default search action
Jianhua Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [d1]Jianhua Peng:
Public datasets for GBSR. IEEE DataPort, 2024 - 2022
- [j21]Jinsong Li, Jianhua Peng, Shuxin Liu, Lintianran Weng, Cong Li:
Temporal link prediction in directed networks based on self-attention mechanism. Intell. Data Anal. 26(1): 173-188 (2022) - 2021
- [j20]Lintianran Weng, Yuan He, Jianhua Peng, Jianchao Zheng, Xinyu Li:
Deep cascading network architecture for robust automatic modulation classification. Neurocomputing 455: 308-324 (2021) - 2020
- [j19]Jinsong Li, Jianhua Peng, Shuxin Liu, Xinsheng Ji, Xing Li, Xinxin Hu:
Link Prediction in Directed Networks Utilizing the Role of Reciprocal Links. IEEE Access 8: 28668-28680 (2020) - [j18]Jianhua Peng, Ken Cai, Xiaojing Jin:
High concurrency massive data collection algorithm for IoMT applications. Comput. Commun. 157: 402-409 (2020) - [j17]Jianhua Peng, Hui Zhou, Qingjie Meng, Jingli Yang:
Big data security access control algorithm based on memory index acceleration in WSNs. EURASIP J. Wirel. Commun. Netw. 2020(1): 90 (2020) - [j16]Hui Zhou, Jianhua Peng, Changwu Liao, Jue Li:
Application of deep learning model based on image definition in real-time digital image fusion. J. Real Time Image Process. 17(3): 643-654 (2020) - [c16]Lintianran Weng, Jianhua Peng, Jinsong Li, Yuhang Zhu:
Message Structure Aided Attentional Convolution Network for RF Device Fingerprinting. ICCC 2020: 495-500 - [i1]Jinsong Li, Jianhua Peng, Shuxin Liu, Lintianran Weng, Cong Li:
TSAM: Temporal Link Prediction in Directed Networks based on Self-Attention Mechanism. CoRR abs/2008.10021 (2020)
2010 – 2019
- 2019
- [j15]Shuai Zhang, Xiaoming Xu, Jianhua Peng, Kaizhi Huang, Zhigang Li:
Physical layer security in massive internet of things: delay and security analysis. IET Commun. 13(1): 93-98 (2019) - 2018
- [j14]Shuai Zhang, Xiaoming Xu, Huiming Wang, Jianhua Peng, Di Zhang, Kaizhi Huang:
Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things. IEEE Access 6: 58405-58417 (2018) - [j13]Mohua Zhang, Jianhua Peng:
Underwater Image Restoration Based on A New Underwater Image Formation Model. IEEE Access 6: 58634-58644 (2018) - [c15]Shuai Zhang, Xiaoming Xu, Jianhua Peng, Yajun Chen, Shaoyu Wang:
Analysis of Uplink NOMA in Cellular IoT: A Physical Layer Security Perspective. VTC Fall 2018: 1-7 - 2017
- [j12]Jianhua Peng, Ming Tang, Ming Li, Zhiqin Zha:
A Load Balancing Method For Massive Data Processing Under Cloud Computing Environment. Intell. Autom. Soft Comput. 23(4): 547-553 (2017) - [j11]Zhihao Zhong, Jianhua Peng, Kaizhi Huang:
Analysis on Physical-Layer Security for Multi-Cell Coordination Aided Ultra-Dense Heterogeneous Networks. IEICE Trans. Commun. 100-B(10): 1846-1855 (2017) - [j10]Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi:
Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. KSII Trans. Internet Inf. Syst. 11(2): 628-649 (2017) - [j9]Mohua Zhang, Jianhua Peng, Xuejie Liu:
Sparse coding with earth mover's distance for multi-instance histogram representation. Neural Comput. Appl. 28(12): 3697-3708 (2017) - [j8]Zhihao Zhong, Wenyu Luo, Jianhua Peng, Liang Jin:
On the security of K-tier heterogeneous cellular networks. Phys. Commun. 25: 570-576 (2017) - [c14]Chenming Li, Jianhua Peng, Huibin Wang, Simon X. Yang:
A flood prediction method based on streaming big data processing. ICIA 2017: 898-902 - [c13]Likang Wang, Jianhua Peng, Ming Yi, Kaizhi Huang, Aiqin Li:
Achieving secure transmission using feedback-based LT code with degree distribution updated. WCSP 2017: 1-6 - [c12]Shuai Zhang, Jianhua Peng, Kaizhi Huang, Xiaoming Xu, Zhou Zhong:
Physical layer security in IoT: A spatial-temporal perspective. WCSP 2017: 1-6 - 2016
- [c11]Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Zhou Zhong:
Analysis on Physical-Layer Security for Internet of Things in Ultra Dense Heterogeneous Networks. iThings/GreenCom/CPSCom/SmartData 2016: 39-43 - 2015
- [c10]Xiaorui Gong, Jianhua Peng, Kaizhi Huang, Yajun Chen:
A TOA-Based Geolocation Algorithm Utilizing Convex Combination. VTC Spring 2015: 1-5 - 2014
- [j7]Jufang Chen, Xiaoming Zhang, Jianhua Peng:
Time-Delayed Chaotic Circuit Design Using All-Pass Filter. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(10): 2897-2903 (2014) - 2012
- [c9]Tao Fan, Jianhua Peng, Haiwu Zhao, Guozhong Wang:
An Automatic TV LOGO Detecting Method. IFTC 2012: 236-243 - 2011
- [j6]Xiaoming Zhang, Yingchun Wu, Jianhua Peng:
Analytical Conditions for Amplitude Death Induced by Conjugate Variable Couplings. Int. J. Bifurc. Chaos 21(1): 225-235 (2011) - [j5]Xiaoming Zhang, Jufang Chen, Jianhua Peng:
A New Family of First-Order Time-delayed Chaotic Systems. Int. J. Bifurc. Chaos 21(9): 2547-2558 (2011) - [c8]Shuxin Liu, Jianhua Peng, Caixia Liu:
Analysis of Wireless Mesh Network Security Based on Node Function. CIS 2011: 648-652 - 2010
- [c7]Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang, Rui Xue:
ASM-SPV: A Model Checker for Security Protocols. IIH-MSP 2010: 458-461 - [c6]Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao, Dongyao Ji:
Formal Verification of HMQV Using ASM-SPV. IIH-MSP 2010: 486-489
2000 – 2009
- 2009
- [j4]Ming Luo, Yongjun Wu, Jianhua Peng:
Washout filter aided mean field feedback desynchronization in an ensemble of globally coupled neural oscillators. Biol. Cybern. 101(3): 241-246 (2009) - 2008
- [j3]Yongjun Wu, Wang Fang, Jianhua Peng, Ming Luo:
First-firing statistics of a neuron bombarded by additive coloured noise: stochastic averaging method. Int. J. Comput. Math. 85(6): 937-947 (2008) - [c5]Jianhua Peng, Yongjun Wu, Hongjie Yu:
The Synchronization Process and Segmentation of Patterns in Complex Network. ICNC (3) 2008: 632-636 - [c4]Yongjun Wu, Jianhua Peng, Ming Luo:
First Spiking Dynamics of Stochastic Neuronal Model with Optimal Control. ICONIP (1) 2008: 129-136 - 2007
- [c3]Jianhua Peng, Hongjie Yu:
The Segmentation and Associative Memory Using Hindmarsh-Rose Neuronal Network. ICIC (3) 2007: 48-55 - 2006
- [j2]Hongjie Yu, Jianhua Peng, Yanzhu Liu:
Projective Synchronization of Unidentical Chaotic Systems Based on Stability Criterion. Int. J. Bifurc. Chaos 16(4): 1049-1056 (2006) - [c2]Enhua Shen, Rubin Wang, Zhikang Zhang, Jianhua Peng:
A Spiking Neuron Model of Theta Phase Precession. ICNC (1) 2006: 214-223 - [c1]Rubin Wang, Xianfa Jiao, Jianhua Peng:
Phase Coding on the Large-Scaled Neuronal Population Subjected to Stimulation. ICNC (1) 2006: 228-236
1990 – 1999
- 1997
- [j1]Bing-Zheng Liu, Jianhua Peng, Ying-Chun Sun, Yi-Wei Liu:
A comprehensive dynamical model of pulsatile secretion of the hypothalamo-pituitary-gonadal axis in man. Comput. Biol. Medicine 27(6): 507-513 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint