chen, Yuan Gao, YangLiu, Chen Wang, Kai Peng. Leveraging Model Poisoning Attacks on LicensePlate Recognition Systems. In Proc. of 21st IEEE International Conferenceon Trust, Security and Privacy in Computing and Communications, Wuhan, China,2022.
10) K. Peng, M. Li, H. Huang, etal. "Security Challenges and Opportunities for Smart Contracts in Internetof Things: A Survey." IEEE Internet of Things Journal, vol. 8, no. 15, pp.12004-12020, 1 Aug.1, 2021. 中科院1区
11) K. Peng , J. Nie, N. Kumar, etal. "Joint optimization of service chain caching and task offloading in mobile edge computing." Applied Soft Computing. 2021, 103.3(3), 中科院 1区
12) C. Wang, X. Wu, G. Liu, T.Deng, K. Peng, S. Wan. "Safeguarding cross-silo federated learning withlocal differential privacy." Digital Communications and Networks. 2021
13) Ruxue Wen, Rui Zhang, Kai Peng, ChenWang. Protecting Locations with Differential Privacy againstLocation-Dependent Attacks in Continuous LBS Queries. In Proc.of 20th IEEE International Conference on Trust, Security and Privacy inComputing and Communications, Shenyang, China, 2021.
14) M. Hu, W. Liu, K. Peng*, et al."Joint Routing and Scheduling for Vehicle-Assisted Multi-DroneSurveillance." IEEE Internet of Things Journal, vol. 6, no. 2, pp.1781-1790 2019 中科院1区
15) C. Cai, M. Hu, X. Ma, K. Peng*."Accurate Ranging on Acoustic-enabled IoT Devices." IEEE Internet ofThings Journal, vol. 6, no. 2, pp. 3164-3174, April 2019. 中科院1区
16) G. Liu, C. Wang, K. Peng*, H.Huang, Y. Li and W. Cheng, "SocInf: Membership Inference Attacks on SocialMedia Health Data With Machine Learning. IEEE Transactions on ComputationalSocial Systems, vol. 6, no. 5, pp. 907-921, Oct. 2019.
17) M. Hu, W. Liu, J. Lu, R. Fu, K.Peng*, X. Ma, et al. "On the joint design of routing and scheduling forvehicle-assisted multi-uav inspection." Future Generation ComputerSystems, vol. 94, pp. 214-223, 2019. 中科院 1区
18) K. Peng, et al. "Wide-AreaVehicle-Drone Cooperative Sensing: Opportunities and Approaches." IEEEAccess, vol. 7, pp. 1818-1828, 2019
19) K. Peng, et al. "A HybridGenetic Algorithm on Routing and Scheduling for Vehicle-Assisted Multi-DroneParcel Delivery." IEEE Access, vol. 7, pp. 49191-49200, 2019.
20) K. Peng, M. Hu,C. Cai, et al."On Simultaneous Power Replenishment for Wireless Sensor Networks withMultiple Portable Chargers." IEEE Access, vol. 6, pp. 63120-63130, 2018.
21) X. Ma, X. Fan, J. Liu, H.Jiang, and K. Peng*, "VLocality: Revisiting Data Locality for MapReduce inVirtualized Clouds." IEEE Network, 2017,vol. 31, no. 1, pp.:28–35. 中科院1区
22) W. Liu, Y.Yang, K. Peng*, etal. "A General Framework of Skeleton Extraction in Sensor Networks."IEEE Sensors Journal, 2016, 16(4):1103-1116
23) K. Peng, W. Xu, J. Zheng, etal. "The Disease and Gene Annotations (DGA): an annotation resource forhuman disease." Nucleic acids research, 2012, 41(D1): D553-D560. 中科院1区
24) J. Ye, K. Peng*, C. Wang, et al. "Lifetimeoptimization by load-balanced and energy efficient tree in wireless sensornetworks." Mobile Networks and Applications, 2013, 18(4): 488-499.
授权发明专利:
1 一种基于流量识别的零信任动态访问控制方法
ZL202310865786.2 彭凯,薛楠楠,徐博,郭佳璐,沈永超,刘锋,李书胜,李梦君,李志康,邓天平,彭聪
2 一种基于FPGA的数据包对比去重方法 ZL202310640501.5 彭凯,薛楠楠,徐博,沈永超,何建文,李书胜,刘锋,彭聪
3 基于边缘网络架构的微服务部署与请求路由方法及系统 ZL202310504377.X 彭凯,徐晓慧,徐博,吴婧尧,王良源,郭佳璐,何建文,胡毅,李志康,彭聪
4 一种基于动态滑动窗口的IPsec抗重放方法及系统 ZL202310415845.6 彭凯,沈永超,徐博,刘锋,薛楠楠,李书胜,李志康,李梦君,郭佳璐,邓天平,彭聪
5 一种边缘计算服务器安全互联系统 ZL202310571527.9 彭凯,李志康,徐博,李书胜,何建文,邓天平,沈永超,彭聪
6 一种多特征融合实时分析的恶意流量检测方法及系统 ZL202211508427.3 彭凯,陆通,徐博,何建文,李志康,王晨昕,王忠浩,彭聪
7 一种卫星网络组播重传方法及系统 ZL202210822363.8 彭凯,羊漪航,桂宾,徐晓慧,胡梦兰,邓天平
8 一种基于医疗影像的冲击波入射点仿真规划方法及系统 ZL202210422932.X 彭凯,肖若雪,李震,李聪,寻阳,桂宾,刘威,杨艺
9 基于联盟链的数据共享方法、系统、电子设备及存储介质 ZL202211158914.1 彭凯,徐博,谢江山,魏岚,徐晓慧,彭聪
10 一种基于CT切片的肾结石检测方法及系统 ZL202210168866.8 彭凯,肖若雪,李聪,王少刚,寻阳,李震,朱颖心,桂宾,王栋云,胡国亮,刘威
11 一种基于网络边缘系统的微服务部署和路由方法 ZL202210249897.6 彭凯,邹芷青,桂宾,邓天平,王德胜,魏岚
12 一种边防视频智能分析方法及系统 ZL202210164370.3 彭凯,陈程鹏,桂宾,周昂,徐晓慧
13一种基于CT切片的肾结石检测方法及系统 ZL202210168866.8 彭凯,肖若雪,李聪,王少刚,寻阳,李震,朱颖心,桂宾,王栋云,胡国亮,刘威
14 一种基于群体智能的LEO卫星网络拥塞规避组播路由法 ZL202210165978.8 彭凯,桂宾,毛薇,邓天平,周昂,陈程鹏
15一种基于网络边缘系统的微服务部署和路由方法 ZL202210249897.6 彭凯,桂宾,毛薇,邓天平,周昂,陈程鹏
16 一种基于多特征融合级联分类器的行人检测方法及装置 ZL202011067326.8 彭凯,毛薇,邓天平,彭麟雅,王栋云,胡国亮
17 一种无人机与无人船协同的水域清理方法及系统 ZL202011067325.3 彭凯,丁泽彦,胡国亮,彭麟雅,邓天平,王栋云,赵庆珍
18 一种适用于多服务器自适应流媒体系统的流连接调度方法 ZL201810904114.7 彭凯,肖勤邦,彭麟雅,谭蘅睿,张胜凯,桂宾,王栋云,胡国亮
19一种适用于多服务器自适应流媒体系统的数据传输方法 ZL201810469237.2 彭凯,肖勤邦,张胜凯,彭麟雅,陈泽宇,刘强
20 一种无线传感器网络通信负载均衡方法 ZL201811608254.6 彭凯,刘强,彭麟雅,桂宾,王栋云,胡国亮
21 一种基于虚拟存储盘的Hadoop架构及调度策略 ZL201710086242.0 彭凯,王靖静,桂宾,马威
22 一种物联网设备节点间的路由方法 ZL201510232819.5 彭凯,冯文顺,陈凯,张先愉,王学,徐万彪,李俊峰
23 一种视频图像帧内编码单元纹理分析及编码单元选择方法 ZL201510219514.0 彭凯,冯文顺,陈凯,张先愉,王学,徐万彪,李俊峰
24 一种网络设备间的消息传递方法 ZL200810048816.6 彭凯,王学,卢刚
25 一种低时延的小包发送方法及装置 ZL202310680494.1 刘锋,李梦君,薛楠楠,彭凯,李志康,李书胜,沈永超,梅松
26 一种基于层次循环神经网络的兴趣点推荐方法及系统 ZL202310098692.7 徐博,袁梦婷,王琛,彭凯,何建文,邓天平,彭聪
27 一种基于FPGA的智能组包快速转发系统及转发方法 ZL202310456250.5 刘锋,李志康,李梦君,彭凯,李书胜,沈永超,薛楠楠,梅松
28 一种基于联盟链的节点区块存储分配优化方法及系统 ZL202310199365.0 徐博,谢江山,彭凯,郭佳璐,魏岚,陆通,彭聪
29 一种共享单车需求量预测方法及预测系统 ZL202211191739.6 徐博,唐懋然,彭凯,胡梦兰,徐晓慧,谢江山,彭聪
30 一种容器化网络架构及网络功能部署方法 ZL202211634991.X 徐博,彭凯,王良源,徐晓慧,邓天平,陆通,彭聪
31 一种基于梯度扰动的联邦学习数据隐私保护方法及系统 ZL202110635849.6 王琛,刘高扬,伍新奎,彭凯
32 一种机器学习中训练数据隐私度量的方法和系统 ZL202110596832.4 王琛,刘高扬,徐天龙,彭凯
33 一种基于机器学习成员推断攻击的数据集认证方法及系统 ZL202110614017.6 王琛,刘高扬,徐天龙,彭凯
34 一种度量数据样本与模型决策边界相关性的方法及系统 ZL202111188034.4 王琛,刘高扬,田泽豪,彭凯
35 一种性能感知的服务功能链智能部署方法及装置 ZL202110885390.5 黄浩军,雷洁翎,彭凯
36 一种事故灾难应急广播系统及方法 ZL202011489197.1 胡萌,王学,彭凯,邓天平,周昂,冯文顺
37 一种机器学习训练数据受投毒攻击的防御方法 ZL202010694241.6 王琛,陈健,张旭鑫,彭凯
38 一种基于线性核SVM的物联网智能模型的局部解释方法 ZL202010425869.6 王琛,刘高扬,赵健雄,彭凯
39 基于背景差分和迭代搜索的高压隔离开关状态识别方法 ZL201810055660.8 江翼,程林,赵坤,高山,彭凯,薛彧,腾云,周盟,冯正新,张静,周文,李梦齐,刘正阳,苏丹
40 一种基于小波变换和支持向量机的人群密度估计方法 ZL201810942748.1 薛彧,陈泽宇,彭凯,彭麟雅,谭衡睿,刘强,桂宾,胡国亮,王栋云
41 一种无线传感器网络中的无人机充电任务调度方法 ZL201811608253.1 薛彧,彭凯,涂方蕾,彭麟雅,桂宾,王栋云,胡国亮
42一种基于毫米波雷达的疗养院监护方法及系统
ZL202011281220.8 蔡超,安美晨,桂宾,邓天平,彭凯
友情链接:
©Copyright © 2022 传奇手游风暴活动专区 All Rights Reserved.