default search action
He Peng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]He Peng, Defu Zhang:
CFGM: An algorithm for closed frequent graph patterns mining. Inf. Sci. 625: 327-341 (2023) - [j10]He Peng, Xia Wang, Dexu Geng, Wenzhi Xu:
A Pneumatic Particle-Blocking Variable-Stiffness Actuator. Sensors 23(24): 9817 (2023) - 2021
- [j9]He Peng, Jun-Min Gong, Qiang Song, Xin-Sheng Xiang, Jian Shuai:
Development and application of trenchless magnetic detector for oil and gas pipeline defect. J. Comput. Methods Sci. Eng. 21(1): 163-174 (2021) - [c14]He Peng, Qun Liu:
A Few Shot Image Ensemble Classification Algorithm Based on Meta-Learning. ICAIIS 2021: 49:1-49:7 - [c13]He Peng, Qichao Yang, Yuqing Dou, Roc Berenguer, Gui Liu:
A 77GHz CMOS Down-Conversion Mixer with High CG Using CCPT-SPT Structure. ICICDT 2021: 1-4 - 2020
- [j8]He Peng, Zhaohua Zhou, Jigang Feng, Xiangyu Yu, Zhansheng Liu:
Prediction of the thermal bow of rotor based on the measured displacement and temperature. Int. J. Distributed Sens. Networks 16(10): 155014772096299 (2020) - [c12]Jian-fang Liu, Hao Zheng, He Peng:
Research on Moving Target Behavior Recognition Method Based on Deep Convolutional Neural Network. ADHIP (2) 2020: 301-312 - [c11]He Peng:
Design of 3D Image Feature Point Detection System Based on Artificial Intelligence. ADHIP (2) 2020: 313-323 - [c10]Shaoqiang Hu, Lei Li, He Peng, Cheng Wang:
Modulation Coordinated Voltage Balance Strategy for a Single-Phase Nine-Level T-type Converter. IECON 2020: 3248-3252
2010 – 2019
- 2019
- [j7]Anwar Ul Haq, Defu Zhang, He Peng, Sami ur Rahman:
Combining Multiple Feature-Ranking Techniques and Clustering of Variables for Feature Selection. IEEE Access 7: 151482-151492 (2019) - [j6]He Peng, Xiangxiang Zeng, Yadi Zhou, Defu Zhang, Ruth Nussinov, Feixiong Cheng:
A component overlapping attribute clustering (COAC) algorithm for single-cell RNA sequencing data analysis and potential pathobiological implications. PLoS Comput. Biol. 15(2) (2019) - 2017
- [j5]He Peng:
Parameter tuning of boiler thermal process based on SVM neural net optimisation. Int. J. Reason. based Intell. Syst. 9(3/4): 157-161 (2017) - [j4]Qiang Song, Weixia Ding, He Peng, Jijun Gu, Jian Shuai:
Pipe Defect Detection with Remote Magnetic Inspection and Wavelet Analysis. Wirel. Pers. Commun. 95(3): 2299-2313 (2017) - 2013
- [j3]He Peng:
Why and when do people hide knowledge? J. Knowl. Manag. 17(3): 398-415 (2013) - 2010
- [c9]Jing Wang, He Peng:
Application Study on Collaborative Mobile Electronic Commerce. ICEE 2010: 18-21
2000 – 2009
- 2009
- [j2]Wanping Zhang, Wenjian Yu, Xiang Hu, Ling Zhang, Rui Shi, He Peng, Zhi Zhu, Lew Chua-Eoan, Rajeev Murgai, Toshiyuki Shibuya, Noriyuki Ito, Chung-Kuan Cheng:
Efficient Power Network Analysis Considering Multidomain Clock Gating. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(9): 1348-1358 (2009) - [c8]He Peng, Chung-Kuan Cheng:
Parallel transistor level circuit simulation using domain decomposition methods. ASP-DAC 2009: 397-402 - [c7]Amirali Shayan Arani, Xiang Hu, He Peng, Chung-Kuan Cheng, Wenjian Yu, Mikhail Popovich, Thomas Toms, Xiaoming Chen:
Reliability aware through silicon via planning for 3D stacked ICs. DATE 2009: 288-291 - [c6]He Peng, Chung-Kuan Cheng:
Parallel transistor level full-chip circuit simulation. DATE 2009: 304-307 - [c5]Amirali Shayan Arani, Xiang Hu, He Peng, Wenjian Yu, Wanping Zhang, Chung-Kuan Cheng, Mikhail Popovich, Xiaoming Chen, Lew Chua-Eoan, Xiaohua Kong:
Parallel flow to analyze the impact of the voltage regulator model in nanoscale power distribution network. ISQED 2009: 576-581 - 2008
- [c4]Huang Lin, He Peng:
Machine Recognition for Broad-Leaved Trees Based on Synthetic Features of Leaves Using Probabilistic Neural Network. CSSE (4) 2008: 871-877 - [c3]Wanping Zhang, Yi Zhu, Wenjian Yu, Ling Zhang, Rui Shi, He Peng, Zhi Zhu, Lew Chua-Eoan, Rajeev Murgai, Toshiyuki Shibuya, Nuriyoki Ito, Chung-Kuan Cheng:
Finding the Worst Voltage Violation in Multi-Domain Clock Gated Power Network. DATE 2008: 537-540 - 2007
- [j1]Zhengyong Zhu, He Peng, Chung-Kuan Cheng, Khosro Rouz, Manjit Borah, Ernest S. Kuh:
Two-Stage Newton-Raphson Method for Transistor-Level Simulation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(5): 881-895 (2007) - [c2]Wanping Zhang, Ling Zhang, Rui Shi, He Peng, Zhi Zhu, Lew Chua-Eoan, Rajeev Murgai, Toshiyuki Shibuya, Noriyuki Ito, Chung-Kuan Cheng:
Fast power network analysis with multiple clock domains. ICCD 2007: 456-463 - [c1]He Peng, Chung-Kuan Cheng:
Fast Transient Simulation of Lossy Transmission Lines. ISCAS 2007: 2706-2709
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint