


default search action
Xinyong Peng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j8]Yipeng Liu
, Yuming Lin
, Xinyong Peng
, You Li
, Jingwei Zhang
:
RDF-TDAA: Optimizing RDF indexing and querying with a trie based on Directly Addressable Arrays and a path-based strategy. Expert Syst. Appl. 279: 127384 (2025)
[j7]Hai Liang, Xiaoye Lu, Xinyong Peng, Yujue Wang, Changsong Yang, Lun Wang, Jun Li:
A multi-notary cross-chain system with supervision and identity tracking. Peer Peer Netw. Appl. 18(4): 221 (2025)
[j6]Mutala Mohammed
, Xinyong Peng, Zhi Chai, Mingye Li, Rahel Abayneh, Xuelin Yang:
Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform. Wirel. Networks 31(2): 1177-1185 (2025)
[c5]Hai Liang, Wenkang Tao, Yujue Wang, Shuo Wang, Yu Xu, Xinyong Peng:
Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services. AsiaJCIS 2025: 84-98
[c4]Zhihao Li, Chaozheng Wang, Zongjie Li, Xinyong Peng, Qun Xia, Haochuan Lu, Ting Xiong, Shuzheng Gao, Cuiyun Gao, Shuai Wang, Yuetang Deng, Huafeng Ma:
JSidentify-V2: Leveraging Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection. ASE 2025: 3133-3144
[i2]Zhihao Li, Chaozheng Wang, Zongjie Li, Xinyong Peng, Qun Xia, Haochuan Lu, Ting Xiong, Shuzheng Gao, Cuiyun Gao, Shuai Wang, Yuetang Deng, Huafeng Ma:
JSidentify-V2: Leveraging Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection. CoRR abs/2508.01655 (2025)
[i1]Zhihao Li, Chaozheng Wang, Zongjie Li, Xinyong Peng, Zelin Su, Qun Xia, Haochuan Lu, Ting Xiong, Man Ho Lam, Shuzheng Gao, Yuchong Xie, Cuiyun Gao, Shuai Wang, Yuetang Deng, Huafeng Ma:
JSProtect: A Scalable Obfuscation Framework for Mini-Games in WeChat. CoRR abs/2509.24498 (2025)- 2024
[j5]Renhui Huang
, Xinyong Peng, Zhi Chai, Mingye Li, Jiawei Ren, Xuelin Yang
:
Radio frequency fingerprint extraction and authentication towards open set in noisy channels. Digit. Signal Process. 146: 104363 (2024)
[j4]Xinyong Peng, Yue Zhao, Yaojun Cai, Xin Su:
Application of multi-attribute decision-making method based on fuzzy influence diagram in green supplier selection. Int. J. Comput. Commun. Control 19(2) (2024)
[j3]Zhi Chai
, Xinyong Peng
, Xinran Huang
, Mingye Li
, Xuelin Yang
:
Channel-Robust RF Fingerprint Identification Using Multi-Task Learning and Receiver Collaboration. IEEE Signal Process. Lett. 31: 2510-2514 (2024)
[j2]Mingye Li
, Xinyong Peng, Zhi Chai
, Xinran Huang, Renhui Huang, Yilin Qiu, Xuelin Yang
:
Chaotic Radio Frequency Fingerprint Masking Against Identity Attacks. IEEE Wirel. Commun. Lett. 13(9): 2616-2619 (2024)
[c3]Yong Ding, Enchang Yuan, Changsong Yang
, Hai Liang, Huiyong Wang, Xinyong Peng:
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid. DSC 2024: 38-45
[c2]Changsong Yang
, Sirui Huang, Yong Ding, Hai Liang, Siyuan Jia, Xinyong Peng:
A Perturbation-Based Privacy Leakage Defense Method for Federal Learning. DSC 2024: 46-52- 2023
[j1]Zhi Chai
, Xinyong Peng, Xuetong Chen, Liuming Zhang, Xinran Huang, Xuelin Yang
:
Lightweight and Fast Physical-Layer Key Generation in FDD Systems using Random Forest. Ad Hoc Networks 150: 103261 (2023)
[c1]Shuai Xu, Xinyong Peng, Dandan Huang, Changsong Yang, Yong Ding, Hai Liang:
OBiLSTM-Based Intrusion Detection Method for Industrial Internet of Things. DSC 2023: 189-196
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-09 22:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







