default search action
Lixiang Li 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
Other persons with the same name
- Lixiang Li 0002 — Changsha University of Science and Technology, School of Computer and Communication Engineering, Changsha, China
- Lixiang Li 0003 — Dalhousie University, Canada
- Lixiang Li 0004 — miHoYo Co., Ltd., China
- Lixiang Li 0005 — Nanjing University, School of Management and Engineering, China
- Lixiang Li 0006 — Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing, China
- Lixiang Li 0007 — Purdue University, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j147]Wei Wu, Haipeng Peng, Chuxiao Xu, Yuhong Liu, Lixiang Li:
A malware visualization method based on transition probability matrix suitable for imbalanced family classification. Appl. Intell. 55(3): 236 (2025) - [j146]Ran Zhang, Jingguo Bi, Lixiang Li, Haipeng Peng:
An optimal bound for factoring unbalanced RSA moduli by solving Generalized Implicit Factorization Problem. J. Supercomput. 81(1): 102 (2025) - 2024
- [j145]Fenghua Tong, Dawei Zhao, Xin Li, Lixiang Li:
Designing incoherent unit norm tight frames via block coordinate descent-based alternating projection. Appl. Math. Comput. 474: 128687 (2024) - [j144]Jingyu Sun, Lixiang Li, Haipeng Peng, Yin Meng:
A Novel Memristors Based Echo State Network Model Inspired by the Brain's Uni-hemispheric Slow-Wave Sleep Characteristics. Cogn. Comput. 16(4): 1470-1483 (2024) - [j143]Lanlan Wang, Haipeng Peng, Lixiang Li, Shuang Bao, Junying Liang:
High-capacity medical information hiding scheme with P-tensor product secret image sharing for wireless body area networks. Digit. Signal Process. 146: 104365 (2024) - [j142]Xiaofei He, Lixiang Li, Fenghua Tong, Haipeng Peng:
Multilevel Privacy Protection for Social Media Based on 2-D Compressive Sensing. IEEE Internet Things J. 11(4): 6878-6892 (2024) - [j141]Xu He, Lixiang Li, Haipeng Peng:
A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. IEEE Internet Things J. 11(7): 11381-11394 (2024) - [j140]Lanlan Wang, Haipeng Peng, Lixiang Li, Shuang Bao:
Flexible Visually Meaningful Image Transmission Scheme in WSNs Using Fourier Optical Speckle-Based Compressive Sensing. IEEE Internet Things J. 11(8): 13524-13539 (2024) - [j139]Wei Wu, Haipeng Peng, Haotian Zhu, Lixiang Li:
MVC-RSN: A Malware Classification Method With Variant Identification Ability. IEEE Internet Things J. 11(21): 35654-35668 (2024) - [j138]Bichen Che, Shuntian Zheng, Zhao Dou, Xiubo Chen, Lixiang Li, Jian Li, Yixian Yang:
Controlled node dialogue in IoT networks based on nonlocal orthogonal product states. J. Opt. Commun. Netw. 16(3): 317-327 (2024) - [j137]Mingjie Zhao, Zheng Yuan, Lixiang Li, Xiu-Bo Chen:
A novel efficient S-box design algorithm based on a new chaotic map and permutation. Multim. Tools Appl. 83(24): 64899-64918 (2024) - [j136]Mengmeng Zhao, Haipeng Peng, Lixiang Li, Yeqing Ren:
Graph Attention Network and Informer for Multivariate Time Series Anomaly Detection. Sensors 24(5): 1522 (2024) - [j135]Xiaofei He, Lixiang Li, Haipeng Peng, Fenghua Tong:
A multi-level privacy-preserving scheme for extracting traffic images. Signal Process. 220: 109445 (2024) - [j134]Haipeng Peng, Shuang Bao, Lixiang Li:
A Survey of Security Protection Methods for Deep Learning Model. IEEE Trans. Artif. Intell. 5(4): 1533-1553 (2024) - [j133]Jingyu Sun, Lixiang Li, Haipeng Peng, Guanhua Chen, Shengyu Liu:
Sequence prediction with different dimensions based on two novel deep echo state network models. Trans. Inst. Meas. Control 46(11): 2062-2076 (2024) - [j132]Xiaofei He, Lixiang Li, Haipeng Peng, Fenghua Tong:
An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption. IEEE Trans. Intell. Transp. Syst. 25(10): 14958-14972 (2024) - [j131]Yeqing Ren, Haipeng Peng, Lixiang Li, Yixian Yang:
Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation. IEEE Trans. Multim. 26: 4360-4374 (2024) - [c23]Dawei Zhao, Hui Yu, Chuan Chen, Lixiang Li, Ling Mi:
Speech Encryption Scheme Based on Chaotic Memristor Neural Network and S-Box. NLPCC (4) 2024: 483-495 - [c22]Xue Liang, Lixiang Li, Haipeng Peng:
Unsupervised Microservice Log Anomaly Detection Method Based on Graph Neural Network. ICSI 2024: 197-208 - [i7]Xiao Liu, Mingyuan Li, Xu Wang, Guangsheng Yu, Wei Ni, Lixiang Li, Haipeng Peng, Ren Ping Liu:
Decentralized Federated Unlearning on Blockchain. CoRR abs/2402.16294 (2024) - [i6]Xiao Liu, Mingyuan Li, Xu Wang, Guangsheng Yu, Wei Ni, Lixiang Li, Haipeng Peng, Ren Ping Liu:
Fishers Harvest Parallel Unlearning in Inherited Model Networks. CoRR abs/2408.08493 (2024) - 2023
- [j130]Shanshan Zhao, Lixiang Li, Haipeng Peng:
Incorporating retrieval-based method for feature enhanced image captioning. Appl. Intell. 53(8): 9731-9743 (2023) - [j129]Wei Wu, Haipeng Peng, Fenghua Tong, Lixiang Li:
A Chaotic Compressed Sensing-Based Multigroup Secret Image Sharing Method for IoT With Critical Information Concealment Function. IEEE Internet Things J. 10(2): 1192-1207 (2023) - [j128]Wei Wu, Haipeng Peng, Fenghua Tong, Lixiang Li:
Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function. IEEE Internet Things J. 10(5): 4557-4578 (2023) - [j127]Xu He, Lixiang Li, Haipeng Peng:
A controllable delegation scheme for the subscription to multimedia platforms. Inf. Sci. 641: 119086 (2023) - [j126]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Shuang Bao, Lanlan Wang:
A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. J. Inf. Secur. Appl. 75: 103487 (2023) - [j125]Xu He, Lixiang Li, Haipeng Peng:
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage. J. Syst. Archit. 136: 102833 (2023) - [j124]Yeqing Ren, Haipeng Peng, Lixiang Li, Xiaopeng Xue, Yang Lan, Yixian Yang:
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation. J. Syst. Archit. 143: 102981 (2023) - [j123]Zijian Wang, Hui Zhao, Mingwen Zheng, Sijie Niu, Xizhan Gao, Lixiang Li:
A novel time series prediction method based on pooling compressed sensing echo state network and its application in stock market. Neural Networks 164: 216-227 (2023) - [j122]Qingjie Wang, Hui Zhao, Aidi Liu, Sijie Niu, Xizhan Gao, Xiju Zong, Lixiang Li:
An Improved Fixed-Time Stability Theorem and its Application to the Synchronization of Stochastic Impulsive Neural Networks. Neural Process. Lett. 55(6): 7447-7467 (2023) - [j121]Fenghua Tong, Dawei Zhao, Chuan Chen, Lixiang Li:
Coherence-penalty minimization method for incoherent unit-norm tight frame design. Signal Process. 205: 108864 (2023) - [j120]Yeqing Ren, Haipeng Peng, Lixiang Li, Xiaopeng Xue, Yang Lan, Yixian Yang:
Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation. IEEE ACM Trans. Audio Speech Lang. Process. 31: 2461-2475 (2023) - [j119]Haipeng Peng, Jie Zhao, Lixiang Li, Yeqing Ren, Shanshan Zhao:
One-Class Adversarial Fraud Detection Nets With Class Specific Representations. IEEE Trans. Netw. Sci. Eng. 10(6): 3793-3803 (2023) - [j118]Yanzhao Tian, Lixiang Li, Haipeng Peng, Ding Wang, Yixian Yang:
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences. IEEE Trans. Serv. Comput. 16(6): 4567-4579 (2023) - [c21]Lixiang Li, Xiaopeng Xue, Haipeng Peng, Yeqing Ren, Mengmeng Zhao:
Improved One-class Learning for Voice Spoofing Detection. APSIPA ASC 2023: 1978-1983 - [c20]Lixiang Li, Yuxuan Liu, Haipeng Peng:
Intrusion Detection Method Based on Complementary Adversarial Generation Network. ICSI (2) 2023: 260-271 - 2022
- [j117]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Yixian Yang:
Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs. Appl. Math. Comput. 420: 126901 (2022) - [j116]Yongli Tang, Yanpeng Ba, Lixiang Li, Xiaojun Wang, Xixi Yan:
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. Clust. Comput. 25(4): 2305-2316 (2022) - [j115]Shanshan Zhao, Lixiang Li, Haipeng Peng:
Aligned visual semantic scene graph for image captioning. Displays 74: 102210 (2022) - [j114]Xiaofei Tong, Jingguo Bi, Yufei Duan, Lixiang Li, Licheng Wang:
Security Analysis of DBTRU Cryptosystem. Entropy 24(10): 1349 (2022) - [j113]Aidi Liu, Hui Zhao, Qingjie Wang, Sijie Niu, Xizhan Gao, Zhen Su, Lixiang Li:
Fixed/Predefined-time synchronization of memristor-based complex-valued BAM neural networks for image protection. Frontiers Neurorobotics 16 (2022) - [j112]Lixiang Li, Sirui Li, Haipeng Peng, Jingguo Bi:
An efficient secure data transmission and node authentication scheme for wireless sensing networks. J. Syst. Archit. 133: 102760 (2022) - [j111]Aidi Liu, Hui Zhao, Qingjié Wang, Sijie Niu, Xizhan Gao, Chuan Chen, Lixiang Li:
A new predefined-time stability theorem and its application in the synchronization of memristive complex-valued BAM neural networks. Neural Networks 153: 152-163 (2022) - [j110]Wei Wu, Haipeng Peng, Fenghua Tong, Lixiang Li, Binzhu Xie:
A Chaotic Compressive Sensing Based Data Transmission Method for Sensors within BBNs. Sensors 22(15): 5909 (2022) - [j109]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong:
Construction of Structured Random Measurement Matrices in Semi-Tensor Product Compressed Sensing Based on Combinatorial Designs. Sensors 22(21): 8260 (2022) - [j108]Fenghua Tong, Lixiang Li, Haipeng Peng, Dawei Zhao:
Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing. Signal Process. 194: 108435 (2022) - [j107]Qingjié Wang, Hui Zhao, Aidi Liu, Lixiang Li, Sijie Niu, Chuan Chen:
Predefined-Time Synchronization of Stochastic Memristor-Based Bidirectional Associative Memory Neural Networks With Time-Varying Delays. IEEE Trans. Cogn. Dev. Syst. 14(4): 1584-1593 (2022) - [j106]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks. IEEE Trans. Cloud Comput. 10(3): 2038-2049 (2022) - [c19]Wei Wu, Haipeng Peng, Lixiang Li:
CSHEM - A Compressed Sensing Based Secure Data Processing Method for Electrical Data. DMBD (1) 2022: 255-270 - [c18]Wei Wu, Haipeng Peng, Lixiang Li, Harry Eugene Stanley, Licheng Wang, Jürgen Kurths:
A Novel Intelligent Ant Colony System Based on Blockchain. ICSI (1) 2022: 230-246 - 2021
- [j105]Yanzhao Tian, Lixiang Li, Haipeng Peng, Yixian Yang:
Achieving flatness: Graph labeling can generate graphical honeywords. Comput. Secur. 104: 102212 (2021) - [j104]Hui Zhao, Aidi Liu, Qingjié Wang, Mingwen Zheng, Chuan Chen, Sijie Niu, Lixiang Li:
Predefined-Time Stability/Synchronization of Coupled Memristive Neural Networks With Multi-Links and Application in Secure Communication. Frontiers Neurorobotics 15: 783809 (2021) - [j103]Zhongkai Dang, Lixiang Li, Haipeng Peng, Jiaxuan Zhang:
Impact of Sudden Global Events on Cross-Field Research Cooperation. Inf. 12(1): 26 (2021) - [j102]Xiangjian Zuo, Lixiang Li, Shoushan Luo, Haipeng Peng, Yixian Yang, Linming Gong:
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks. IEEE Internet Things J. 8(6): 4590-4603 (2021) - [j101]Lixiang Li, Yixin Chen, Haipeng Peng, Yixian Yang:
Chaotic Deep Network for Mobile D2D Communication. IEEE Internet Things J. 8(10): 8078-8096 (2021) - [j100]Zhongkai Dang, Lixiang Li, Wei Ni, Ren Ping Liu, Haipeng Peng, Yixian Yang:
How does rumor spreading affect people inside and outside an institution. Inf. Sci. 574: 377-393 (2021) - [j99]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
Flexible construction of compressed sensing matrices with low storage space and low coherence. Signal Process. 182: 107951 (2021) - [j98]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Syst. J. 15(1): 395-406 (2021) - [j97]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry. IEEE Trans. Inf. Theory 67(8): 5548-5561 (2021) - [c17]Yixiao Li, Lixiang Li, Zirui Zhuang, Yuan Fang, Yixian Yang:
ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding. DSC 2021: 130-135 - [c16]Yuan Fang, Lixiang Li, Yixiao Li, Haipeng Peng:
High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network. DSC 2021: 670-676 - 2020
- [j96]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang, Chuan Chen:
Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays. IEEE Access 8: 7103-7116 (2020) - [j95]Xiaoli Qin, Cong Wang, Lixiang Li, Haipeng Peng, Lu Ye:
Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control. IEEE Access 8: 55398-55410 (2020) - [j94]Lixiang Li, Xiaohui Mu, Siying Li, Haipeng Peng:
A Review of Face Recognition Technology. IEEE Access 8: 139110-139120 (2020) - [j93]Shaofang Wang, Lixiang Li, Haipeng Peng, Yixian Yang, Mingwen Zheng:
Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays. IEEE Access 8: 169966-169981 (2020) - [j92]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
An effective algorithm for the spark of sparse binary measurement matrices. Appl. Math. Comput. 371 (2020) - [j91]Yuan Liu, Licheng Wang, Xiaoying Shen, Lixiang Li:
New Constructions of Identity-Based Dual Receiver Encryption from Lattices. Entropy 22(6): 599 (2020) - [j90]Weiping Wang, Xiao Jia, Zhen Wang, Xiong Luo, Lixiang Li, Jürgen Kurths, Manman Yuan:
Fixed-time synchronization of fractional order memristive MAM neural networks by sliding mode control. Neurocomputing 401: 364-376 (2020) - [j89]Haipeng Peng, Bo Yang, Lixiang Li, Yixian Yang:
Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System. IEEE Internet Things J. 7(3): 2432-2451 (2020) - [j88]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Hui Zhao:
A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks. Neural Networks 123: 412-419 (2020) - [j87]Yuan Liu, Licheng Wang, Xiaoying Shen, Lixiang Li, Dezhi An:
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes. Secur. Commun. Networks 2020: 2345369:1-2345369:11 (2020) - [j86]Yongli Tang, Mingjie Zhao, Lixiang Li:
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing. Secur. Commun. Networks 2020: 6665702:1-6665702:15 (2020) - [j85]Yuan Fang, Lixiang Li, Yixiao Li, Haipeng Peng, Yixian Yang:
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network. Sensors 20(5): 1264 (2020) - [j84]Lixiang Li, Guoqian Wen, Zeming Wang, Yixian Yang:
Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications. IEEE Trans. Multim. 22(1): 82-95 (2020) - [c15]Lixiang Li, Jin Yan, Haipeng Peng, Yixian Yang:
An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments. ICBCT 2020: 105-109 - [i5]Lixiang Li, Zihang Yang, Zhongkai Dang, Cui Meng, Jingze Huang, Hao Tian Meng, Deyu Wang, Guanhua Chen, Jiaxuan Zhang, Haipeng Peng:
Propagation analysis and prediction of the COVID-19. CoRR abs/2003.06846 (2020)
2010 – 2019
- 2019
- [j83]Yuan Liu, Licheng Wang, Lixiang Li, Xixi Yan:
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices. IEEE Access 7: 3665-3674 (2019) - [j82]Zhanqiang Liu, Licheng Wang, Xianmin Wang, Xiaoying Shen, Lixiang Li:
Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting. IEEE Access 7: 36516-36526 (2019) - [j81]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang:
Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product. IEEE Access 7: 81599-81611 (2019) - [j80]Licheng Wang, Jingwen Suo, Yun Pan, Lixiang Li:
DDmap: a MATLAB package for the double digest problem using multiple genetic operators. BMC Bioinform. 20(1): 348:1-348:12 (2019) - [j79]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
General decay synchronization of complex multi-links time-varying dynamic network. Commun. Nonlinear Sci. Numer. Simul. 67: 108-123 (2019) - [j78]Dong Xie, Fulong Chen, Yonglong Luo, Lixiang Li:
One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit. Signal Process. 95 (2019) - [j77]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Lianhai Wang:
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks. Neurocomputing 349: 290-300 (2019) - [j76]Licheng Wang, Lixiang Li, Jin Li, Jing Li, Brij B. Gupta, Xia Liu:
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations. IEEE Internet Things J. 6(2): 1402-1409 (2019) - [j75]Lixiang Li, Lifei Liu, Haipeng Peng, Yixian Yang, Shizhuo Cheng:
Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks. IEEE Internet Things J. 6(2): 3212-3227 (2019) - [j74]Haipeng Peng, Yaqi Mi, Lixiang Li, Harry Eugene Stanley, Yixian Yang:
P-Tensor Product in Compressed Sensing. IEEE Internet Things J. 6(2): 3492-3511 (2019) - [j73]Jiangtao Yuan, Lixiang Li:
A fully dynamic secret sharing scheme. Inf. Sci. 496: 42-52 (2019) - [j72]Yueyi Zhang, Lixiang Li, Mingshun Song, Ronghua Yi:
Optimal tolerance design of hierarchical products based on quality loss function. J. Intell. Manuf. 30(1): 185-192 (2019) - [j71]Yonggang Chen, Lixiang Li, Xinchao Zhao, Jinghua Xiao, Qingtao Wu, Ying Tan:
Simplified hybrid fireworks algorithm. Knowl. Based Syst. 173: 128-139 (2019) - [j70]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang:
Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation. Neural Comput. Appl. 31(8): 4031-4047 (2019) - [j69]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Fixed-time synchronization of inertial memristor-based neural networks with discrete delay. Neural Networks 109: 81-89 (2019) - [j68]Manman Yuan, Xiong Luo, Weiping Wang, Lixiang Li, Haipeng Peng:
Pinning Synchronization of Coupled Memristive Recurrent Neural Networks with Mixed Time-Varying Delays and Perturbations. Neural Process. Lett. 49(1): 239-262 (2019) - [j67]Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang:
Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks. IEEE Syst. J. 13(2): 1454-1465 (2019) - [j66]Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang:
Anonymous three-factor authenticated key agreement for wireless sensor networks. Wirel. Networks 25(4): 1461-1475 (2019) - [c14]Xue Bai, Licheng Wang, Lijing Zhou, Sijia Yang, Lixiang Li:
RZcash: A Privacy Protection Scheme for the Account-based Blockchain. PST 2019: 1-9 - [c13]Xiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, Sijia Yang:
A blockchain-based loan over-prevention mechanism. PST 2019: 1-9 - 2018
- [j65]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang:
Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers. IEEE Access 6: 12085-12102 (2018) - [j64]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays. IEEE Access 6: 40768-40777 (2018) - [j63]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl. Math. Comput. 322: 100-110 (2018) - [j62]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks. Commun. Nonlinear Sci. Numer. Simul. 59: 272-291 (2018) - [j61]Yonggang Chen, Lixiang Li, Jinghua Xiao, Yixian Yang, Jun Liang, Tao Li:
Particle swarm optimizer with crossover operation. Eng. Appl. Artif. Intell. 70: 159-169 (2018) - [j60]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang:
Incremental general non-negative matrix factorization without dimension matching constraints. Neurocomputing 311: 344-352 (2018) - [j59]Xinxin Zhu, Lixiang Li, Jing Liu, Ziyi Li, Haipeng Peng, Xinxin Niu:
Image captioning with triple-attention and stack parallel LSTM. Neurocomputing 319: 55-65 (2018) - [j58]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay. J. Frankl. Inst. 355(14): 6780-6809 (2018) - [j57]XiaoLiang Dong, Deren Han, Zhifeng Dai, Lixiang Li, Jianguang Zhu:
An Accelerated Three-Term Conjugate Gradient Method with Sufficient Descent Condition and Conjugacy Condition. J. Optim. Theory Appl. 179(3): 944-961 (2018) - [j56]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Hui Zhao:
Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control. Neural Comput. Appl. 30(7): 2217-2227 (2018) - [j55]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng:
A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 14-19 (2018) - [j54]Hui Zhao, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation. Neural Process. Lett. 47(2): 509-533 (2018) - [j53]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations. Neural Process. Lett. 47(2): 679-696 (2018) - [j52]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang:
Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks. Neural Process. Lett. 48(3): 1431-1458 (2018) - [j51]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng, Jingfeng Ren, Haochun Qi:
General Theory of security and a study of hacker's behavior in big data era. Peer-to-Peer Netw. Appl. 11(2): 210-219 (2018) - [j50]Yongli Tang, Huanhuan Lian, Lixiang Li, Xiaojun Wang, Xixi Yan:
A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network. Sensors 18(11): 3962 (2018) - [j49]Yonggang Chen, Lixiang Li, Haipeng Peng, Jinghua Xiao, Qingtao Wu:
Dynamic multi-swarm differential learning particle swarm optimizer. Swarm Evol. Comput. 39: 209-221 (2018) - [j48]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang:
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization. IEEE Trans. Multim. 20(8): 1973-1986 (2018) - [c12]Lixiang Li, Haipeng Peng, Liwei Liu, Yixian Yang:
An Efficient and Secure Transmission Model Based on Compressive Sensing. SocialSec 2018: 27-32 - [c11]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang:
An evaluation method of image scrambling degree based on pixel distribution. SocialSec 2018: 33-38 - 2017
- [j47]Yonggang Chen, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yuhui Shi:
Particle swarm optimizer with two differential mutation. Appl. Soft Comput. 61: 314-330 (2017) - [j46]Hui Zhao, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Mingwen Zheng:
Finite-time topology identification and stochastic synchronization of complex network with multiple time delays. Neurocomputing 219: 39-49 (2017) - [j45]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Finite-time synchronization of memristor-based neural networks with mixed delays. Neurocomputing 235: 83-89 (2017) - [j44]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Hui Zhao:
Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method. Neurocomputing 238: 67-75 (2017) - [j43]Yixian Yang, Haipeng Peng, Lixiang Li, Xinxin Niu:
General Theory of Security and a Study Case in Internet of Things. IEEE Internet Things J. 4(2): 592-600 (2017) - [j42]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Homomorphic Signatures from Chameleon Hash Functions. Inf. Technol. Control. 46(2): 274-286 (2017) - [j41]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multim. Tools Appl. 76(2): 1801-1815 (2017) - [j40]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay. Neural Networks 96: 47-54 (2017) - [j39]Haipeng Peng, Ye Tian, Jürgen Kurths, Lixiang Li, Yixian Yang, Daoshun Wang:
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks. IEEE Trans. Biomed. Circuits Syst. 11(3): 558-573 (2017) - [j38]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 96(1): 813-832 (2017) - [c10]Xiaoyong Lin, Pengwei Yin, Yun Xia, Yang Yu, Tingting Qiu, Xiaoming Wang, Lixiang Li:
MPLB: A Load Balance Scheme of Joint Resource Scheduling in Heterogeneous Wireless Network. CyberC 2017: 517-524 - [c9]Kai Wang, Christopher Greiner, John Batteh, Lixiang Li:
Integration of complex Modelica-based physics models and discrete-time control systems: Approaches and observations of numerical performance. Modelica 2017: 132:059 - 2016
- [j37]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Semi-tensor compressed sensing. Digit. Signal Process. 58: 85-92 (2016) - [j36]Yuanqing Li, Haibin Wang, Lixiang Li, Li Chen, Rui Liu, Mo Chen:
A Built-in Single Event Upsets Detector for Sequential Cells. J. Electron. Test. 32(1): 11-20 (2016) - [j35]Yuanqing Li, Lixiang Li, Yuan Ma, Li Chen, Rui Liu, Haibin Wang, Qiong Wu, Michael Newton, Mo Chen:
A 10-Transistor 65 nm SRAM Cell Tolerant to Single-Event Upsets. J. Electron. Test. 32(2): 137-145 (2016) - [j34]Qingyu Chen, Haibin Wang, Li Chen, Lixiang Li, Xing Zhao, Rui Liu, Mo Chen, Xuantian Li:
An SEU-Resilient SRAM Bitcell in 65-nm CMOS Technology. J. Electron. Test. 32(3): 385-391 (2016) - [j33]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Inf. Technol. Control. 45(4): 393-400 (2016) - [j32]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks. KSII Trans. Internet Inf. Syst. 10(3): 1273-1288 (2016) - [j31]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model. KSII Trans. Internet Inf. Syst. 10(5): 2427-2445 (2016) - [j30]Weiping Wang, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations. Neural Process. Lett. 43(1): 49-63 (2016) - [j29]Weiping Wang, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays. Neural Process. Lett. 43(1): 269-283 (2016) - [j28]Hui Zhao, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang:
Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay. Neural Process. Lett. 44(3): 665-679 (2016) - [j27]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 9(2): 449-459 (2016) - [j26]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. Secur. Commun. Networks 9(11): 1321-1330 (2016) - [j25]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. Secur. Commun. Networks 9(11): 1331-1339 (2016) - [j24]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Short lattice signatures with constant-size public keys. Secur. Commun. Networks 9(18): 5490-5501 (2016) - [j23]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks. Sensors 16(6): 837 (2016) - 2015
- [j22]Lixiang Li, Yuanqing Li, Haibin Wang, Rui Liu, Qiong Wu, Michael Newton, Yuan Ma, Li Chen:
Simulation and Experimental Evaluation of a Soft Error Tolerant Layout for SRAM 6T Bitcell in 65nm Technology. J. Electron. Test. 31(5-6): 561-568 (2015) - [j21]Yanrong Lu, Lixiang Li, Haipeng Peng, Xing Yang, Yixian Yang:
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture. Int. J. Distributed Sens. Networks 11: 635890:1-635890:9 (2015) - [j20]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications. Inf. Technol. Control. 44(4): 404-409 (2015) - [j19]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem. J. Medical Syst. 39(3): 32 (2015) - [j18]Yanrong Lu, Lixiang Li, Haipeng Peng, Dong Xie, Yixian Yang:
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Medical Syst. 39(6): 65:1-65:10 (2015) - [j17]Weiping Wang, Haipeng Peng, Lixiang Li, Jinghua Xiao, Yixian Yang:
Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay. Neural Process. Lett. 41(1): 71-88 (2015) - [j16]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A biometrics and smart cards-based authentication scheme for multi-server environments. Secur. Commun. Networks 8(17): 3219-3228 (2015) - [c8]Lixiang Li, Yuanqing Li, Yuan Ma, Li Chen:
A novel asymmetrical SRAM cell tolerant to soft errors. CCECE 2015: 1403-1408 - [i4]Jing Yuan, Lixiang Li, Haipeng Peng, Jürgen Kurths, Xiaojing Hua, Yixian Yang:
The effect of randomness for dependency map on the robustness of interdependent lattices. CoRR abs/1509.05117 (2015) - 2014
- [j15]Dawei Zhao, Haipeng Peng, Lixiang Li, SiLi Hui, Yixian Yang:
Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci. 57(9): 1-14 (2014) - [j14]Weiping Wang, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang:
Synchronization control of memristor-based recurrent neural networks with perturbations. Neural Networks 53: 8-14 (2014) - [j13]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 78(1): 247-269 (2014) - 2013
- [c7]Yu-Ying Li, Lixiang Li, Haipeng Peng:
Improving Chaotic Ant Swarm Performance with Three Strategies. ICSI (1) 2013: 268-277 - [i3]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A secure and effective anonymous authentication scheme for roaming service in global mobility networks. CoRR abs/1306.4726 (2013) - [i2]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple Vectors Propagation of Epidemics in Complex Networks. CoRR abs/1307.1834 (2013) - [i1]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple routes transmitted epidemics on multiplex networks. CoRR abs/1312.6931 (2013) - 2012
- [j12]Miao Wan, Cong Wang, Lixiang Li, Yixian Yang:
Chaotic ant swarm approach for data clustering. Appl. Soft Comput. 12(8): 2387-2393 (2012) - [j11]Yinggan Tang, Mingyong Cui, Changchun Hua, Lixiang Li, Yixian Yang:
Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm. Expert Syst. Appl. 39(8): 6887-6896 (2012) - [j10]Min Lei, Haipeng Peng, Chunyu Yang, Lixiang Li:
Synchronization of Time-Delay Chaotic System in Presence of Noise. Int. J. Comput. Intell. Syst. 5(5): 834-840 (2012) - [j9]Hong Lai, Jinghua Xiao, Lixiang Li, Yixian Yang:
Recursive hiding of biometrics-based secret sharing scheme using adversary structure. Inf. Process. Lett. 112(17-18): 683-687 (2012) - [j8]Zhongtian Jia, Lixiang Li, Zhuoran Yu, Shudong Li, Yixian Yang:
A Secure Message Transaction Protocol for Delay Tolerant Networks. J. Commun. 7(8): 622-633 (2012) - [j7]Miao Wan, Lixiang Li, Jinghua Xiao, Cong Wang, Yixian Yang:
Data clustering using bacterial foraging optimization. J. Intell. Inf. Syst. 38(2): 321-341 (2012) - [j6]Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li, Yixian Yang:
Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3): 905-913 (2012) - [j5]Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang:
CSP-DHIES: a new public-key encryption scheme from matrix conjugation. Secur. Commun. Networks 5(7): 809-822 (2012) - [c6]Zhongtian Jia, Muhammad Ali Raffay, Lixiang Li, Xiaodong Lin, Yixian Yang:
A secure message delivery scheme with path tracking for delay tolerant networks. ICCC 2012: 161-166 - 2011
- [j4]Fangzhen Ge, Zhen Wei, Yang Lu, Lixiang Li, Yixian Yang:
Disturbance Chaotic Ant Swarm. Int. J. Bifurc. Chaos 21(9): 2597-2622 (2011) - [j3]Miao Wan, Arne Jönsson, Cong Wang, Lixiang Li, Yixian Yang:
Web user clustering and Web prefetching using Random Indexing with weight functions. Knowl. Inf. Syst. 33(1): 89-115 (2011) - [c5]Miao Wan, Arne Jönsson, Cong Wang, Lixiang Li, Yixian Yang:
A Random Indexing Approach for Web User Clustering and Web Prefetching. PAKDD Workshops 2011: 40-52 - 2010
- [j2]Qin Guo, Mingxing Luo, Lixiang Li, Yixian Yang:
Secure Network Coding against Wiretapping and Byzantine Attacks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c4]Xiaohong Zhang, Yixian Yang, Lixiang Li, Haipeng Peng:
An Extensible Hash Function Construction Based on Embedded Chaos Maps. CIT 2010: 2407-2414
2000 – 2009
- 2007
- [c3]Hongyu Zhu, Zhuzhi Jia, Haipeng Peng, Lixiang Li:
Chaotic Ant Swarm. ICNC (3) 2007: 446-450 - [c2]Yu-Ying Li, Lixiang Li, Qiaoyan Wen, Yixian Yang:
Integer Programming via Chaotic Ant Swarm. ICNC (4) 2007: 489-493 - 2006
- [j1]Lixiang Li, Yixian Yang, Haipeng Peng, Xiangdong Wang:
An Optimization Method Inspired by "chaotic" Ant Behavior. Int. J. Bifurc. Chaos 16(8): 2351-2364 (2006) - [c1]Yu-Ying Li, Lixiang Li, Qiao-Yan Wen, Yixian Yang:
Data Fitting Via Chaotic Ant Swarm. ICNC (2) 2006: 180-183
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint