default search action
Peng Gong 0001
Person information
- affiliation: Beijing Institute of Technology, School of Mechatronical Engineering, China
- affiliation (PhD 2010): Inha University, Incheon, Korea
Other persons with the same name
- Peng Gong — disambiguation page
- Peng Gong 0002 — Tsinghua University, Center for Earth System Science, Beijing, China (and 4 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Peng Gong, Siqi Li, Rui Zhang, Rong Hu, Mingxi Liu, Xiang Gao, Guangwei Zhang:
ESMU: Efficient and Secure High-Precision Map Upload and Update Scheme in Intelligent IoT System. IEEE Internet Things J. 11(15): 25577-25589 (2024) - [j31]Huibo Li, Yijin Pan, Huiling Zhu, Peng Gong, Jiangzhou Wang:
Resource Management for MEC Assisted Multi-Layer Federated Learning Framework. IEEE Trans. Wirel. Commun. 23(6): 5680-5693 (2024) - [c15]Wenyi Li, Peng Gong, Weidong Wang, Yu Liu, Jianfeng Li, Xiang Gao:
Design of Communication Countermeasure Simulation Model and Data Interaction Interface for Battlefield Network Based on QualNet. ICACT 2024: 1-8 - 2023
- [j30]Yingchao Yang, Zhiquan Bai, Ke Pang, Hongwu Liu, Peng Gong, Yuxiong Ji, Lei Zhang:
Performance analysis of cooperative multi-relay spatial modulation based OTFS system in V2V communication. Veh. Commun. 44: 100687 (2023) - [c14]Feixi Tang, Haowei Yang, Huibo Li, Zhixuan Feng, Peng Gong:
A Design of Data Interaction Interface Based on DDS for UAV-Borne SAR Distributed Simulation. ICACT 2023: 371-376 - 2022
- [j29]Haiqiao Wu, Wan Du, Peng Gong, Dapeng Oliver Wu:
CPU: Cross-Rack-Aware Pipelining Update for Erasure-Coded Storage. IEEE Trans. Cloud Comput. 10(4): 2424-2436 (2022) - [c13]Zijiao Zhou, Haowei Yang, Huibo Li, Jihao Zhang, Siqi Li, Xiang Gao, Peng Gong:
A Dynamic Cyber-attack Approach for Real-time Hardware-in-the-loop Simulation of Power Grid. ICACT 2022: 212-217 - 2021
- [j28]Tong Li, Chungang Yang, Lizhong Chang, Lingli Yang, Peng Gong, Haoxiang Dai, Jingyu Shen, Meng Wen, Zhu Han:
Joint Power Control and Scheduling for High-Dynamic Multi-Hop UAV Communication: A Robust Mean Field Game. IEEE Access 9: 130649-130664 (2021) - [j27]Ping Li, Yu Liu, Xiang Gao, Huibo Li, Peng Gong:
Energy-efficient time and energy resource allocation in non-selfish symbiotic cognitive relaying sensor network with privacy preserving for smart city. EURASIP J. Wirel. Commun. Netw. 2021(1): 48 (2021) - 2020
- [j26]Xiang Gao, Zhiquan Bai, Peng Gong, Dapeng Oliver Wu:
Design and Performance Analysis of LED-Grouping Based Spatial Modulation in the Visible Light Communication System. IEEE Trans. Veh. Technol. 69(7): 7317-7324 (2020) - [j25]Danyang Chen, Chungang Yang, Peng Gong, Lizhong Chang, Junqi Shao, Qiang Ni, Alagan Anpalagan, Mohsen Guizani:
Resource Cube: Multi-Virtual Resource Management for Integrated Satellite-Terrestrial Industrial IoT Networks. IEEE Trans. Veh. Technol. 69(10): 11963-11974 (2020) - [j24]Ping Li, Lining Han, Shaoyi Xu, Dapeng Oliver Wu, Peng Gong:
Resource Allocation for 5G-Enabled Vehicular Networks in Unlicensed Frequency Bands. IEEE Trans. Veh. Technol. 69(11): 13546-13555 (2020) - [j23]Haiqiao Wu, Xiang Gao, Shaoyi Xu, Dapeng Oliver Wu, Peng Gong:
Proximate Device Discovery for D2D Communication in LTE Advanced: Challenges and Approaches. IEEE Wirel. Commun. 27(4): 140-147 (2020) - [j22]Peng Gong, Huibo Li, Xiang Gao, Dapeng Oliver Wu, Xuan Xiao:
Relay Power Allocation for NAF Cooperation Assisted NOMA Network. IEEE Wirel. Commun. Lett. 9(8): 1169-1172 (2020) - [c12]Jihao Zhang, Huibo Li, Dan Shan, Duk Kyung Kim, Xiaopeng Yan, Peng Gong:
A Dynamical Network Fault Setting approach for Joint Power Grid Simulation. ICACT 2020: 497-502
2010 – 2019
- 2019
- [c11]Haowei Yang, Jianlu Wang, Xiang Gao, Huibo Li, Duk Kyung Kim, Peng Gong:
A PDSI-based Online Fault Configuration Approach for Communication Network in Power Grid Simulation. ICACT 2019: 6-10 - [c10]Qi Meng, Peng Gong, Yu Liu, Huibo Li, Cheying Li, Dan Shan:
An Interactive Interface for Information Exchanging between QualNet and Virtual Machine for IP Based Network. ICACT 2019: 320-324 - [c9]Huibo Li, Peng Gong, Yu Liu, Guolin Li, Dan Shan:
PDSI-based Static Route Online Configuration Method for QualNet Simulator. ICACT 2019: 325-329 - [c8]Xiang Gao, Peng Gong, Yu Liu, Qi Meng, Cheying Li, Dan Shan:
An Interactive Interface of QualNet for DigSilent in Power Grid Simulation. ICACT 2019: 330-333 - [c7]Sifan Chen, Peng Gong, Bin Wang, Alagan Anpalagan, Mohsen Guizani, Chungang Yang:
EDGE AI for Heterogeneous and Massive IoT Networks. ICCT 2019: 350-355 - 2017
- [j21]Weihua Wu, Qinghai Yang, Peng Gong, Kyung Sup Kwak:
Energy-Efficient Traffic Splitting for Time-Varying Multi-RAT Wireless Networks. IEEE Trans. Veh. Technol. 66(7): 6523-6535 (2017) - 2016
- [j20]Fei Liu, Qinghai Yang, Peng Gong, Kyung Sup Kwak:
Subcarrier and power allocation for multi-user OFDMA wireless networks under imperfect channel state information. IET Commun. 10(8): 873-881 (2016) - [j19]Jinglei Li, Qinghai Yang, Peng Gong, Kyung Sup Kwak:
End-to-End Multiservice Delivery in Selfish Wireless Networks Under Distributed Node-Selfishness Management. IEEE Trans. Commun. 64(3): 1132-1142 (2016) - [j18]Weihua Wu, Qinghai Yang, Peng Gong, Kyung Sup Kwak:
Adaptive Multi-Homing Resource Allocation for Time-Varying Heterogeneous Wireless Networks Without Timescale Separation. IEEE Trans. Commun. 64(9): 3794-3807 (2016) - [j17]Weihua Wu, Qinghai Yang, Peng Gong, Kyung Sup Kwak:
Energy-Efficient Resource Optimization for OFDMA-Based Multi-Homing Heterogenous Wireless Networks. IEEE Trans. Signal Process. 64(22): 5901-5913 (2016) - 2015
- [j16]Yongchun Liu, Peng Gong, Xiaopeng Yan, Ping Li:
On the security of a dynamic identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 28(5): 842-847 (2015) - [j15]Wenbo Shi, Neeraj Kumar, Peng Gong, Naveen K. Chilamkurti, Hangbae Chang:
On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Netw. Appl. 8(5): 881-885 (2015) - [c6]Weihua Wu, Qinghai Yang, Peng Gong, Kyung Sup Kwak:
Energy-efficient concurrent media streaming over time-varying wireless networks. PIMRC 2015: 1082-1087 - 2014
- [j14]Wenbo Shi, Neeraj Kumar, Peng Gong, Zezhong Zhang:
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers Comput. Sci. 8(4): 656-666 (2014) - [j13]Peng Gong, Ping Li:
Further improvement of a certificateless signature scheme without pairing. Int. J. Commun. Syst. 27(10): 2083-2091 (2014) - [j12]Peng Gong, Kaijun Ren, Duk Kyung Kim:
Power Allocation in Nonselfish Symbiotic Cognitive Relaying with Partial Channel State Information. Int. J. Distributed Sens. Networks 10 (2014) - [c5]Peng Gong, Haiqiao Wu, Ping Li, Wenbo Shi, Duk Kyung Kim:
Optimal power allocation for heterogeneous data traffic in NAF relay-assisted uplink transmission. ISCIT 2014: 228-232 - 2013
- [j11]Peng Gong, Ping Li, Duk Kyung Kim:
Optimal Power Allocation with Max-Min Fairness in a Non-orthogonal AF Relay-Assisted Uplink Transmission. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(3): 728-731 (2013) - [j10]Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li:
New certificateless public key encryption scheme without pairing. IET Inf. Secur. 7(4): 271-276 (2013) - [j9]Wenbo Shi, Peng Gong:
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Int. J. Distributed Sens. Networks 9 (2013) - [j8]Xiaopeng Yan, Weiheng Li, Ping Li, Jiantao Wang, Xinhong Hao, Peng Gong:
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 37(5): 9972 (2013) - [c4]Zhiquan Bai, Changhui Wang, Bing Wang, Yinlong Xu, Peng Gong, Kyungsup Kwak:
A novel conjugate gradient algorithm based NBI suppression in chirp UWB system. APCC 2013: 536-540 - 2012
- [j7]Peng Xue, Peng Gong, Jae Hyun Park, Daeyoung Park, Duk Kyung Kim:
Radio Resource Management with Proportional Rate Constraint in the Heterogeneous Networks. IEEE Trans. Wirel. Commun. 11(3): 1066-1075 (2012) - [c3]Xingyan Liang, Zhiquan Bai, Peng Gong, Bing Wang, Kyung Sup Kwak:
Weighted collaborative spectrum sensing with different sensing durations. ISCIT 2012: 268-273 - [c2]Tingzhen Li, Jiejun Kong, Ping Li, Peng Gong:
RVIP: bridging live networks and software virtual networks for large scale network simulation at real time. MSWiM 2012: 171-178 - 2011
- [j6]Peng Gong, Peng Xue, Daeyoung Park, Duk Kyung Kim:
Optimum Power Allocation in a Nonorthogonal Amplify-and-Forward Relay-Assisted Network. IEEE Trans. Veh. Technol. 60(3): 890-900 (2011) - [j5]Peng Gong, Ning Cao, Duk Kyung Kim:
Reducing computational complexity using transmitter correlation value-assisted schedulers in multiuser MIMO uplink. Wirel. Commun. Mob. Comput. 11(9): 1266-1274 (2011) - 2010
- [j4]Peng Xue, Peng Gong, Duk Kyung Kim:
Throughput Maximization in Cooperation Based Symbiotic Cognitive Radio Networks. IEICE Trans. Commun. 93-B(11): 3207-3210 (2010)
2000 – 2009
- 2008
- [j3]Peng Gong, Peng Xue, Cheng Jie Piao, Duk Kyung Kim:
Efficient Management of Multiple Piconets in an MC-CDMA-Based UWB System. IEICE Trans. Commun. 91-B(7): 2338-2345 (2008) - [j2]Peng Gong, Peng Xue, Duk Kyung Kim:
Enhancing the Performance of UWB-Based WPANs Using Cooperative PNC Relaying. IEICE Trans. Commun. 91-B(9): 3000-3003 (2008) - [j1]Peng Xue, Peng Gong, Duk Kyung Kim:
Enhanced IEEE 802.15.3 MAC Protocol for Efficient Support of Multiple Simultaneously Operating Piconets. IEEE Trans. Veh. Technol. 57(4): 2548-2559 (2008) - 2006
- [c1]Peng Xue, Peng Gong, Duk Kyung Kim:
Intelligent Channel Time Allocation in Simultaneously Operating Piconets Based on IEEE 802.15.3 MAC. KES (3) 2006: 441-448
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint