default search action
Peng Yi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Peng Yi 0001 — Tongji University, Department of Control Science and Engineering, Shanghai, China (and 3 more)
- Peng Yi 0002 — Wuhan University, National Engineering Research Center for Multimedia Software, School of Computer Science, China (and 1 more)
- Peng Yi 0003 — National Digital Switching System Engineering and Technological Research Center, Henan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Ming Mao, Peng Yi, Lilong Hou, Wei Zhao:
A controller-based roadside unit plane architecture for software-defined internet of vehicles. Clust. Comput. 27(2): 1235-1249 (2024) - [j27]Wenbo Wang, Peng Yi, Huikai Xu:
DoubleR: Effective XSS attacking reality detection. Comput. Networks 251: 110567 (2024) - [j26]Wenbo Wang, Peng Yi, Junfang Jiang, Peng Zhang, Xiang Chen:
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack. Comput. Secur. 136: 103533 (2024) - [j25]Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang:
GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks. Cybersecur. 7(1): 48 (2024) - [j24]Jiangwei Li, Xilai Li, Xiaosong Li, Dingan Han, Haishu Tan, Zhongxi Hou, Peng Yi:
Multi-focus image fusion based on multiscale fuzzy quality assessment. Digit. Signal Process. 153: 104592 (2024) - [j23]Wenbo Wang, Peng Yi, Huikai Xu:
A PU-learning based approach for cross-site scripting attacking reality detection. IET Networks 13(4): 313-323 (2024) - [j22]Jingren Xu, Xin Kang, Peng Yi, Ying-Chang Liang:
Learning-Based Energy Minimization Optimization for IRS-Assisted Master-Auxiliary-UAV-Enabled Wireless-Powered IoT Networks. IEEE Internet Things J. 11(12): 21930-21945 (2024) - [j21]Peng Yi, Lei Liang, Zhang Da, Chen Yong, Jinye Zhu, Xiangyu Liu, Kun Tang, Jialin Chen, Hao Lin, Leijie Qiu, Jun Zhou:
KGFabric: A Scalable Knowledge Graph Warehouse for Enterprise Data Interconnection. Proc. VLDB Endow. 17(12): 3841-3854 (2024) - [j20]Peng Yi, Chi Zhang, Li Ma, Yang Liu, Huagui He, Wenxiong Hu:
Thin Cloud Correction for Single Optical Satellite Image Using Complementary Dark Objects on Multiple Visible Bands. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 5986-6002 (2024) - [j19]Peng Yi, Yang Cao, Xin Kang, Ying-Chang Liang:
Deep Learning-Empowered Semantic Communication Systems With a Shared Knowledge Base. IEEE Trans. Wirel. Commun. 23(6): 6174-6187 (2024) - [c14]Jishu Zhao, Peng Yi:
A Robust Distributed Nash Equilibrium Seeking Algorithm for Aggregative Games Under Byzantine Attacks. ACC 2024: 863-868 - [i7]Yue Chen, Peng Yi:
Distributed Stackelberg Equilibrium Seeking for Networked Multi-Leader Multi-Follower Games with A Clustered Information Structure. CoRR abs/2401.08144 (2024) - 2023
- [b1]Peng Yi:
Hierarchical Information and Data Modeling for Neural-based Recommender Systems. University of New South Wales, Sydney, Australia, 2023 - [j18]Qingshuang Sun, Yuan Yao, Peng Yi, Yujiao Hu, Zhao Yang, Gang Yang, Xingshe Zhou:
Learning controlled and targeted communication with the centralized critic for the multi-agent system. Appl. Intell. 53(12): 14819-14837 (2023) - [j17]Peng Yi, Xiongcai Cai, Ziteng Li:
Difference embedding for recommender systems. Data Min. Knowl. Discov. 37(2): 948-969 (2023) - [j16]Enzhou Song, Tao Hu, Peng Yi, Wenbo Wang:
Double-Layer Detection Model of Malicious PDF Documents Based on Entropy Method with Multiple Features. Entropy 25(7): 1099 (2023) - [j15]Ming Mao, Peng Yi, Lilong Hou, Guanying Zhang:
Smart contract-based resource allocation service mechanism for internet of vehicles. Expert Syst. J. Knowl. Eng. 40(6) (2023) - [j14]Wei Yu, Bo Zhu, Xiaohan Wang, Peng Yi, Hao Liu, Tianjiang Hu:
Enhanced Affine Formation Maneuver Control Using Historical Velocity Command (HVC). IEEE Robotics Autom. Lett. 8(11): 7186-7193 (2023) - [j13]Jiangwei Li, Dingan Han, Xiaopan Wang, Peng Yi, Liang Yan, Xiaosong Li:
Multi-Sensor Medical-Image Fusion Technique Based on Embedding Bilateral Filter in Least Squares and Salient Detection. Sensors 23(7): 3490 (2023) - [j12]Peng Yi, Jiguo Li, Yichen Zhang, Yu Chen:
Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System. IEEE Trans. Aerosp. Electron. Syst. 59(2): 1292-1299 (2023) - [j11]Chi Zhang, Huifang Li, Huanfeng Shen, Huagui He, Yang Liu, Peng Yi, Liying Xu:
A General Thin Cloud Correction Method Combining Statistical Information and a Scattering Model for Visible and Near-Infrared Satellite Images. IEEE Trans. Geosci. Remote. Sens. 61: 1-19 (2023) - [j10]Xianglin Li, Kejin Lu, Yujian Zhao, Daolian Chen, Peng Yi, Wei Hua:
Incorporating Harmonic-Analysis-Based Loss Minimization Into MPTC for Efficiency Improvement of FCFMPM Motor. IEEE Trans. Ind. Electron. 70(7): 6540-6550 (2023) - [c13]Jingren Xu, Xin Kang, Peng Yi, Ying-Chang Liang:
Learning-based Energy - Efficiency Optimization for IRS-assisted Master- Auxiliary- Uav- Enabled Wireless-Powered IoT Networks. GLOBECOM 2023: 5659-5664 - [c12]Peng Yi, Yang Cao, Xin Kang, Ying-Chang Liang:
Semantic Communication Systems with a Shared Knowledge Base. ICC Workshops 2023: 1374-1379 - [c11]Chen Yanan, Peng Yi:
Measurement and Spatial evolution of Digital Innovation Development in China. ICISE 2023: 306-310 - [c10]Yuchan Jie, Yong Chen, Xiaosong Li, Peng Yi, Haishu Tan, Xiaoqi Cheng:
FUFusion: Fuzzy Sets Theory for Infrared and Visible Image Fusion. PRCV (2) 2023: 466-478 - [i6]Yue Chen, Peng Yi:
Multi-Cluster Aggregative Games: A Linearly Convergent Nash Equilibrium Seeking Algorithm and its Applications in Energy Management. CoRR abs/2305.08802 (2023) - [i5]Guohai Xu, Jiayi Liu, Ming Yan, Haotian Xu, Jinghui Si, Zhuoran Zhou, Peng Yi, Xing Gao, Jitao Sang, Rong Zhang, Ji Zhang, Chao Peng, Fei Huang, Jingren Zhou:
CValues: Measuring the Values of Chinese Large Language Models from Safety to Responsibility. CoRR abs/2307.09705 (2023) - [i4]Peng Yi, Yang Cao, Xin Kang, Ying-Chang Liang:
Deep Learning-Empowered Semantic Communication Systems with a Shared Knowledge Base. CoRR abs/2311.02884 (2023) - 2022
- [j9]Xiaorong Pu, Peng Yi, Kecheng Chen, Zhaoqi Ma, Di Zhao, Yazhou Ren:
EEGDnet: Fusing non-local and local self-similarity for EEG signal denoising with transformer. Comput. Biol. Medicine 151(Part): 106248 (2022) - [j8]Ming Mao, Peng Yi, Jianhui Zhang, Liang Wang, Yuan Gu, Guanying Zhang:
Roadside units plane optimization scheme in software-defined vehicular networks. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j7]Yu Chen, Jiguo Li, Chengdong Liu, Jinguang Han, Yichen Zhang, Peng Yi:
Efficient Attribute Based Server-Aided Verification Signature. IEEE Trans. Serv. Comput. 15(6): 3224-3232 (2022) - [c9]Peng Yi, Yang Cao, Jingren Xu, Ying-Chang Liang:
Semantic Communication for Remote Spectrum Sensing in Non-Terrestrial Networks. MLSP 2022: 1-6 - [c8]Peng Yi, Xiongcai Cai, Ziteng Li:
A U-Shaped Hierarchical Recommender by Multi-resolution Collaborative Signal Modeling. ECML/PKDD (1) 2022: 558-573 - [i3]Yue Chen, Peng Yi:
Generalized Multi-cluster Game under Partial-decision Information with Applications to Management of Energy Internet. CoRR abs/2205.12027 (2022) - [i2]Tongyu Wang, Peng Yi:
Distributed Projection-free Algorithm for Constrained Aggregative Optimization. CoRR abs/2207.11885 (2022) - 2021
- [j6]Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen:
An efficient identity-based signature scheme with provable security. Inf. Sci. 576: 790-799 (2021) - [j5]Ming Mao, Peng Yi, Zhen Zhang, Liang Wang, Jinchuan Pei:
Roadside Unit Deployment Mechanism Based on Node Popularity. Mob. Inf. Syst. 2021: 9980093:1-9980093:11 (2021) - [j4]Hao Li, Tianhao Xiezhang, Cheng Yang, Lianbing Deng, Peng Yi:
Secure Video Surveillance Framework in Smart City. Sensors 21(13): 4419 (2021) - [j3]Qing Han, Feixiang Cao, Peng Yi, Tiancheng Li:
Motion Control of a Gecko-like Robot Based on a Central Pattern Generator. Sensors 21(18): 6045 (2021) - [c7]Qingshuang Sun, Yuan Yao, Peng Yi, Xingshe Zhou, Gang Yang:
Learning When to Communicate Among Actors with the Centralized Critic for the Multi-agent System. ChineseCSCW (2) 2021: 134-146 - [c6]Qingshuang Sun, Yuan Yao, Peng Yi, Xingshe Zhou, Gang Yang:
Work in Progress: Role-based Deep Reinforcement Learning with Information Sharing for Intelligent Unmanned Systems. RTAS 2021: 489-492 - [i1]Peng Yi, Kecheng Chen, Zhaoqi Ma, Di Zhao, Xiaorong Pu, Yazhou Ren:
EEGDnet: Fusing Non-Local and Local Self-Similarity for 1-D EEG Signal Denoising with 2-D Transformer. CoRR abs/2109.04235 (2021)
2010 – 2019
- 2016
- [c5]Peng Yi, Chen Yang, Xiaoming Zhou, Chen Li:
A movie cold-start recommendation method optimized similarity measure. ISCIT 2016: 231-234 - 2014
- [j2]Weitao Han, Peng Yi, Le Tiang:
Prefix Cuttings for Packet Classification with Fast Updates. KSII Trans. Internet Inf. Syst. 8(4): 1442-1462 (2014) - 2013
- [c4]Weitao Han, Peng Yi:
A clustered dynamic point split algorithm for packet classification. GLOBECOM 2013: 1342-1347 - 2010
- [j1]Chek Beng Chua, Peng Yi:
A Continuation Method for Nonlinear Complementarity Problems over Symmetric Cones. SIAM J. Optim. 20(5): 2560-2583 (2010) - [c3]Jiang Shijie, Peng Yi, Lv Weisheng, Liyin Shen:
Study on Analyzing Questionnaire Survey by Monte Carlo Simulation. ICEE 2010: 1452-1455 - [c2]Danhong Chen, Peng Yi:
Mode Selection of Tourism Supply Chain and Its Management Innovation. ICEE 2010: 3388-3391 - [c1]Peng Yi:
The Game Analysis of Eco-efficiency Driven Restructuring of China's Coal Industry. ICEE 2010: 5296-5299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint