default search action
Lingxi Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Omer Abbaker Ahmed Mohammed, Lingxi Peng, Gehad Abdullah Amran, Hussain AlSalman, Modawy Adam Ali Abdalla, Omar Alkawmani, Muhammad Mursil, Bassiouny Saleh:
Optimal α-Variable Model-Free Adaptive Barrier Function Fractional Order Nonlinear Sliding Mode Control for Four Area Interconnected Hybrid Power System With Nonlinearities. IEEE Access 12: 61586-61609 (2024) - 2023
- [j24]Dongyuan Li, Lingxi Peng, Shaohu Peng, Hongxin Xiao, Yifan Zhang:
Retinal vessel segmentation by using AFNet. Vis. Comput. 39(5): 1929-1941 (2023) - [c31]Jinhui Lin, Haohuai Liu, Lingxi Peng, Xuebing Luo, Ziyan Ke, Zhiwen Yu, Ke Ding:
A Grasping System with Structured Light 3D Machine Vision Guided Strategy Optimization. KSEM (2) 2023: 383-395 - [c30]Ziyan Ke, Lingxi Peng, Yiduan Chen, Jie Liu, Xuebing Luo, Jinhui Lin, Zhiwen Yu:
MixUNet: A Hybrid Retinal Vessels Segmentation Model Combining The Latest CNN and MLPs. KSEM (1) 2023: 405-413 - 2022
- [j23]Xiang Xie, Rongfeng Zhang, Lingxi Peng, Shao-Hu Peng:
A Four-Stage Product Appearance Defect Detection Method With Small Samples. IEEE Access 10: 83740-83754 (2022) - [j22]Fufang Li, Binbin Li, Yongfeng Huang, Yuanyong Feng, Lingxi Peng, Naqin Zhou:
Research on covert communication channel based on modulation of common compressed speech codec. Neural Comput. Appl. 34(14): 11507-11520 (2022) - 2021
- [j21]Xiaowei Wang, Zhenhong Jiang, Lingxi Peng:
A Deep-Learning-Inspired Person-Job Matching Model Based on Sentence Vectors and Subject-Term Graphs. Complex. 2021: 6206288:1-6206288:11 (2021) - [j20]Fufang Li, Han Tang, Yukang Zou, Yongfeng Huang, Feng Yuanyong, Lingxi Peng:
Research on information security in text emotional steganography based on machine learning. Enterp. Inf. Syst. 15(7): 984-1001 (2021) - [j19]Lingxi Peng, Haohuai Liu, Yangang Nie, Ying Xie, Xuan Tang, Ping Luo:
The Transnational Happiness Study with Big Data Technology. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(1): 5:1-5:12 (2021) - 2020
- [j18]Yun Fu, Yu Liu, Lingyan Hu, Lingxi Peng:
Stabilisation of a Flexible Spacecraft Subject to External Disturbance and Uncertainties. Complex. 2020: 2906546:1-2906546:13 (2020) - [j17]Jiening Li, Hanqi Huang, Xiaoning Chen, Lingxi Peng, Liang Wang, Ping Luo:
The Small-Signal Stability of Offshore Wind Power Transmission Inspired by Particle Swarm Optimization. Complex. 2020: 9438285:1-9438285:13 (2020) - [j16]Fufang Li, Binbin Li, Liu Liangchen, Feng Yuanyong, Lingxi Peng:
A Steganography Method for G.729a Speech Coding. Int. J. Perform. Eng. 16(5): 784-791 (2020) - [j15]Tianwei Chen, Yongjun Qiang, Chunming Tang, Zairong Wang, Ping Luo, Lingxi Peng:
Malicious behaviour identification for Android based on an RBF neural network. Int. J. Secur. Networks 15(3): 148-154 (2020)
2010 – 2019
- 2019
- [j14]Hongjun Wang, Yinghui Zhang, Ji Zhang, Tianrui Li, Lingxi Peng:
A factor graph model for unsupervised feature selection. Inf. Sci. 480: 144-159 (2019) - 2018
- [c29]Fufang Li, Binbin Li, Lingxi Peng, Wenbin Chen, Ligang Zheng, Kefu Xu:
A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1. ICCCS (6) 2018: 312-322 - 2017
- [j13]Ying Xie, Yao-Hua Chen, Lingxi Peng:
An immune-inspired political boycotts action prediction paradigm. Clust. Comput. 20(2): 1379-1386 (2017) - [j12]Zhong Xiao, Lingxi Peng, Yi Chen, Haohuai Liu, Jiaqing Wang, Yangang Nie:
The Dissolved Oxygen Prediction Method Based on Neural Network. Complex. 2017: 4967870:1-4967870:6 (2017) - [c28]Tianwei Chen, Lingxi Peng, Yongjun Qiang:
Research on Mobile Layout Parser Based on Visualization. FSDM 2017: 46-53 - 2016
- [j11]Lingxi Peng, Wenbin Chen, Wubai Zhou, Fufang Li, Jin Yang, Jiandong Zhang:
An immune-inspired semi-supervised algorithm for breast cancer diagnosis. Comput. Methods Programs Biomed. 134: 259-265 (2016) - 2015
- [j10]Wenbin Chen, Lingxi Peng, Jianxiong Wang, Fufang Li, Maobin Tang, Wei Xiong, Songtao Wang:
An improved lower bound for approximating the Minimum Integral Solution Problem with Preprocessing over ℓ∞ norm. J. Comb. Optim. 30(3): 447-455 (2015) - [c27]Wenbin Chen, Lingxi Peng, Jianxiong Wang, Fufang Li, Maobin Tang:
Algorithms for the Densest Subgraph with at Least k Vertices and with a Specified Subset. COCOA 2015: 566-573 - 2014
- [j9]Lei Yang, Jue Wu, Feng Liu, Lingxi Peng:
Research of privacy-preserving data aggregation algorithm for wireless sensor network. Int. J. Sens. Networks 16(1): 41-47 (2014) - [j8]Wenbin Chen, Zhengzhang Chen, Nagiza F. Samatova, Lingxi Peng, Jianxiong Wang, Maobin Tang:
Solving the maximum duo-preservation string mapping problem with linear programming. Theor. Comput. Sci. 530: 1-11 (2014) - [c26]Lei Yang, Jue Wu, Lingxi Peng, Feng Liu:
Privacy-Preserving Data Mining Algorithm Based on Modified Particle Swarm Optimization. ICIC (2) 2014: 529-541 - [c25]Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu:
Multi-objective cloud estimation of distribution particle swarm optimizer using maximum ranking. ICNC 2014: 321-325 - 2013
- [j7]Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu:
Archimedean copula-based estimation of distribution algorithm for multi-objective optimisation. Int. J. Trust. Manag. Comput. Commun. 1(3/4): 200-211 (2013) - [j6]Caiming Liu, Yan Zhang, Zongyin Cai, Jin Yang, Lingxi Peng:
Artificial Immunity-based Security Response Model for the Internet of Things. J. Comput. 8(12): 3111-3118 (2013) - [j5]ChunLin Liang, Lingxi Peng:
An Automated Diagnosis System of Liver Disease using Artificial Immune and Genetic Algorithms. J. Medical Syst. 37(2): 9932 (2013) - [j4]Wenbin Chen, Lingxi Peng, Jianxiong Wang, Fufang Li, Maobin Tang, Wei Xiong, Songtao Wang:
Inapproximability results for the minimum integral solution problem with preprocessing over ℓ∞ℓ∞ norm. Theor. Comput. Sci. 478: 127-131 (2013) - [c24]Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu:
Multi-objective opposition-based learning fully informed particle swarm optimizer with favour ranking. GrC 2013: 114-119 - [c23]Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Xiao Hu:
EDA-Based Multi-objective Optimization Using Preference Order Ranking and Multivariate Gaussian Copula. ISNN (2) 2013: 341-350 - [c22]Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu:
Opposition-Based Learning Fully Informed Particle Swarm Optimizer without Velocity. ICSI (1) 2013: 79-86 - 2012
- [j3]Lingxi Peng, Dongqing Xie, Ying Gao, Wenbin Chen, Fufang Li, Wu Wen, Jue Wu:
An Immune-inspired Adaptive Automated Intrusion Response System Model. Int. J. Comput. Intell. Syst. 5(5): 808-815 (2012) - [j2]Liangyu Luan, Yingfang Fu, Peng Xiao, Lingxi Peng:
Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks. Int. J. Comput. Intell. Syst. 5(5): 878-886 (2012) - [c21]Caiming Liu, Chunming Xie, Yan Zhang, Qin Li, Lingxi Peng:
An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection. AICI 2012: 309-316 - [c20]Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Xiao Hu:
Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization. AICI 2012: 682-689 - [c19]Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. ICICA (LNCS) 2012: 229-235 - [c18]Jin Yang, Cilin Wang, Le Yu, Caiming Liu, Lingxi Peng:
Network Security Evaluation Model Based on Cloud Computing. ICICA (2) 2012: 488-495 - [c17]Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Efficient Detect Scheme of Botnet Command and Control Communication. ICICA (1) 2012: 576-581 - [c16]Caiming Liu, Yan Zhang, Jinquan Zeng, Lingxi Peng, Run Chen:
Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology. ICNC 2012: 874-878 - 2011
- [j1]Jin Yang, Tang Liu, Lingxi Peng, Xue Jun Li, Gang Luo:
Multilevel Network Security Monitoring and Evaluation Model. J. Softw. 6(5): 806-813 (2011) - [c15]Ying Gao, Xiao Hu, Huiliang Liu, Fufang Li, Lingxi Peng:
Opposition-Based Learning Estimation of Distribution Algorithm with Gaussian Copulas and Its Application to Placement of RFID Readers. AICI (1) 2011: 219-227 - [c14]Wei Xiong, Dongqing Xie, Lingxi Peng, Jie Liu:
PrChord: A probability routing structured P2P protocol. EMEIT 2011: 3142-3145 - 2010
- [c13]Jue Wu, Lixue Chen, Lei Yang, Lingxi Peng:
Research of Modified Quantum Genetic Algorithm and It's Application in Collision Detection. ICIC (3) 2010: 40-47 - [c12]ChunLin Liang, Yuefeng Chen, Yindie Hong, Lingxi Peng:
An unsupervised vegetation classification algorithm based immune. ICNC 2010: 2842-2846 - [c11]Jue Wu, Lingxi Peng, Lixue Chen, Lei Yang:
Quantum Immune Algorithm and Its Application in Collision Detection. LSMS/ICSEE (2) 2010: 138-147 - [c10]ChunLin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng:
Document Classification with Multi-layered Immune Principle. ICSI (1) 2010: 314-320 - [c9]Jue Wu, Lixue Chen, Lei Yang, Qunyan Zhang, Lingxi Peng:
A Collision Detection Algorithm Based on Self-adaptive Genetic Method in Virtual Environment. ICSI (1) 2010: 461-468
2000 – 2009
- 2009
- [c8]ChunLin Liang, Lingxi Peng, Yindie Hong, Jing Wang:
An English Letter Recognition Algorithm Based Artificial Immune. ISNN (3) 2009: 371-379 - 2007
- [c7]Caiming Liu, Tao Li, Hui Zhao, Lingxi Peng, Jinquan Zeng, Yan Zhang:
Exploration of Network Security Information Hid in Web Pages Based on Immunology. FSKD (1) 2007: 587-591 - [c6]Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao:
Artificial Immunity-Based Discovery for Popular Information in WEB Pages. International Conference on Computational Science (4) 2007: 166-169 - [c5]Lingxi Peng, Yinqiao Peng, XiaoJie Liu, Caiming Liu, Jinquan Zeng, Feixian Sun, Zhengtian Lu:
A Supervised Classifier Based on Artificial Immune System. International Conference on Computational Science (2) 2007: 355-362 - [c4]Jinquan Zeng, Tao Li, Xiaojie Liu, Caiming Liu, Lingxi Peng, Feixian Sun:
A Feedback Negative Selection Algorithm to Anomaly Detection. ICNC (3) 2007: 604-608 - [c3]Rui Fan, Lingxi Peng:
Modeling Enterprise Intelligence Component Based on Multi-Agents. CONFENIS (1) 2007: 455-460 - [c2]Lingxi Peng, Zhengde Li, Jinquan Zeng, Jian Zhang, Caiming Liu, ChunLin Liang:
A Computer Forensics Model Based On Danger Theory. IITA 2007: 87-90 - 2006
- [c1]Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu:
An Immune-Based Model for Service Survivability. CANS 2006: 354-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint