default search action
Fei Peng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j142]Cheng Zhang, Bo Ou, Fei Peng, Yao Zhao, Keqin Li:
A Survey on Reversible Data Hiding for Uncompressed Images. ACM Comput. Surv. 56(7): 180:1-180:33 (2024) - [j141]Min Long, Jun Zhou, Le-Bing Zhang, Fei Peng, Dengyong Zhang:
ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image. IET Image Process. 18(2): 470-480 (2024) - [j140]Bing Zhang, Fei Peng, Gaisheng Li, Yangshuai Li, Guangjun Xie:
Quantum-dot Cellular Automata Placement and Routing with Hierarchical Algorithm. Nano Commun. Networks 39: 100495 (2024) - [j139]Tianqi Xia, Fei Peng, Yunkai Huang:
A Discrete-Time Current Control Method for the High-Speed Permanent Magnet Motor Drive Using the Modular Multilevel Converter. Symmetry 16(2): 200 (2024) - [j138]Min Long, Qiangqiang Duan, Le-Bing Zhang, Fei Peng, Dengyong Zhang:
Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 385-397 (2024) - [j137]Yunlu Du, Yunkai Huang, Baocheng Guo, Zakarya Djelloul-Khedda, Fei Peng, Yu Yao, Jianning Dong:
Magnetic Field Prediction in Cubic Spoke-Type Permanent-Magnet Machine Considering Magnetic Saturation. IEEE Trans. Ind. Electron. 71(3): 2208-2219 (2024) - [j136]Linjie Ren, Huan Wang, Sizhe Ren, Zhihua Zhong, Fei Peng, Yuanzhe Zhao:
Dynamic Characterization of SynRM With Dual-Axis Hybrid Excitation Self-Commissioning. IEEE Trans. Ind. Electron. 71(5): 4440-4449 (2024) - [j135]Yu Yao, Dingkuan Xu, Yansong Chen, Fei Peng, Yunkai Huang:
Robust Notch Filter-Based Active Damping Design for LCL-Equipped High-Speed PMSMs Considering Dual Resonance Problem. IEEE Trans. Ind. Electron. 71(11): 13845-13854 (2024) - [j134]Min Long, Quantao Yao, Le-Bing Zhang, Fei Peng:
Face De-Morphing Based on Diffusion Autoencoders. IEEE Trans. Inf. Forensics Secur. 19: 3051-3063 (2024) - [j133]Shaowei Wang, Yuntong Li, Yusen Zhong, Kongyang Chen, Xianmin Wang, Zhili Zhou, Fei Peng, Yuqiu Qian, Jiachun Du, Wei Yang:
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation. IEEE Trans. Mob. Comput. 23(8): 8050-8065 (2024) - [j132]Gangyang Hou, Bo Ou, Min Long, Fei Peng:
Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction. IEEE Trans. Multim. 26: 2395-2407 (2024) - [j131]Fei Peng, Le Qin, Min Long, Jin Li:
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 192:1-192:28 (2024) - [j130]Fei Peng, Shunqing Zhang, Wen Chen, Qingqing Wu:
Beamforming Oriented Angular Domain Channel Prediction for Mixed LOS and Non-LOS SIMO Environments With High Mobility. IEEE Trans. Wirel. Commun. 23(5): 4315-4330 (2024) - [c143]Huiyuan Fu, Fei Peng, Xianwei Li, Yejun Li, Xin Wang, Huadong Ma:
Continuous Optical Zooming: A Benchmark for Arbitrary-Scale Image Super-Resolution in Real World. CVPR 2024: 3035-3044 - [c142]Xiaohong Liu, Xiongkuo Min, Guangtao Zhai, Chunyi Li, Tengchuan Kou, Wei Sun, Haoning Wu, Yixuan Gao, Yuqin Cao, Zicheng Zhang, Xiele Wu, Radu Timofte, Fei Peng, Huiyuan Fu, Anlong Ming, Chuanming Wang, Huadong Ma, Shuai He, Zifei Dou, Shu Chen, Huacong Zhang, Haiyi Xie, Chengwei Wang, Baoying Chen, Jishen Zeng, Jianquan Yang, Weigang Wang, Xi Fang, Xiaoxin Lv, Jun Yan, Tianwu Zhi, Yabin Zhang, Yaohui Li, Yang Li, Jingwen Xu, Jianzhao Liu, Yiting Liao, Junlin Li, Zihao Yu, Fengbin Guan, Yiting Lu, Xin Li, Hossein Motamednia, S. Farhad Hosseini-Benvidi, Ahmad Mahmoudi-Aznaveh, Azadeh Mansouri, Ganzorig Gankhuyag, Kihwan Yoon, Yifang Xu, Haotian Fan, Fangyuan Kong, Shiling Zhao, Weifeng Dong, Haibing Yin, Li Zhu, Zhiling Wang, Bingchen Huang, Avinab Saha, Sandeep Mishra, Shashank Gupta, Rajesh Sureddi, Oindrila Saha, Luigi Celona, Simone Bianco, Paolo Napoletano, Raimondo Schettini, Junfeng Yang, Jing Fu, Wei Zhang, Wenzhi Cao, Limei Liu, Han Peng, Weijun Yuan, Zhan Li, Yihang Cheng, Yifan Deng, Haohui Li, Bowen Qu, Yao Li, Shuqing Luo, Shunzhou Wang, Wei Gao, Zihao Lu, Marcos V. Conde, Radu Timofte, Xinrui Wang, Zhibo Chen, Ruling Liao, Yan Ye, Qiulin Wang, Bing Li, Zhaokun Zhou, Miao Geng, Rui Chen, Xin Tao, Xiaoyu Liang, Shangkun Sun, Xingyuan Ma, Jiaze Li, Mengduo Yang, Haoran Xu, Jie Zhou, Shiding Zhu, Bohan Yu, Pengfei Chen, Xinrui Xu, Jiabin Shen, Zhichao Duan, Erfan Asadi, Jiahe Liu, Qi Yan, Youran Qu, Xiaohui Zeng, Lele Wang, Renjie Liao:
NTIRE 2024 Quality Assessment of AI-Generated Content Challenge. CVPR Workshops 2024: 6337-6362 - [c141]Fei Peng, Huiyuan Fu, Anlong Ming, Chuanming Wang, Huadong Ma, Shuai He, Zifei Dou, Shu Chen:
AIGC Image Quality Assessment via Image-Prompt Correspondence. CVPR Workshops 2024: 6432-6441 - [c140]Yan He, Fei Peng, Min Long, Kwok-Yan Lam:
Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing. ICASSP 2024: 4925-4929 - [i6]Xiaohong Liu, Xiongkuo Min, Guangtao Zhai, Chunyi Li, Tengchuan Kou, Wei Sun, Haoning Wu, Yixuan Gao, Yuqin Cao, Zicheng Zhang, Xiele Wu, Radu Timofte, Fei Peng, Huiyuan Fu, Anlong Ming, Chuanming Wang, Huadong Ma, Shuai He, Zifei Dou, Shu Chen, Huacong Zhang, Haiyi Xie, Chengwei Wang, Baoying Chen, Jishen Zeng, Jianquan Yang, Weigang Wang, Xi Fang, Xiaoxin Lv, Jun Yan, Tianwu Zhi, Yabin Zhang, Yaohui Li, Yang Li, Jingwen Xu, Jianzhao Liu, Yiting Liao, Junlin Li, Zihao Yu, Yiting Lu, Xin Li, Hossein Motamednia, S. Farhad Hosseini-Benvidi, Fengbin Guan, Ahmad Mahmoudi-Aznaveh, Azadeh Mansouri, Ganzorig Gankhuyag, Kihwan Yoon, Yifang Xu, Haotian Fan, Fangyuan Kong, Shiling Zhao, Weifeng Dong, Haibing Yin, Li Zhu, Zhiling Wang, Bingchen Huang, Avinab Saha, Sandeep Mishra, Shashank Gupta, Rajesh Sureddi, Oindrila Saha, Luigi Celona, Simone Bianco, Paolo Napoletano, Raimondo Schettini, Junfeng Yang, Jing Fu, Wei Zhang, Wenzhi Cao, Limei Liu, Han Peng, Weijun Yuan, Zhan Li, Yihang Cheng, Yifan Deng, Haohui Li, Bowen Qu, Yao Li, Shuqing Luo, Shunzhou Wang, Wei Gao, Zihao Lu, Marcos V. Conde, Xinrui Wang, Zhibo Chen, Ruling Liao, Yan Ye, Qiulin Wang, Bing Li, Zhaokun Zhou, Miao Geng, Rui Chen, Xin Tao, Xiaoyu Liang, Shangkun Sun, Xingyuan Ma, Jiaze Li, Mengduo Yang, Haoran Xu:
NTIRE 2024 Quality Assessment of AI-Generated Content Challenge. CoRR abs/2404.16687 (2024) - [i5]Wulian Yun, Mengshi Qi, Fei Peng, Huadong Ma:
Semi-Supervised Teacher-Reference-Student Architecture for Action Quality Assessment. CoRR abs/2407.19675 (2024) - 2023
- [j129]Yong Shi, Fang Sun, Hongkun Zuo, Fei Peng:
Analysis of Learning Behavior Characteristics and Prediction of Learning Effect for Improving College Students' Information Literacy Based on Machine Learning. IEEE Access 11: 50447-50461 (2023) - [j128]Wei Xu, Ruiqi Lu, Fei Peng, Ran Li, Jianmei Lei, Guoqi Xie:
Delay Boundary Analysis of RC Flows in the TTE Switch. J. Circuits Syst. Comput. 32(7): 2350111:1-2350111:30 (2023) - [j127]Ran Li, Bin Fu, Guoqi Xie, Fei Peng, Renfa Li:
Efficient holistic timing analysis with low pessimism for rate-constrained traffic in TTEthernet. J. Syst. Archit. 134: 102785 (2023) - [j126]Fei Peng, Li Zheng:
Fuzzy rule-based neural network for high-speed train manufacturing system scheduling problem. Neural Comput. Appl. 35(3): 2077-2088 (2023) - [j125]Di Wu, Fei Peng, Chaozhi Cai, Xinbao Du:
Time Series Classification Based on Adaptive Feature Adjustment and Multi-scale AGRes2Net. Neural Process. Lett. 55(6): 8441-8463 (2023) - [j124]Tom Bohman, Fei Peng:
A Construction for Boolean Cube Ramsey Numbers. Order 40(2): 327-333 (2023) - [j123]Quan Sun, Fei Peng, Xianghai Yu, Hongsheng Li:
Data augmentation strategy for power inverter fault diagnosis based on wasserstein distance and auxiliary classification generative adversarial network. Reliab. Eng. Syst. Saf. 237: 109360 (2023) - [j122]Florian Frick, Fei Peng:
What Can You Draw? Am. Math. Mon. 130(1): 5-19 (2023) - [j121]Yan He, Fei Peng, Min Long:
Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning. IEEE Trans. Biom. Behav. Identity Sci. 5(4): 579-592 (2023) - [j120]Fei Peng, Tongxin Liao, Min Long, Jin Li, Wensheng Zhang, Yicong Zhou:
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6531-6543 (2023) - [j119]Fei Peng, Wenyan Jiang, Min Long, Keqin Li:
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning. IEEE Trans. Dependable Secur. Comput. 20(3): 1867-1881 (2023) - [j118]Yu Yao, Yunkai Huang, Fei Peng, Jianning Dong, Zichong Zhu:
A General Single-Sensor Damping Framework for LCL-Equipped High-Speed PMSM Drives. IEEE Trans. Ind. Electron. 70(5): 5375-5380 (2023) - [j117]Fei Peng, Xuanyu Zheng, Qiang Miao:
Large Dynamic Range and Anti-Fading Phase-Sensitive OTDR Using 2-D Phase Unwrapping via Neural Network. IEEE Trans. Instrum. Meas. 72: 1-8 (2023) - [j116]Fei Peng, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu, Shunqing Zhang:
Sensing and Communication Co-Design for Status Update in Multiaccess Wireless Networks. IEEE Trans. Mob. Comput. 22(3): 1779-1792 (2023) - [j115]Fei Peng, Bo Long, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy. IEEE Trans. Multim. 25: 892-906 (2023) - [j114]Fei Peng, Wenyan Jiang, Min Long:
A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 53:1-53:20 (2023) - [j113]Fei Peng, Shunqing Zhang, Zhiyuan Jiang, Xianling Wang, Wen Chen:
A Novel Mobility Induced Channel Prediction Mechanism for Vehicular Communications. IEEE Trans. Wirel. Commun. 22(5): 3488-3502 (2023) - [c139]Enming Lu, Fei Peng:
Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification. AIS&P (1) 2023: 300-315 - [c138]Shang Wang, Fei Peng, Xuesong Zhen:
Finite Element Modeling and Simulation of Torsion Experiment and Teaching Practice in Vocational Colleges. IC4E 2023: 82-86 - [c137]Shang Wang, Fei Peng, Xuelei Wang:
Application of Simulation Technology in Vocational Education Skills Competition. IC4E 2023: 100-105 - [c136]Shang Wang, Xuelei Wang, Fei Peng:
Digital Resource Development and Teaching Application Based on Finite Element Method. ICBDE 2023: 67-72 - [c135]Shang Wang, Xuelei Wang, Fei Peng:
Teaching Practice of Engineering Mechanics Based on Finite Element Method. ICEIT 2023: 262-267 - [c134]Shang Wang, Xuelei Wang, Fei Peng:
Application of finite element method in engineering mechanics teaching. ICETT 2023: 5:1-5:6 - [c133]Shang Wang, Xuelei Wang, Fei Peng:
Research on the Application of Finite Element Method in Engineering Mechanics Teaching. ICIEI 2023: 19-24 - [c132]Tianyu An, Fei Peng, Qingdong Meng, Shi Chen, Shan Jin:
IMA: Implicit Matching and Alignment for Multimodal Named Entity Recognition. ICPADS 2023: 1595-1602 - [c131]Yixuan Wu, Xingliang Wang, Siyu Deng, Fei Peng, Zhengxiong Tian, Jian Zhou, Shuiguang Deng:
Representation Enhancement based Cold Start Model for Elastic Compute Service Recommendation. ICWS 2023: 526-534 - [c130]Shangzhu Jin, Haojun Dai, Jun Peng, Yuanmin He, Min Zhu, Xiao Wu, Fei Peng:
A Breast Mass Image Segmentation Method Based on Improved UNet 3+ Network. IECON 2023: 1-7 - [c129]Jun Peng, Yuanmin He, Shangzhu Jin, Haojun Dai, Fei Peng, Xiao Wu, Yu Wu:
Application Research on Lightweight Vehicle Detection Based on YOLO. IECON 2023: 1-6 - [c128]Jun Peng, Fei Peng, Shangzhu Jin, Yuanmin He, Xiao Wu, Haojun Dai:
Research on Safety Helmet Wearing Detection Based on YOLO. IECON 2023: 1-6 - [c127]Fei Peng, Min Long:
3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion Model. IWDW 2023: 139-150 - 2022
- [j112]Yong Shi, Fei Peng, Fang Sun:
A Blended Learning Model Based on Smart Learning Environment to Improve College Students' Information Literacy. IEEE Access 10: 89485-89498 (2022) - [j111]Junru Zhang, Yuan George Shan, Fei Peng:
Web-Crawling Architecture in Accounting and Finance Research. J. Comput. Inf. Syst. 62(5): 875-887 (2022) - [j110]Quan Sun, Xianghai Yu, Hongsheng Li, Fei Peng, Guodong Sun:
Fault detection for power electronic converters based on continuous wavelet transform and convolution neural network. J. Intell. Fuzzy Syst. 42(4): 3537-3549 (2022) - [j109]Fei Peng, Shao-hua Meng, Min Long:
Presentation attack detection based on two-stream vision transformers with self-attention fusion. J. Vis. Commun. Image Represent. 85: 103518 (2022) - [j108]Fei Peng, Le Qin, Min Long:
Face morphing attack detection and attacker identification based on a watchlist. Signal Process. Image Commun. 107: 116748 (2022) - [j107]Yangshuai Li, Guangjun Xie, Qian Han, Xiaoshuai Li, Gaisheng Li, Bing Zhang, Fei Peng:
Field-Coupled Nanocomputing Placement and Routing With Genetic and A* Algorithms. IEEE Trans. Circuits Syst. I Regul. Pap. 69(11): 4619-4631 (2022) - [j106]Fei Peng, Guanfu Chen, Min Long:
A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5817-5829 (2022) - [j105]Fei Peng, Liping Yin, Min Long:
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6657-6670 (2022) - [j104]Fei Peng, Tongxin Liao, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8394-8408 (2022) - [j103]Zhi Cao, Yunkai Huang, Baocheng Guo, Fei Peng, Jianning Dong, Ahmed Hemeida:
A Novel Hybrid Analytical Model of Active Magnetic Bearing Considering Rotor Eccentricity and Local Saturation Effect. IEEE Trans. Ind. Electron. 69(7): 7151-7160 (2022) - [j102]Baocheng Guo, Yunlu Du, Zakarya Djelloul-Khedda, Fei Peng, Jianning Dong, Yunkai Huang, Frédéric Dubas, Kamel Boughrara:
Nonlinear Semianalytical Model for Axial Flux Permanent-Magnet Machine. IEEE Trans. Ind. Electron. 69(10): 9804-9816 (2022) - [j101]Yu Yao, Yunkai Huang, Fei Peng, Jianning Dong, Zichong Zhu:
Discrete-Time Dynamic-Decoupled Current Control for LCL-Equipped High-Speed Permanent Magnet Synchronous Machines. IEEE Trans. Ind. Electron. 69(12): 12414-12425 (2022) - [j100]Jindong Zhang, Fei Peng, Yunkai Huang, Yu Yao, Zichong Zhu:
Online Inductance Identification Using PWM Current Ripple for Position Sensorless Drive of High-Speed Surface-Mounted Permanent Magnet Synchronous Machines. IEEE Trans. Ind. Electron. 69(12): 12426-12436 (2022) - [j99]Le Qin, Fei Peng, Min Long:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. IEEE Trans. Inf. Forensics Secur. 17: 3649-3662 (2022) - [j98]Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. ACM Trans. Priv. Secur. 25(1): 4:1-4:28 (2022) - [j97]Wei Liu, Hui Yang, Heyun Lin, Fei Peng, Shukang Lyu, Yuxiang Zhong:
A Novel Asymmetric-PM Hybrid-Magnetic-Circuit Variable Flux Memory Machine for Traction Applications. IEEE Trans. Veh. Technol. 71(5): 4911-4921 (2022) - [c126]Fei Peng, Qingsong Zhu, Xuelei Wang:
Application of Finite Element Modeling and Simulation Aimed at Solving Students' Learning Problems. ICETC 2022: 189-193 - [c125]Fei Peng, Xuelei Wang, Shang Wang:
Teaching practice of engineering mechanics using simulation technology to solve students' learning problems. ICETM 2022: 129-134 - [c124]Xiangbiao Leng, Guilin Zou, Haixiang Yu, Fei Peng, Huan Feng, Bingti Huang:
Application of Digital Information Technology to the Quality Management System of Power Grid Engineering. ICIIT 2022: 95-100 - [c123]Fei Peng, Shao-hua Meng, Min Long:
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion. ML4CS (2) 2022: 283-298 - [c122]Fei Peng, Xin-lin Zhang, Min Long:
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps. ML4CS (2) 2022: 355-369 - [c121]Min Long, Chengkun Jia, Fei Peng:
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces. ML4CS (3) 2022: 439-454 - [c120]Fei Peng, Yunhou Zhang, Tianyu An, Duoqin Wang, Zhikui Chen, Shan Jin:
A Self-Supervised Representation Learning Method of Speech Recognition for Smart Grid. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 588-595 - 2021
- [b2]Fei Peng:
Forced Execution for Security Analysis of Software Without Source Code. Purdue University, USA, 2021 - [j96]Linjie Ren, Guobin Lin, Yuanzhe Zhao, Zhiming Liao, Fei Peng:
Adaptive Nonsingular Finite-Time Terminal Sliding Mode Control for Synchronous Reluctance Motor. IEEE Access 9: 51283-51293 (2021) - [j95]Qian Li, Zhe Zhang, Fei Peng:
Causality-Network-Based Critical Hazard Identification for Railway Accident Prevention: Complex Network-Based Model Development and Comparison. Entropy 23(7): 864 (2021) - [j94]Min Long, Sai Long, Fei Peng, Xiao-hua Hu:
Identifying natural images and computer-generated graphics based on convolutional neural network. Int. J. Auton. Adapt. Commun. Syst. 14(1/2): 151-162 (2021) - [j93]Fei Peng, Tianjie Cao:
Software-Defined Network Resource Optimization of the Data Center Based on P4 Programming Language. Mob. Inf. Syst. 2021: 3601104:1-3601104:7 (2021) - [j92]Le Qin, Fei Peng, Sushma Venkatesh, Raghavendra Ramachandra, Min Long, Christoph Busch:
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation. IEEE Trans. Biom. Behav. Identity Sci. 3(1): 72-88 (2021) - [j91]Fei Peng, Yongqiang Zhang, Rui Kuang, Guangjun Xie:
Spars: A Full Flow Quantum-Dot Cellular Automata Circuit Design Tool. IEEE Trans. Circuits Syst. II Express Briefs 68(4): 1233-1237 (2021) - [j90]Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting. IEEE Trans. Circuits Syst. Video Technol. 31(1): 411-424 (2021) - [j89]Fei Peng, Bo Long, Min Long:
A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4538-4553 (2021) - [j88]Chen Luo, Fei He, Fei Peng, Dong Yan, Dan Zhang, Xin Zhou:
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics. IEEE Trans. Dependable Secur. Comput. 18(2): 810-824 (2021) - [j87]Fei Peng, Zhiyuan Jiang, Shunqing Zhang, Shugong Xu:
Age of Information Optimized MAC in V2X Sidelink via Piggyback-Based Collaboration. IEEE Trans. Wirel. Commun. 20(1): 607-622 (2021) - [c119]Le-Bing Zhang, Juan Cai, Fei Peng, Min Long:
MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network. IWDW 2021: 17-31 - 2020
- [j86]Fei Peng, Yu Yao, Zhiyu Wang, Yunkai Huang, Hui Yang, Bingruo Xie:
Position Estimation Method of IPMSM in Full Speed Range by Simplified Quadratic Optimization. IEEE Access 8: 109964-109975 (2020) - [j85]Yuanzhe Zhao, Fei Peng, Linjie Ren, Guobin Lin, Junqi Xu:
A Levitation Condition Awareness Architecture for Low-Speed Maglev Train Based on Data-Driven Random Matrix Analysis. IEEE Access 8: 176575-176587 (2020) - [j84]Yuanzhe Zhao, Linjie Ren, Guobin Lin, Fei Peng:
Research on the Harmonics Penetration Characteristics of the Traction Network to Three-Phase 380 V Power System of the Traction Substation and Suppression Scheme. IEEE Access 8: 195359-195369 (2020) - [j83]Zhen Wang, Yingfeng Tu, Yongming Chen, Fei Peng:
Emerging Micro/Nanomotor-Based Platforms for Biomedical Therapy. Adv. Intell. Syst. 2(5): 1900081 (2020) - [j82]Xiang Zhang, Fei Peng, Zi-Xing Lin, Min Long:
A Coverless Image Information Hiding Algorithm Based on Fractal Theory. Int. J. Bifurc. Chaos 30(4): 2050062:1-2050062:20 (2020) - [j81]Shuqiang Wang, Shuo Liang, Fei Peng:
Image edge detection algorithm based on fuzzy set. J. Intell. Fuzzy Syst. 38(4): 3557-3566 (2020) - [j80]Fei Peng, Le Qin, Min Long:
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning. J. Vis. Commun. Image Represent. 66: 102746 (2020) - [j79]Fei Peng, Haoran Zhou, Gong Chen, Qi Li, Yongxing Wu, Heming Liang:
New Insights in Regional Climate Change: Coupled Land Albedo Change Estimation in Greenland from 1981 to 2017. Remote. Sens. 12(5): 756 (2020) - [j78]Xiang Chen, Tao Wang, Shulin Liu, Fei Peng, Wenping Kang, Zichen Guo, Kun Feng, Jia Liu, Atsushi Tsunekawa:
Spectral Response Assessment of Moss-Dominated Biological Soil Crust Coverage Under Dry and Wet Conditions. Remote. Sens. 12(7): 1158 (2020) - [j77]Min Long, Yu Zhao, Xiang Zhang, Fei Peng:
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 176: 107703 (2020) - [j76]Fei Peng, Yu Zhao, Xiang Zhang, Min Long, Weiqiang Pan:
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process. Image Commun. 81 (2020) - [j75]Fei Peng, Wen-Yan Jiang, Ying Qi, Zi-Xing Lin, Min Long:
Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2391-2405 (2020) - [j74]Fei Peng, Xiang Zhang, Zi-Xing Lin, Min Long:
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2765-2780 (2020) - [j73]Baocheng Guo, Yunkai Huang, Fei Peng, Jianning Dong, Yongjian Li:
Analytical Modeling of Misalignment in Axial Flux Permanent Magnet Machine. IEEE Trans. Ind. Electron. 67(6): 4433-4443 (2020) - [j72]Yu Yao, Yunkai Huang, Fei Peng, Jianning Dong, Hanqi Zhang:
An Improved Deadbeat Predictive Current Control With Online Parameter Identification for Surface-Mounted PMSMs. IEEE Trans. Ind. Electron. 67(12): 10145-10155 (2020) - [j71]Fei Peng, Liping Yin, Le-Bing Zhang, Min Long:
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network. IEEE Trans. Multim. 22(10): 2511-2525 (2020) - [c118]Ping Zhang, Lizhong Yang, Siuming Lo, Yuxing Gao, Fangshu Dong, Fei Peng, Danyan Huang, Han Cheng, Maoyu Li, Jiajia Jiang:
Investigations of Human Psychology and Behavior in the Emergency of Subway. AHFE (4) 2020: 197-209 - [c117]Jiliang Zhang, Shuang Peng, Yupeng Hu, Fei Peng, Wei Hu, Jinmei Lai, Jing Ye, Xiangqi Wang:
HRAE: Hardware-assisted Randomization against Adversarial Example Attacks. ATS 2020: 1-6 - [c116]Min Long, Sai Long, Guo-lou Ping, Fei Peng:
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing. ICCCN 2020: 1-9 - [c115]Fei Peng, Thelma D. Palaoag:
Inspiration from the Employee Incentive Preference Survey of Huawei under the Pressure of the US Government. ICEME 2020: 167-174 - [c114]Zhiyuan Jiang, Zixu Cao, Siyu Fu, Fei Peng, Shan Cao, Shunqing Zhang, Shugong Xu:
Revealing Much While Saying Less: Predictive Wireless for Status Update. INFOCOM 2020: 1419-1428 - [c113]Fei Peng, Dan Li, Tianyu An, Hanjun Wang, Changyi Tian, Zhikui Chen:
The Evolutionary Deep Learning Model for Electrical Load Forecasting. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 910-915 - [c112]Fei Peng, Tianyu An, Qingdong Meng, Hanjun Wang, Yong Xiang, Zhikui Chen:
Energy Supply Forecasting of Wind Power for Agricultural Integrated Energy System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 916-920 - [c111]Fei Peng, Wenjie Qian, Min Long:
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision. IWDW 2020: 136-149 - [c110]Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. SP 2020: 1121-1138 - [c109]Fei Peng, Zhiyuan Jiang, Shunqing Zhang, Shugong Xu:
Piggyback-Based Distributed MAC Optimization for V2X Sidelink Communications. VTC Fall 2020: 1-6 - [i4]Zhiyuan Jiang, Zixu Cao, Siyu Fu, Fei Peng, Shan Cao, Shunqing Zhang, Shugong Xu:
Revealing Much While Saying Less: Predictive Wireless for Status Update. CoRR abs/2002.01255 (2020) - [i3]Fei Peng, Zhiyuan Jiang, Shunqing Zhang, Shugong Xu:
Age of Information Optimized MAC in V2X Sidelink via Piggyback-Based Collaboration. CoRR abs/2002.10242 (2020)
2010 – 2019
- 2019
- [j70]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image. IEEE Access 7: 75122-75131 (2019) - [j69]Zichong Zhu, Yunkai Huang, Jianning Dong, Fei Peng:
Investigation Study of the Influence of Pole Numbers on Torque Density and Flux-Weakening Ability of Fractional Slot Concentrated Winding Wheel-Hub Machines. IEEE Access 7: 84918-84928 (2019) - [j68]Fei Peng, Jing Yang, Zi-Xing Lin, Min Long:
Source identification of 3D printed objects based on inherent equipment distortion. Comput. Secur. 82: 173-183 (2019) - [j67]Fei Peng, Shuqiang Wang, Shuo Liang:
Establishment of cellular automata image model and its application in image dimension measurement. EURASIP J. Image Video Process. 2019: 14 (2019) - [j66]Min Long, You Li, Fei Peng:
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree. Int. J. Digit. Crime Forensics 11(1): 126-137 (2019) - [j65]Yongxing Wu, Shaofu Lin, Fei Peng, Qi Li:
Methods and Application of Archeological Cloud Platform for Grand Sites Based on Spatio-Temporal Big Data. ISPRS Int. J. Geo Inf. 8(9): 377 (2019) - [j64]Yongxing Wu, Fei Peng, Yang Peng, Xiaoyang Kong, Heming Liang, Qi Li:
Dynamic 3D Simulation of Flood Risk Based on the Integration of Spatio-Temporal GIS and Hydrodynamic Models. ISPRS Int. J. Geo Inf. 8(11): 520 (2019) - [j63]Min Long, Fei Peng, Yin Zhu:
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU. Multim. Tools Appl. 78(1): 489-506 (2019) - [j62]Fei Peng, Qin Long, Zi-Xing Lin, Min Long:
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Appl. 78(19): 26885-26905 (2019) - [j61]Xiang Chen, Tao Wang, Shulin Liu, Fei Peng, Atsushi Tsunekawa, Wenping Kang, Zichen Guo, Kun Feng:
A New Application of Random Forest Algorithm to Estimate Coverage of Moss-Dominated Biological Soil Crusts in Semi-Arid Mu Us Sandy Land, China. Remote. Sens. 11(11): 1286 (2019) - [j60]Xiaowei Gou, Atsushi Tsunekawa, Fei Peng, Xueyong Zhao, Yulin Li, Jie Lian:
Method for Classifying Behavior of Livestock on Fenced Temperate Rangeland in Northern China. Sensors 19(23): 5334 (2019) - [j59]Fei Peng, Wang Ming, Xiang Zhang, Min Long:
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion. Signal Process. Image Commun. 78: 426-436 (2019) - [j58]Hui Yang, Shukang Lyu, Heyun Lin, Zi-Qiang Zhu, Fei Peng, Erxing Zhuang, Shuhua Fang, Yunkai Huang:
Stepwise Magnetization Control Strategy for DC-Magnetized Memory Machine. IEEE Trans. Ind. Electron. 66(6): 4273-4285 (2019) - [j57]Baocheng Guo, Yunkai Huang, Fei Peng, Jianning Dong:
A New Hybrid Method for Magnetic Field Calculation in IPMSM Accounting for Any Rotor Configuration. IEEE Trans. Ind. Electron. 66(7): 5015-5024 (2019) - [j56]Baocheng Guo, Yunkai Huang, Fei Peng, Jianning Dong:
General Analytical Modeling for Magnet Demagnetization in Surface Mounted Permanent Magnet Machines. IEEE Trans. Ind. Electron. 66(8): 5830-5838 (2019) - [j55]Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. IEEE Trans. Inf. Forensics Secur. 14(9): 2400-2411 (2019) - [j54]Fei Peng, Jing Yang, Min Long:
3-D Printed Object Authentication Based on Printing Noise and Digital Signature. IEEE Trans. Reliab. 68(1): 342-353 (2019) - [c108]Fei Peng, Colette M. McKay, Darren Mao, Wensheng Hou, Hamish Innes-Brown:
Cortical Pitch Response Components Correlate with the Pitch Salience of Resolved and Unresolved components of Mandarin Tones. EMBC 2019: 4682-4685 - [c107]Fei Peng, Guo-lou Ping, Shuang-kui Ge:
A Face Privacy Protection Scheme Using CNN Based ROI Editing. HPCC/SmartCity/DSS 2019: 345-352 - [c106]Fei Peng:
Research on Flexible Production Line Scheduling Considering Multiple Maintenance Mechanisms. ICIBE 2019: 282-286 - [c105]Zhi Cao, Jianning Dong, Faisal Wani, Henk Polinder, Pavol Bauer, Fei Peng, Yunkai Huang:
Sliding Mode Control with Neural Network for Active Magnetic Bearing System. IECON 2019: 744-749 - [i2]Qingchun Hou, Ning Zhang, Ershun Du, Miao Miao, Fei Peng, Chongqing Kang:
Probabilistic duck curve in high PV penetration power system: Concept, modeling, and empirical analysis in China. CoRR abs/1909.11711 (2019) - 2018
- [j53]Jiangjin Yin, Bo Ou, Xuan Liu, Fei Peng:
Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. Digit. Signal Process. 81: 173-185 (2018) - [j52]Juan Chen, Fei Peng:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. Int. J. Digit. Crime Forensics 10(1): 67-78 (2018) - [j51]Min Long, Fei Peng, Xiaoqing Gong:
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int. J. Digit. Crime Forensics 10(2): 23-39 (2018) - [j50]Fei Peng, Shuai-ping Wang, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling. Int. J. Digit. Crime Forensics 10(4): 80-89 (2018) - [j49]Min Long, Fei Peng, Han-yun Li:
Separable reversible data hiding and encryption for HEVC video. J. Real Time Image Process. 14(1): 171-182 (2018) - [j48]Le-Bing Zhang, Fei Peng, Le Qin, Min Long:
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51: 56-69 (2018) - [j47]Fei Peng, Le Qin, Min Long:
Face presentation attack detection using guided scale texture. Multim. Tools Appl. 77(7): 8883-8909 (2018) - [j46]Zi-Xing Lin, Fei Peng, Min Long:
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Trans. Inf. Forensics Secur. 13(9): 2372-2382 (2018) - [j45]Xiang Zhang, Fei Peng, Min Long:
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. IEEE Trans. Multim. 20(12): 3223-3238 (2018) - [c104]Xing Wang, Wei Xiong, Bin Jiang, Fei Peng, Ning Hu, Chunye Chen, Yi Zhou, Wensheng Hou:
Neural Representation Of Harmonic Single Sideband Encoder In Inferior Colliculus Of Guinea Pigs. EMBC 2018: 2450-2453 - [c103]Fei Peng, Shunqing Zhang, Shan Cao, Shugong Xu:
A Prototype Performance Analysis for V2V Communications using USRP-based Software Defined Radio Platform. GlobalSIP 2018: 1218-1222 - [c102]Fei Peng, Le Qin, Min Long:
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection. ICCCN 2018: 1-9 - [c101]Fei Peng, Yu Liu, Bin Lu:
Research and Application of Block Chain Technology in Crowdsourcing Platform. ICEMC 2018: 1-5 - [c100]Fei Peng, Yu Liu, Bin Lu:
Research on Distributed Innovation Network Ability Collaboration Space. ICEME 2018: 45-49 - [c99]Fei Peng, Yu Liu, Bin Lu:
Research on Distributed R&D Strategy of High-end Equipment Manufacturing Industry. ICEME 2018: 65-69 - [c98]Le-Bing Zhang, Fei Peng, Min Long:
Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise. ICME 2018: 1-6 - [i1]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image. CoRR abs/1811.07665 (2018) - 2017
- [j44]Min Long, You Li, Fei Peng:
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos. Int. J. Bifurc. Chaos 27(4): 1750054:1-1750054:12 (2017) - [j43]Juan Chen, Fei Peng, Jie Li, Min Long:
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping. Int. J. Digit. Crime Forensics 9(2): 25-37 (2017) - [j42]Lieping Zhang, Fei Peng, Peng Cao, Wenjun Ji:
An Improved Three-dimensional DV-Hop Localization Algorithm Optimized by Adaptive Cuckoo Search Algorithm. Int. J. Online Eng. 13(2): 102-118 (2017) - [j41]Bo Ou, Xiaolong Li, Jinwei Wang, Fei Peng:
High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing 226: 23-34 (2017) - [j40]Hengjia Qin, Zhichao Mi, Chao Dong, Fei Peng:
Android多跳D2D通信系统的实现与优化 (Realization and Optimization of Multi-hop D2D Communications System Based on Android Platform). 计算机科学 44(2): 135-139 (2017) - [j39]Le-Bing Zhang, Fei Peng, Min Long:
Identifying source camera using guided image estimation and block weighted average. J. Vis. Commun. Image Represent. 48: 471-479 (2017) - [j38]Fengbin Deng, Guangjun Xie, Yongqiang Zhang, Fei Peng, Hongjun Lv:
A novel design and analysis of comparator with XNOR gate for QCA. Microprocess. Microsystems 55: 131-135 (2017) - [j37]Fei Peng, Xiaoqing Gong, Min Long, Xingming Sun:
A selective encryption scheme for protecting H.264/AVC video in multimedia social network. Multim. Tools Appl. 76(3): 3235-3253 (2017) - [j36]Zi-Xing Lin, Fei Peng, Min Long:
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web. Signal Process. Image Commun. 57: 134-146 (2017) - [c97]Le Qin, Le-Bing Zhang, Fei Peng, Min Long:
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern. CCBR 2017: 118-126 - [c96]Zinelabdine Boulkenafet, Jukka Komulainen, Zahid Akhtar, Azeddine Benlamoudi, Djamel Samai, Salah Eddine Bekhouche, Abdelkrim Ouafi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Le Qin, Fei Peng, L. B. Zhang, Min Long, Shruti Bhilare, Vivek Kanhangad, Artur Costa-Pazo, Esteban Vázquez-Fernández, Daniel Pérez-Cabo, J. J. Moreira-Perez, Daniel González-Jiménez, Amir Mohammadi, Sushil Bhattacharjee, Sébastien Marcel, Svetlana Volkova, Y. Tang, N. Abe, L. Li, X. Feng, Z. Xia, X. Jiang, S. Liu, Rui Shao, Pong C. Yuen, Waldir R. de Almeida, Fernanda A. Andaló, Rafael Padilha, Gabriel Bertocco, William Dias, Jacques Wainer, Ricardo da Silva Torres, Anderson Rocha, Marcus A. Angeloni, Guilherme Folego, Alan Godoy, Abdenour Hadid:
A competition on generalized software-based face presentation attack detection in mobile scenarios. IJCB 2017: 688-696 - [c95]Fei Peng, Shuai-ping Wang, Gang Luo, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling. ICCCS (1) 2017: 3-15 - [c94]Juan Chen, Fei Peng, Min Long:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. ICCCS (2) 2017: 396-407 - [c93]Jong Ho Han, Yi Min Feng, Fei Peng, Wei Dong, Xinjun Sheng:
Attitude and Position Control of Quadrotor UAV Using PD-Fuzzy Sliding Mode Control. ICIRA (3) 2017: 563-575 - [c92]Tianqi Xia, Yunkai Huang, Fei Peng, Yu Yao, Zhi Cao:
Active damping control of modular multilevel converter with output filter for high-speed PM motor drive. IECON 2017: 1777-1782 - [c91]Deqiang Wang, Matthias Preindl, Fei Peng, Jin Ye, Ali Emadi:
DC-bus design with hybrid capacitor bank in single-phase PV inverters. IECON 2017: 2425-2430 - [c90]Fei Peng, Saeed Mohajeryami, Omid Ziaee, Bamdad Falahati:
Implementing automatic transfer scheme in a main-tie-main configuration using IEC 61850. ISGT 2017: 1-5 - [c89]Fei Peng, Zhen-Jie Yan, Min Long:
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping. SpaCCS Workshops 2017: 147-158 - [c88]Fei Peng, Xiao-hua Hu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces. SpaCCS 2017: 368-380 - 2016
- [j35]Qiuwei Yang, Fei Peng, Jiao-Ting Li, Min Long:
Image tamper detection based on noise estimation and lacunarity texture. Multim. Tools Appl. 75(17): 10201-10211 (2016) - [j34]Paul Ardin, Fei Peng, Michael Mangan, Konstantinos Lagogiannis, Barbara Webb:
Using an Insect Mushroom Body Circuit to Encode Route Memory in Complex Natural Environments. PLoS Comput. Biol. 12(2) (2016) - [c87]Fang Zhou, Huihui Li, Gaojun Song, Kamen Ivanov, Wenjing Du, Fei Peng, Lei Wang:
Quantitative analysis of lumbar muscles performance of patients with lumbar disc herniation based on surface electromyography. BioCAS 2016: 62-65 - [c86]Fei Peng, Huihui Li, Kamen Ivanov, Guoru Zhao, Fang Zhou, Wenjing Du, Lei Wang:
Quantitative analysis of spine angle range of individuals with low back pain performing dynamic exercises. BSN 2016: 136-140 - [c85]Fei Peng, Chunyu Li, Xiaohan Song, Wei Hu, Guihuan Feng:
An Eye Tracking Research on Debugging Strategies towards Different Types of Bugs. COMPSAC Workshops 2016: 130-134 - [c84]Fei Peng, Nan Xia, Xing Wang, Xiao L. Zheng, Yi Zhou, Xing Y. Fan, Wen S. Hou:
Neural representation of different mandarin tones in the inferior colliculus of the guinea pig. EMBC 2016: 1608-1611 - [c83]Jianwei Niu, Qingjuan Zhao, Lei Wang, Huan Chen, Mohammed Atiquzzaman, Fei Peng:
OnSeS: A Novel Online Short Text Summarization Based on BM25 and Neural Network. GLOBECOM 2016: 1-6 - [c82]Fang Zhou, Huihui Li, Gaojun Song, Wenjing Du, Fei Peng, Lei Wang:
Analysis of surface electromyography of patients with low back pain based on different movement patterns. ICIA 2016: 1154-1158 - [c81]Fei Peng, Wenjie Fan, Xiru Xu, Xing Liu:
Analysis on temporal-spatial change of vegetation coverage in Hulunbuir Steppe (2000-2014). IGARSS 2016: 4514-4517 - [c80]Fei Peng, Tuomas Sandholm:
Scalable Segment Abstraction Method for Advertising Campaign Admission and Inventory Allocation Optimization. IJCAI 2016: 655-661 - [c79]Le-Bing Zhang, Fei Peng, Min Long:
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average. IWDW 2016: 106-118 - [c78]Fei Peng, Le Qin, Min Long:
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. SecureComm 2016: 774-777 - [c77]Hengjia Qin, Zhichao Mi, Chao Dong, Fei Peng, Pengkun Sheng:
An Experimental Study on Multihop D2D Communications Based on Smartphones. VTC Spring 2016: 1-5 - 2015
- [j33]Zhijian Fu, Xiaodong Zhou, Yanqiu Chen, Junhui Gong, Fei Peng, Zidan Yan, Taolin Zhang, Lizhong Yang:
The influence of random slowdown process and lock-step effect on the fundamental diagram of the nonlinear pedestrian dynamics: An estimating-correction cellular automaton. Commun. Nonlinear Sci. Numer. Simul. 20(3): 832-845 (2015) - [j32]Min Long, Yan Liu, Fei Peng:
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. Int. J. Digit. Crime Forensics 7(3): 1-18 (2015) - [j31]Fei Peng, Meng Cui:
An energy-efficient mobility-supporting MAC protocol in wireless sensor networks. J. Commun. Networks 17(2): 203-209 (2015) - [j30]Wenjie Zhu, Keliang Zhou, Ming Cheng, Fei Peng:
A High-Frequency-Link Single-Phase PWM Rectifier. IEEE Trans. Ind. Electron. 62(1): 289-298 (2015) - [j29]Fei Peng:
A Novel Adaptive Mobility-Aware MAC Protocol in Wireless Sensor Networks. Wirel. Pers. Commun. 81(2): 489-501 (2015) - [c76]Tong Ren, Shuangbai Xue, Fei Peng, Qing Wang, Xiang Gao:
Efficient Implementation of MIPS Code Generator for the IonMonkey JavaScript Compiler. APPT 2015: 73-85 - [c75]Fei Peng, Yin Zhu, Min Long:
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU. ICA3PP (2) 2015: 213-226 - [c74]Fei Peng, Xiaolong Li, Bin Yang:
An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors. ICME 2015: 1-6 - [c73]Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. NDSS 2015 - [c72]Fei Peng, Amy Mainville Cohn, Oleg Gusikhin, David Perner:
Vehicle Routing to Minimizing Hybrid Fleet Fuel Consumption. SMARTGREENS/VEHITS (Selected Papers) 2015: 250-266 - [c71]Fei Peng, Amy Mainville Cohn, Oleg Gusikhin, David Perner:
Algorithms for the Hybrid Fleet Vehicle Routing Problem. VEHITS 2015: 69-77 - [c70]Fei Peng, Guoan Zhang, Xinming Huang, Xiang Ye, Min Wu:
A Novel TDMA-MAC Protocol for VANET Using Cooperative and Opportunistic Transmissions. VTC Fall 2015: 1-2 - 2014
- [j28]Fei Peng, Yan Liu, Min Long:
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting. Comput. Aided Des. 49: 42-50 (2014) - [j27]Fei Peng, Die-lan Zhou:
Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU. Digit. Investig. 11(2): 111-119 (2014) - [j26]Fei Peng, Xiaolong Li, Bin Yang:
Improved PVO-based reversible data hiding. Digit. Signal Process. 25: 255-265 (2014) - [j25]Weidong Zhang, Ying Wang, Fei Peng, Yuan Yuan:
Interference Coordination with Vertical Beamforming in 3D MIMO-OFDMA Networks. IEEE Commun. Lett. 18(1): 34-37 (2014) - [j24]Ke Tang, Fei Peng, Guoliang Chen, Xin Yao:
Population-based Algorithm Portfolios with automated constituent algorithms selection. Inf. Sci. 279: 94-104 (2014) - [j23]Fei Peng, Xuewen Zeng, Haojiang Deng, Lei Liu:
The QoS Prediction of Web Service with Location Information Ensemble. J. Softw. 9(5): 1210-1216 (2014) - [j22]Xiaohong Nian, Fei Peng, Hang Zhang:
Regenerative Braking System of Electric Vehicle Driven by Brushless DC Motor. IEEE Trans. Ind. Electron. 61(10): 5798-5808 (2014) - [c69]Guan Wang, Fei Peng, Lei Ju, Lei Zhang, Zhiping Jia:
Double Circulation Wear Leveling for PCM-Based Embedded Systems. ACA 2014: 190-200 - [c68]Nan Xia, Fei Peng, Xing Wang, Xiao L. Zheng, Xiao P. Wan, Wei Yuan, Wen S. Hou:
Short-wavelength near infrared stimulation of the inner ear hair cells. EMBC 2014: 2633-2636 - [c67]Fei Peng, Jiaoling Shi, Min Long:
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU. ICME 2014: 1-6 - [c66]Zhe Sun, Fei Peng, Pierre Magne, Ali Emadi:
A phase shifted full bridge converter with ZCS synchronous rectifier for auxiliary power units. IECON 2014: 2945-2951 - [c65]Fei Peng, Zheng-Pu Peng, Xin-Hong Jia, Yunjiang Rao, Zinan Wang, Han Wu:
128km fully-distributed high-sensitivity fiber-optic intrusion sensor with 15m spatial resolution. OFC 2014: 1-3 - [c64]Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:
X-Force: Force-Executing Binary Programs for Security Applications. USENIX Security Symposium 2014: 829-844 - 2013
- [j21]Fei Peng, Xiao-wen Zhu, Min Long:
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System. Int. J. Digit. Crime Forensics 5(2): 35-49 (2013) - [j20]Fei Peng, Chen Li, Min Long:
A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Networks 6(9): 1117-1125 (2013) - [j19]Fei Peng, Xiao-wen Zhu, Min Long:
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos. IEEE Trans. Inf. Forensics Secur. 8(10): 1688-1699 (2013) - [c63]Fei Peng, Sherah Kurnia, Reeva Lederman, Suelette Dreyfus, Jonathan Knott:
Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department. HICSS 2013: 2525-2534 - [c62]Hongbin Yang, Wanzhou Li, Qianchuan Zhao, Fei Peng:
Consensus Predictive Control for 360MN Extrusion Machine. ICONS 2013: 544-548 - [c61]Yang Li, Xiuhan Li, Fei Peng, Hanru Zhang, Wei Guo, Wangqiang Zhu, Tianyang Yang:
Wireless energy transfer system based on high Q flexible planar-Litz MEMS coils. NEMS 2013: 837-840 - [c60]Fei Peng, Zinan Wang, Yunjiang Rao, Xin-Hong Jia:
106km fully-distributed fiber-optic fence based on P-OTDR with 2nd-order Raman amplification. OFC/NFOEC 2013: 1-3 - [c59]Yuan Yuan, Ying Wang, Weidong Zhang, Fei Peng:
Separate Horizontal amp; Vertical Codebook Based 3D MIMO Beamforming Scheme in LTE-A Networks. VTC Fall 2013: 1-5 - [c58]Ying Wang, Weidong Zhang, Fei Peng, Yuan Yuan:
RNTP-based resource block allocation in LTE downlink indoor scenarios. WCNC 2013: 3341-3345 - [c57]Fei Peng, Nan Wang, Yue Gao, Laurie G. Cuthbert, Xing Zhang:
Geo-location database based TV white space for interference mitigation in LTE femtocell networks. WOWMOM 2013: 1-6 - 2012
- [j18]Min Long, Yunfei Chen, Fei Peng:
Bit error rate improvement for chaos shift keying chaotic communication systems. IET Commun. 6(16): 2639-2644 (2012) - [j17]Fei Peng, Juan Liu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features. Int. J. Digit. Crime Forensics 4(1): 1-16 (2012) - [j16]Xiuhan Li, Hanru Zhang, Fei Peng, Yang Li, Tianyang Yang, Bo Wang, Dong-Ming Fang:
A Wireless Magnetic Resonance Energy Transfer System for Micro Implantable Medical Sensors. Sensors 12(8): 10292-10308 (2012) - [j15]Fei Peng, Xiaolong Li, Bin Yang:
Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1): 54-62 (2012) - [j14]Fei Peng, Bin Peng, Victor C. M. Leung:
An Application Oriented Power Saving MAC Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 67(2): 279-293 (2012) - [c56]Wei Li, Wanzhou Li, Fei Peng, Qianchuan Zhao:
Control system simulation for 360MN extrusion machine based on physical model. CASE 2012: 243-249 - [c55]Fei Peng, Yue Gao, Laurie G. Cuthbert:
Reviews on cognitive access to TV White Space. CHINACOM 2012: 727-732 - [c54]Apostolos Malatras, Fei Peng, Béat Hirsbrunner:
A framework for the autonomic management of multi-layer P2P overlays. GIIS 2012: 1-8 - [c53]Xiaodong Liu, Lijing Wang, Xiaodong Li, Fei Peng:
Comparative study on flight reference symbology for helmet-mounted display based on eye tracking technology. INDIN 2012: 459-463 - [c52]Fei Peng, Xiaolong Li, Bin Yang:
Calibration Based Reliable Detector for Detecting LSB Matching Steganography. IWDW 2012: 44-53 - [c51]Fei Peng, Sherah Kurnia, Reeva Lederman, Suelette Dreyfus:
Information Systems And Hospital Work: A Structuralist Investigation. PACIS 2012: 8 - [c50]Fei Peng, Apostolos Malatras, Béat Hirsbrunner, Michèle Courant:
AntOM: Constructing multi-layer overlays for pervasive environments. PerCom Workshops 2012: 649-654 - [c49]Fei Peng, Ángel Salamanca Cardona, Kaveh Shafiee, Victor C. M. Leung:
TCP Performance Evaluation over GEO and LEO Satellite Links between Performance Enhancement Proxies. VTC Fall 2012: 1-5 - [c48]Fei Peng, Kaveh Shafiee, Victor C. M. Leung:
Throughput Modeling of Differentiation Schemes for IEEE 802.11e MAC Protocol. VTC Fall 2012: 1-5 - 2011
- [j13]Fei Peng, Yu-Zhou Lei, Min Long, Xingming Sun:
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput. Aided Des. 43(8): 1018-1024 (2011) - [j12]Min Long, Yunfei Chen, Fei Peng:
Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication. IEEE Commun. Lett. 15(11): 1175-1177 (2011) - [j11]Fei Peng, Yu-Zhou Lei:
An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM. Int. J. Digit. Crime Forensics 3(1): 53-69 (2011) - [j10]Fei Peng, Honglin Li:
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features. Int. J. Digit. Crime Forensics 3(2): 35-40 (2011) - [c47]Fei Peng, Apostolos Malatras:
Optimising P2P Overlays for Pervasive Environments. AIMS 2011: 61-64 - [c46]Apostolos Malatras, Fei Peng, Béat Hirsbrunner:
A self-management framework for efficient resource discovery in pervasive environments. ICAC 2011: 181-182 - [c45]Yimin Guo, Yajun Guo, Fei Peng, Huidan Gao:
The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms. ICAIC (1) 2011: 566-572 - [c44]Yi Luo, Fei Peng, Xiaolong Li, Bin Yang:
Reversible image water marking based on prediction-error expansion and compensation. ICME 2011: 1-6 - [c43]Fei Peng, Ke Tang:
Alleviate the Hypervolume Degeneration Problem of NSGA-II. ICONIP (2) 2011: 425-434 - [c42]Apostolos Malatras, Fei Peng, Béat Hirsbrunner:
Bio-inspired monitoring of pervasive environments. PerCom Workshops 2011: 368-371 - 2010
- [j9]Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput. Aided Des. 42(12): 1207-1216 (2010) - [j8]Fei Peng:
Mobile Networks Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs. Eur. Trans. Telecommun. 21(3): 266-275 (2010) - [j7]Fei Peng, Hussein M. Alnuweiri, Victor C. M. Leung:
Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs. Eur. Trans. Telecommun. 21(5): 478 (2010) - [j6]Fei Peng, Ke Tang, Guoliang Chen, Xin Yao:
Population-Based Algorithm Portfolios for Numerical Optimization. IEEE Trans. Evol. Comput. 14(5): 782-800 (2010) - [c41]Sherah Kurnia, Fei Peng, Yi Ruo Liu:
Understanding the Adoption of Electronic Banking in China. HICSS 2010: 1-10 - [c40]Fei Peng, Sherah Kurnia:
Understanding Hospital Information Systems Adoption in China. PACIS 2010: 66 - [c39]Joo Suk Han, Sherah Kurnia, Fei Peng:
The Impact of Two-Factor Authentication Technology on the Adoption of Internet Banking. PACIS 2010: 146 - [c38]Fei Peng, Yi Luo:
Improved DE-Based Reversible Watermarking Using Sorting and Histogram Shifting. PCM (1) 2010: 611-621 - [c37]Lin Liu, Tong Li, Fei Peng:
Why Requirements Engineering Fails: A Survey Report from China. RE 2010: 317-322
2000 – 2009
- 2009
- [c36]Fei Peng, Victor C. M. Leung:
Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs. ADHOCNETS 2009: 407-421 - [c35]Deliang Li, Fei Peng, Depei Qian:
An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN. ADHOCNETS 2009: 805-817 - [c34]Fei Peng, Ke Tang, Guoliang Chen, Xin Yao:
Multi-start JADE with knowledge transfer for numerical optimization. IEEE Congress on Evolutionary Computation 2009: 1889-1895 - [c33]Fei Peng, Guangjun Xie, Tianhao Wu:
Optimizing quantum teleportation circuit using genetic algorithm. GrC 2009: 466-470 - [c32]Fei Peng, Yu-Zhou Lei, Chang-Tsun Li, Yue Li:
A reversible watermarking scheme for 2D engineering graphics based on improved quantisation index modulation. ICDP 2009: 1-6 - [c31]Wenting Ma, Lin Liu, Wenzhong Feng, Yuhui Shan, Fei Peng:
Analyzing project risks within a cultural and organizational setting. LMSA@ICSE 2009: 6-14 - [c30]Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. ISDF 2009: 11-18 - [c29]Lin Liu, Hongyu Zhang, Fei Peng, Wenting Ma, Yuhui Shan, Jun Xu, Tomas Burda:
Understanding Chinese Characteristics of Requirements Engineering. RE 2009: 261-266 - 2008
- [j5]Fei Peng, William E. Ryan:
MLSD Bounds and Receiver Designs for Clipped OFDM Channels. IEEE Trans. Wirel. Commun. 7(9): 3568-3578 (2008) - [c28]Fei Peng, Kehong Yuan, Shu Feng, Wufan Chen:
Pre-Processing of CT Brain Images for Content-Based Image Retrieval. BMEI (2) 2008: 208-212 - [c27]Shuaijun Li, Fei Peng:
An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems. ICYCS 2008: 1435-1439 - [c26]Fei Peng, Tao Deng, Min Long:
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling. ICYCS 2008: 2809-2813 - [c25]Xiaofeng Huang, Fei Peng, Tao Deng:
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System. IIH-MSP 2008: 339-342 - [c24]Tao Deng, Fei Peng, Xiaofeng Huang:
A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling. IIH-MSP 2008: 1352-1355 - [c23]Fei Peng, Xingming Sun:
Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic. IIH-MSP 2008: 1516-1519 - [c22]Qiaozhuo Du, Fei Peng:
A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic. ISECS 2008: 890-893 - [c21]Weixiang Liu, Fei Peng, Shu Feng, Jiangsheng You, Ziqiang Chen, Jian Wu, Kehong Yuan, Datian Ye:
Semantic Feature Extraction for Brain CT Image Clustering Using Nonnegative Matrix Factorization. ICMB 2008: 41-48 - [c20]Fei Peng, Sherah Kurnia:
Exploring the National Context in Electronic Commerce Adoption in Developing Countries. PACIS 2008: 71 - [c19]Yuhui Shan, Lin Liu, Fei Peng:
MEGORE: Multimedia Enhanced Goal-Oriented Requirement Elicitation Experience in China. MERE 2008: 37-41 - 2007
- [b1]Fei Peng:
Coded Non-Ideal OFDM Systems: Analysis and Receiver Designs. University of Arizona, Tucson, USA, 2007 - [j4]Fei Peng, Victor C. M. Leung:
Enhancing Fairness and Throughput of TCP in Heterogeneous Wireless Access Networks. Int. J. Wirel. Inf. Networks 14(3): 225-236 (2007) - [c18]Fei Peng, William E. Ryan:
MLSD Bounds and Near-Optimum Receiver Designs for Clipped OFDM Channels. GLOBECOM 2007: 1688-1692 - [c17]Fei Peng, William E. Ryan, Jinyun Zhang:
MLSD Bounds for Clipped OFDM Systems Over Frequency-Selective Quasi-Static Fading Channels. GLOBECOM 2007: 1693-1698 - [c16]Fei Peng, Jinyun Zhang:
On Residual Carrier Frequency Offset Mitigation for 802.11N. ICASSP (3) 2007: 257-260 - [c15]Fei Peng, Jinyun Zhang, William E. Ryan:
Adaptive Modulation and Coding for IEEE 802.11n. WCNC 2007: 656-661 - 2006
- [j3]Fei Peng, William E. Ryan, Richard D. Wesel:
Surrogate-channel design of universal LDPC codes. IEEE Commun. Lett. 10(6): 480-482 (2006) - [j2]Fei Peng, Lijuan Wu, Victor C. M. Leung:
Cross-layer enhancement of TCP split-connections over satellites links. Int. J. Satell. Commun. Netw. 24(5): 405-418 (2006) - [j1]Fei Peng, Michael Yang, William E. Ryan:
Simplified eIRA code design and performance analysis for correlated Rayleigh fading channels. IEEE Trans. Wirel. Commun. 5(4): 720-725 (2006) - [c14]Fei Peng, Hussein M. Alnuweiri, Victor C. M. Leung:
Analysis of Burst Transmission in IEEE 802.11e Wireless LANs. ICC 2006: 535-539 - [c13]Fei Peng, William E. Ryan:
On the Capacity of Clipped OFDM Channels. ISIT 2006: 1866-1870 - [c12]Hao Wang, Fei Peng, Chao Zhang, Andrej Pietschker:
Software Project Level Estimation Model Framework based on Bayesian Belief Networks. QSIC 2006: 209-218 - [c11]Yifei Zhang, William E. Ryan, Fei Peng:
Design of structured eIRA codes with applications to wireless channels. WCNC 2006: 1390-1395 - [c10]Fei Peng, William E. Ryan:
Low-complexity soft demapper for OFDM fading channels with ICI. WCNC 2006: 1549-1554 - 2005
- [c9]Fei Peng, William E. Ryan:
New approaches to clipped OFDM channels: modeling and receiver design. GLOBECOM 2005: 5 - [c8]Fei Peng, Hussein M. Alnuweiri, Victor C. M. Leung:
A novel flow control scheme for improving TCP fairness and throughput over heterogeneous networks with wired and wireless links. ICC 2005: 3565-3569 - 2004
- [c7]Fei Peng, Michael Yang, William E. Ryan:
Design and analysis of eIRA codes on correlated fading channels. GLOBECOM 2004: 503-508 - [c6]Lijuan Wu, Fei Peng, Victor C. M. Leung:
Dynamic Congestion Control to Improve Performance of TCP Split-Connections over Satellite Links. ICCCN 2004: 268-275 - [c5]Lijuan Wu, Fei Peng, Victor C. M. Leung:
Dynamic congestion control for satellite networks employing TCP performance enhancement proxies. PIMRC 2004: 2071-2075 - 2003
- [c4]Fei Peng, Victor C. M. Leung:
A novel fair bandwidth allocation algorithm for TCP window control. IPCCC 2003: 317-324 - [c3]Fei Peng, Victor C. M. Leung:
Enhancing fairness and throughput of TCP in heterogeneous wireless networks. PIMRC 2003: 94-98 - 2002
- [c2]Fei Peng, Victor C. M. Leung:
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows. LCN 2002: 53-61 - 2000
- [c1]Fei Peng, Bocong Wei, Yan Ma:
Delay performance analysis of token-based fast TCP in window limit systems. ICCCN 2000: 569-574
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint