default search action
Peican Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j47]Tong Li, Chenjia Bai, Kang Xu, Chen Chu, Peican Zhu, Zhen Wang:
Skill matters: Dynamic skill learning for multi-agent cooperative reinforcement learning. Neural Networks 181: 106852 (2025) - 2024
- [j46]Yang Liu, Guangbo Liang, Xi Wang, Zhuoyu Wang, Peican Zhu, Zhen Wang:
Efficient approaches for attaining epidemic-free networks with minimum edge removal set. Commun. Nonlinear Sci. Numer. Simul. 130: 107753 (2024) - [j45]Peican Zhu, Zepeng Fan, Sensen Guo, Keke Tang, Xingyu Li:
Improving adversarial transferability through hybrid augmentation. Comput. Secur. 139: 103674 (2024) - [j44]Haifeng Zhang, Feng Zhang, Huan Wang, Chuang Ma, Peican Zhu:
A novel privacy-preserving graph convolutional network via secure matrix multiplication. Inf. Sci. 657: 119897 (2024) - [j43]Sensen Guo, Xiaoyu Li, Peican Zhu, Baocang Wang, Zhiying Mu, Jinxiong Zhao:
MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation. Inf. Sci. 657: 119918 (2024) - [j42]Peican Zhu, Botao Wang, Keke Tang, Haifeng Zhang, Xiaodong Cui, Zhen Wang:
A knowledge-guided graph attention network for emotion-cause pair extraction. Knowl. Based Syst. 286: 111342 (2024) - [j41]Zijun Pu, Qunfei Zhang, Yangtao Xue, Peican Zhu, Xiaodong Cui:
A Novel Multi-Feature Fusion Model Based on Pre-Trained Wav2vec 2.0 for Underwater Acoustic Target Recognition. Remote. Sens. 16(13): 2442 (2024) - [j40]Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan:
Node Injection Attack Based on Label Propagation Against Graph Neural Network. IEEE Trans. Comput. Soc. Syst. 11(5): 5858-5870 (2024) - [j39]Jianrui Chen, Meixia He, Peican Zhu, Zhihui Wang:
Simplex Pattern Prediction Based on Dynamic Higher Order Path Convolutional Networks. IEEE Trans. Comput. Soc. Syst. 11(5): 6623-6636 (2024) - [j38]Lianbo Ma, Nan Li, Peican Zhu, Keke Tang, Asad Khan, Feng Wang, Guo Yu:
A Novel Fuzzy Neural Network Architecture Search Framework for Defect Recognition With Uncertainties. IEEE Trans. Fuzzy Syst. 32(5): 3274-3285 (2024) - [j37]Yang Liu, Guangbo Liang, Xi Wang, Peican Zhu, Zhen Wang:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. IEEE Trans. Inf. Forensics Secur. 19: 1510-1524 (2024) - [j36]Yang Liu, Yebiao Zhong, Xiaoyu Li, Peican Zhu, Zhen Wang:
Vital Nodes Identification via Evolutionary Algorithm With Percolation Optimization in Complex Networks. IEEE Trans. Netw. Sci. Eng. 11(4): 3838-3850 (2024) - [j35]Le Cheng, Peican Zhu, Chao Gao, Zhen Wang, Xuelong Li:
A Heuristic Framework for Sources Detection in Social Networks via Graph Convolutional Networks. IEEE Trans. Syst. Man Cybern. Syst. 54(11): 7002-7014 (2024) - [c18]Le Cheng, Peican Zhu, Keke Tang, Chao Gao, Zhen Wang:
GIN-SD: Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion. AAAI 2024: 55-63 - [c17]Shu Yin, Peican Zhu, Lianwei Wu, Chao Gao, Zhen Wang:
GAMC: An Unsupervised Method for Fake News Detection Using Graph Autoencoder with Masking. AAAI 2024: 347-355 - [c16]Keke Tang, Chao Hou, Weilong Peng, Runnan Chen, Peican Zhu, Wenping Wang, Zhihong Tian:
CORES: Convolutional Response-based Score for Out-of-distribution Detection. CVPR 2024: 10916-10925 - [c15]Botao Wang, Keke Tang, Peican Zhu:
Enhancing Emotion-Cause Pair Extraction in Conversations via Center Event Detection and Reasoning. EMNLP (Findings) 2024: 10773-10783 - [c14]Keke Tang, Wenyu Zhao, Weilong Peng, Xiang Fang, Xiaodong Cui, Peican Zhu, Zhihong Tian:
Reparameterization Head for Efficient Multi-Input Networks. ICASSP 2024: 6190-6194 - [c13]Zhen Wang, Zhaoheng Cao, Juan Shi, Peican Zhu, Shuyue Hu, Chen Chu:
A Successful Strategy for Multichannel Iterated Prisoner's Dilemma. IJCAI 2024: 274-282 - [c12]Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, Zhen Wang:
A General Black-box Adversarial Attack on Graph-based Fake News Detectors. IJCAI 2024: 568-576 - [c11]Keke Tang, Zhensu Wang, Weilong Peng, Lujie Huang, Le Wang, Peican Zhu, Wenping Wang, Zhihong Tian:
SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds. ACM Multimedia 2024: 3131-3140 - [i5]Le Cheng, Peican Zhu, Keke Tang, Chao Gao, Zhen Wang:
GIN-SD: Source Detection in Graphs with Incomplete Nodes via Positional Encoding and Attentive Fusion. CoRR abs/2403.00014 (2024) - [i4]Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, Zhen Wang:
A General Black-box Adversarial Attack on Graph-based Fake News Detectors. CoRR abs/2404.15744 (2024) - [i3]Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan:
Node Injection Attack Based on Label Propagation Against Graph Neural Network. CoRR abs/2405.18824 (2024) - 2023
- [j34]Qi Li, Le Cheng, Wei Wang, Xianghua Li, Shudong Li, Peican Zhu:
Influence maximization through exploring structural information. Appl. Math. Comput. 442: 127721 (2023) - [j33]Jiaheng Hua, Xiaodong Cui, Xianghua Li, Keke Tang, Peican Zhu:
Multimodal fake news detection through data augmentation-based contrastive learning. Appl. Soft Comput. 136: 110125 (2023) - [j32]Keke Tang, Yawen Shi, Tianrui Lou, Weilong Peng, Xu He, Peican Zhu, Zhaoquan Gu, Zhihong Tian:
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds. IEEE Internet Things J. 10(6, March 15): 5158-5169 (2023) - [j31]Peican Zhu, Xin Hou, Keke Tang, Yang Liu, Yin-Ping Zhao, Zhen Wang:
Unsupervised feature selection through combining graph learning and ℓ2,0-norm constraint. Inf. Sci. 622: 68-82 (2023) - [j30]Sensen Guo, Xiaoyu Li, Peican Zhu, Zhiying Mu:
ADS-detector: An attention-based dual stream adversarial example detection method. Knowl. Based Syst. 265: 110388 (2023) - [j29]Shu Yin, Peican Zhu, Xinyu Wu, Jiajin Huang, Xianghua Li, Zhen Wang, Chao Gao:
Integrating information by Kullback-Leibler constraint for text classification. Neural Comput. Appl. 35(24): 17521-17535 (2023) - [j28]Shudong Li, Guojin Zhong, Yanlin Jin, Xiaobo Wu, Peican Zhu, Zhen Wang:
A Deceptive Reviews Detection Method Based on Multidimensional Feature Construction and Ensemble Feature Selection. IEEE Trans. Comput. Soc. Syst. 10(1): 153-165 (2023) - [j27]Zhen Wang, Xiangfeng Dai, Peican Zhu, Rong Wang, Xuelong Li, Feiping Nie:
Fast Optimization of Spectral Embedding and Improved Spectral Rotation. IEEE Trans. Knowl. Data Eng. 35(2): 1515-1527 (2023) - [j26]Shudong Li, Chuanyu Zhao, Qing Li, Jiuming Huang, Dawei Zhao, Peican Zhu:
BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection. World Wide Web (WWW) 26(4): 1793-1809 (2023) - [c10]Qi Li, Xingyu Li, Xiaodong Cui, Keke Tang, Peican Zhu:
HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets. CIKM 2023: 4064-4068 - [c9]Keke Tang, Xujian Cai, Weilong Peng, Daizong Liu, Peican Zhu, Pan Zhou, Zhihong Tian, Wenping Wang:
Matching Words for Out-of-distribution Detection. ICDM 2023: 578-587 - [c8]Zepeng Fan, Peican Zhu, Chao Gao, Jinbang Hong, Keke Tang:
DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion. KSEM (2) 2023: 276-288 - [c7]Keke Tang, Tianrui Lou, Xu He, Yawen Shi, Peican Zhu, Zhaoquan Gu:
Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training. KSEM (1) 2023: 328-342 - [c6]Xu He, Keke Tang, Yawen Shi, Yin Li, Weilong Peng, Peican Zhu:
Are Deep Point Cloud Classifiers Suffer From Out-of-distribution Overconfidence Issue? SMC 2023: 2620-2627 - [i2]Hao Xuan, Peican Zhu, Xingyu Li:
Advancing Adversarial Robustness Through Adversarial Logit Update. CoRR abs/2308.15072 (2023) - 2022
- [j25]Xiaoyu Li, Danyang Jia, Xiaotong Niu, Chen Liu, Peican Zhu, Dujuan Liu, Chen Chu:
Ability-based asymmetrical fitness calculation promotes cooperation in spatial prisoner's dilemma game. Appl. Math. Comput. 412: 126572 (2022) - [j24]Caiwei Zhen, Yuxian Wang, Jiaquan Geng, Lu Han, Jingyi Li, Jinghao Peng, Tao Wang, Jianye Hao, Xuequn Shang, Zhongyu Wei, Peican Zhu, Jiajie Peng:
A review and performance evaluation of clustering frameworks for single-cell Hi-C data. Briefings Bioinform. 23(6) (2022) - [j23]Jinzhuo Liu, Yunchen Peng, Peican Zhu, Yong Yu:
The Polarization of the Coupling Strength of Interdependent Networks Stimulates Cooperation. Entropy 24(5): 694 (2022) - [j22]Peican Zhu, Le Cheng, Chao Gao, Zhen Wang, Xuelong Li:
Locating Multi-Sources in Social Networks With a Low Infection Rate. IEEE Trans. Netw. Sci. Eng. 9(3): 1853-1865 (2022) - [c5]Ruoyu Li, Qing Li, Yucheng Huang, Wenbin Zhang, Peican Zhu, Yong Jiang:
IoTEnsemble: Detection of Botnet Attacks on Internet of Things. ESORICS (2) 2022: 569-588 - [c4]Jinbang Hong, Keke Tang, Chao Gao, Songxin Wang, Sensen Guo, Peican Zhu:
GM-Attack: Improving the Transferability of Adversarial Attacks. KSEM (3) 2022: 489-500 - [c3]Guorui Xie, Qing Li, Chupeng Cui, Peican Zhu, Dan Zhao, Wanxin Shi, Zhuyun Qi, Yong Jiang, Xi Xiao:
Soter: Deep Learning Enhanced In-Network Attack Detection Based on Programmable Switches. SRDS 2022: 225-236 - [i1]Di Jin, Cuiying Huo, Jianwu Dang, Peican Zhu, Weixiong Zhang, Witold Pedrycz, Lingfei Wu:
Heterogeneous Graph Neural Networks using Self-supervised Reciprocally Contrastive Learning. CoRR abs/2205.00256 (2022) - 2021
- [c2]Ze Yin, Yue Deng, Fan Zhang, Zheng Luo, Peican Zhu, Chao Gao:
A Semi-supervised Multi-objective Evolutionary Algorithm for Multi-layer Network Community Detection. KSEM 2021: 179-190 - [c1]Haiqiang Wang, Xuyuan Dong, Zheng Luo, Junyou Zhu, Peican Zhu, Chao Gao:
Medication Combination Prediction via Attention Neural Networks with Prior Medical Knowledge. KSEM 2021: 311-322 - 2020
- [j21]Jun Hu, Chengyi Xia, Huijia Li, Peican Zhu, Wenjun Xiong:
Properties and structural analyses of USA's regional electricity market: A visibility graph network approach. Appl. Math. Comput. 385: 125434 (2020) - [j20]Peican Zhu, Xiaoyu Wang, Danyang Jia, Yangming Guo, Shudong Li, Chen Chu:
Investigating the co-evolution of node reputation and edge-strategy in prisoner's dilemma game. Appl. Math. Comput. 386: 125474 (2020)
2010 – 2019
- 2019
- [j19]Xiangfeng Dai, Peican Zhu, Yangming Guo, Zhen Wang:
Coevolution of Vaccination Opinions and Awareness Affecting the Spread of Epidemics. IEEE Access 7: 61558-61569 (2019) - [j18]Peican Zhu, Xinyu Wang, Shudong Li, Yangming Guo, Zhen Wang:
Investigation of epidemic spreading process on multiplex networks by incorporating fatal properties. Appl. Math. Comput. 359: 512-524 (2019) - [j17]Ping Hou, Jun Hu, Jie Gao, Peican Zhu:
Stability Analysis for Memristor-Based Complex-Valued Neural Networks with Time Delays. Entropy 21(2): 120 (2019) - [j16]Peican Zhu, Qiang Zhi, Zhen Wang, Yangming Guo:
Stochastic Analysis and Optimal Design of Majority Systems. IEEE Trans. Circuits Syst. II Express Briefs 66-II(1): 131-135 (2019) - [j15]Peican Zhu, Qiang Zhi, Yangming Guo, Zhen Wang:
Analysis of Epidemic Spreading Process in Adaptive Networks. IEEE Trans. Circuits Syst. II Express Briefs 66-II(7): 1252-1256 (2019) - 2018
- [j14]Peican Zhu, Xiaogang Song, Leibo Liu, Zhen Wang, Jie Han:
Stochastic Analysis of Multiplex Boolean Networks for Understanding Epidemic Propagation. IEEE Access 6: 35292-35304 (2018) - [j13]Peican Zhu, Ruoning Lv, Yangming Guo, Shubin Si:
Optimal Design of Redundant Structures by Incorporating Various Costs. IEEE Trans. Reliab. 67(3): 1084-1095 (2018) - 2017
- [j12]Xiaogang Song, Zhengjun Zhai, Peican Zhu, Jie Han:
A Stochastic Computational Approach for the Analysis of Fuzzy Systems. IEEE Access 5: 13465-13477 (2017) - [j11]Xiaogang Song, Zhengjun Zhai, Ruoning Lv, Yangming Guo, Peican Zhu:
Optimal Design of the k-Out-of-n: G (F) Majority Voter. IEEE Access 5: 22647-22656 (2017) - [j10]Peican Zhu, Yangming Guo, Fabrizio Lombardi, Jie Han:
Approximate reliability of multi-state two-terminal networks by stochastic analysis. IET Networks 6(5): 116-124 (2017) - 2016
- [j9]Xiaoping Yang, Zhongxia Zhang, Zhong-qiu Zhang, Yuting Mo, Lianbei Li, Li Yu, Peican Zhu:
Automatic Construction and Global Optimization of a Multisentiment Lexicon. Comput. Intell. Neurosci. 2016: 2093406:1-2093406:8 (2016) - [j8]Peican Zhu, Jie Han, Yangming Guo, Fabrizio Lombardi:
Reliability and Criticality Analysis of Communication Networks by Stochastic Computation. IEEE Netw. 30(6): 70-76 (2016) - [j7]Peican Zhu, Jie Han, Leibo Liu, Fabrizio Lombardi:
Reliability Evaluation of Phased-Mission Systems Using Stochastic Computation. IEEE Trans. Reliab. 65(3): 1612-1623 (2016) - 2015
- [j6]Peican Zhu, Jie Han, Leibo Liu, Fabrizio Lombardi:
A Stochastic Approach for the Analysis of Dynamic Fault Trees With Spare Gates Under Probabilistic Common Cause Failures. IEEE Trans. Reliab. 64(3): 878-892 (2015) - 2014
- [j5]Peican Zhu, Jinghang Liang, Jie Han:
Gene perturbation and intervention in context-sensitive stochastic Boolean networks. BMC Syst. Biol. 8: 60 (2014) - [j4]Peican Zhu, Jie Han:
Asynchronous Stochastic Boolean Networks as Gene Network Models. J. Comput. Biol. 21(10): 771-783 (2014) - [j3]Peican Zhu, Jie Han:
Stochastic Multiple-Valued Gene Networks. IEEE Trans. Biomed. Circuits Syst. 8(1): 42-53 (2014) - [j2]Jie Han, Hao Chen, Jinghang Liang, Peican Zhu, Zhixi Yang, Fabrizio Lombardi:
A Stochastic Computational Approach for Accurate and Efficient Reliability Evaluation. IEEE Trans. Computers 63(6): 1336-1350 (2014) - [j1]Peican Zhu, Jie Han, Leibo Liu, Ming Jian Zuo:
A Stochastic Approach for the Analysis of Fault Trees With Priority AND Gates. IEEE Trans. Reliab. 63(2): 480-494 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint