default search action
Sancheng Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Cong Wang, Tianye Yao, Tingshan Fan, Sancheng Peng, Changming Xu, Shui Yu:
Modeling on Resource Allocation for Age-Sensitive Mobile-Edge Computing Using Federated Multiagent Reinforcement Learning. IEEE Internet Things J. 11(2): 3121-3131 (2024) - [j32]Lihong Cao, Rong Zeng, Sancheng Peng, Aimin Yang, Jianwei Niu, Shui Yu:
Textual emotion classification using MPNet and cascading broad learning. Neural Networks 179: 106582 (2024) - [j31]Cong Wang, Yaoming Wang, Ying Yuan, Sancheng Peng, Guorui Li, Pengfei Yin:
Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning. Neural Networks 179: 106621 (2024) - [j30]Guorui Li, Pengfei Xu, Sancheng Peng, Cong Wang, Yi Cai, Shui Yu:
TTSR: Tensor-Train Subspace Representation Method for Visual Domain Adaptation. IEEE Trans. Knowl. Data Eng. 36(11): 7229-7241 (2024) - 2023
- [j29]Guorui Li, Yajun Wu, Cong Wang, Sancheng Peng, Jianwei Niu, Shui Yu:
The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things. IEEE Intell. Syst. 38(5): 45-55 (2023) - [j28]Sancheng Peng, Rong Zeng, Lihong Cao, Aimin Yang, Jianwei Niu, Chengqing Zong, Guodong Zhou:
Multi-source domain adaptation method for textual emotion classification using deep and broad learning. Knowl. Based Syst. 260: 110173 (2023) - 2022
- [j27]Guanghao Chen, Sancheng Peng, Rong Zeng, Zhongwang Hu, Lihong Cao, Yongmei Zhou, Zhouhao Ouyang, Xiangyu Nie:
$p$-Norm Broad Learning for Negative Emotion Classification in Social Networks. Big Data Min. Anal. 5(3): 245-256 (2022) - [j26]Sancheng Peng, Lihong Cao, Yongmei Zhou, Zhouhao Ouyang, Aimin Yang, Xinguang Li, Weijia Jia, Shui Yu:
A survey on deep learning for textual emotion analysis in social networks. Digit. Commun. Networks 8(5): 745-762 (2022) - [j25]Cong Wang, Weicheng Lu, Sancheng Peng, Youyang Qu, Guojun Wang, Shui Yu:
Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating. IEEE Internet Things J. 9(20): 20681-20692 (2022) - [j24]Guorui Li, Guang Guo, Sancheng Peng, Cong Wang, Shui Yu, Jianwei Niu, Jianli Mo:
Matrix Completion via Schatten Capped $p$p Norm. IEEE Trans. Knowl. Data Eng. 34(1): 394-404 (2022) - [c23]Deheng Wang, Aimin Yang, Yongmei Zhou, Fenfang Xie, Zhouhao Ouyang, Sancheng Peng:
Distillation Language Adversarial Network for Cross-lingual Sentiment Analysis. IALP 2022: 45-50 - 2021
- [j23]Guangcong Zheng, Cong Wang, Weijie Shao, Ying Yuan, Zejie Tian, Sancheng Peng, Ali Kashif Bashir, Shahid Mumtaz:
A single-player Monte Carlo tree search method combined with node importance for virtual network embedding. Ann. des Télécommunications 76(5-6): 297-312 (2021) - [j22]Zixuan Cao, Yongmei Zhou, Aimin Yang, Sancheng Peng:
Deep transfer learning mechanism for fine-grained cross-domain sentiment classification. Connect. Sci. 33(4): 911-928 (2021) - [j21]Yanxia Lv, Fangna Wei, Lihong Cao, Sancheng Peng, Jianwei Niu, Shui Yu, Cuirong Wang:
Aspect-level sentiment analysis using context and aspect memory network. Neurocomputing 428: 195-205 (2021) - [c22]Sancheng Peng, Rong Zeng, Hongzhan Liu, Guanghao Chen, Ruihuan Wu, Aimin Yang, Shui Yu:
Emotion Classification of Text Based on BERT and Broad Learning System. APWeb/WAIM (1) 2021: 382-396 - 2020
- [j20]Cong Wang, Fanghui Zheng, Guangcong Zheng, Sancheng Peng, Zejie Tian, Yujia Guo, Guorui Li, Ying Yuan:
Modeling on virtual network embedding using reinforcement learning. Concurr. Comput. Pract. Exp. 32(23) (2020) - [c21]Sancheng Peng, Lihong Cao, Yongmei Zhou, Jianguo Xie, Pengfei Yin, Jianli Mo:
Challenges and Trends of Android Malware Detection in the Era of Deep Learning. iSCI 2020: 37-43 - [c20]Lihong Cao, Sancheng Peng, Pengfei Yin, Yongmei Zhou, Aimin Yang, Xinguang Li:
A Survey of Emotion Analysis in Text Based on Deep Learning. iSCI 2020: 81-88
2010 – 2019
- 2019
- [j19]Ying Yuan, Cong Wang, Sancheng Peng, Keshav Sood:
Topology-Oriented Virtual Network Embedding Approach for Data Centers. IEEE Access 7: 2429-2438 (2019) - [j18]Ying Wang, Guorui Li, Sancheng Peng, Cong Wang, Ying Yuan:
A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks. Int. J. Embed. Syst. 11(4): 440-451 (2019) - [j17]Guorui Li, Jingsha He, Sancheng Peng, Weijia Jia, Cong Wang, Jianwei Niu, Shui Yu:
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading. IEEE Internet Things J. 6(3): 4176-4187 (2019) - [j16]Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. IEEE Trans. Dependable Secur. Comput. 16(6): 984-995 (2019) - [c19]Cong Wang, Fanghui Zheng, Sancheng Peng, Zejie Tian, Yujia Guo, Ying Yuan:
A Coordinated Two-Stages Virtual Network Embedding Algorithm Based on Reinforcement Learning. CBD 2019: 43-48 - [c18]Haihui Li, Yun Xue, Hongya Zhao, Xiaohui Hu, Sancheng Peng:
Co-attention Networks for Aspect-Level Sentiment Analysis. NLPCC (2) 2019: 200-209 - 2018
- [j15]Sancheng Peng, Shui Yu, Peter Mueller:
Social networking big data: Opportunities, solutions, and challenges. Future Gener. Comput. Syst. 86: 1456-1458 (2018) - [j14]Sancheng Peng, Yongmei Zhou, Lihong Cao, Shui Yu, Jianwei Niu, Weijia Jia:
Influence analysis in social networks: A survey. J. Netw. Comput. Appl. 106: 17-32 (2018) - [j13]Ruibo Yan, Xi Xiao, Guangwu Hu, Sancheng Peng, Yong Jiang:
New deep learning method to detect code injection attacks on hybrid applications. J. Syst. Softw. 137: 67-77 (2018) - [j12]Guorui Li, Haobo Chen, Sancheng Peng, Xinguang Li, Cong Wang, Shui Yu, Pengfei Yin:
A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks. Sensors 18(8): 2487 (2018) - [j11]Youyang Qu, Shui Yu, Longxiang Gao, Wanlei Zhou, Sancheng Peng:
A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks. IEEE Trans. Comput. Soc. Syst. 5(3): 773-784 (2018) - [j10]Youyang Qu, Shui Yu, Wanlei Zhou, Sancheng Peng, Guojun Wang, Ke Xiao:
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wirel. Commun. 25(6): 91-97 (2018) - [c17]Guorui Li, Haobo Chen, Sancheng Peng, Xinguang Li, Cong Wang, Pengfei Yin:
A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 619-626 - 2017
- [j9]Cong Wang, Guohua Liu, Sancheng Peng, Ying Yuan, Guorui Li, Cong Wan:
Virtual network embedding with pre-transformation and incentive convergence mechanism. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j8]Mei Wang, Meng Xiao, Sancheng Peng, Guohua Liu:
A hybrid index for temporal big data. Future Gener. Comput. Syst. 72: 264-272 (2017) - [j7]Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, Dongqing Xie:
Social influence modeling using information theory in mobile social networks. Inf. Sci. 379: 146-159 (2017) - [j6]Sancheng Peng, Guojun Wang, Dongqing Xie:
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. IEEE Netw. 31(1): 11-17 (2017) - [c16]Youyang Qu, Shui Yu, Longxiang Gao, Sancheng Peng, Yong Xiang, Liang Xiao:
FuzzyDP: Fuzzy-based big data publishing against inquiry attacks. INFOCOM Workshops 2017: 7-12 - 2016
- [c15]Cong Wan, Sancheng Peng, Cong Wang, Ying Yuan:
Communities Detection Algorithm Based on General Stochastic Block Model in Mobile Social Networks. CBD 2016: 178-185 - [c14]Ying Yuan, Sancheng Peng, Lixin Zhou, Cong Wang, Cong Wan, Hongtao Huang:
A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator. SmartCom 2016: 527-536 - [c13]Cong Wang, Yian Su, Lixin Zhou, Sancheng Peng, Ying Yuan, Hongtao Huang:
A Virtual Network Embedding Algorithm Based on Hybrid Particle Swarm Optimization. SmartCom 2016: 568-576 - [c12]Sancheng Peng, Shengyi Jiang, Pengfei Yin:
Modeling and Propagation Analysis on Social Influence Using Social Big Data. SpaCCS 2016: 279-291 - 2015
- [c11]Xi Xiao, Ruibo Yan, Runguo Ye, Qing Li, Sancheng Peng, Yong Jiang:
Detection and Prevention of Code Injection Attacks on HTML5-Based Apps. CBD 2015: 254-261 - [c10]Sancheng Peng, Jian Li, Aimin Yang:
Entropy-Based Social Influence Evaluation in Mobile Social Networks. ICA3PP (1) 2015: 637-647 - 2014
- [j5]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu:
Containing smartphone worm propagation with an influence maximization algorithm. Comput. Networks 74: 103-113 (2014) - [j4]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu:
Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Comput. Secur. 44: 92-103 (2014) - [j3]Sancheng Peng, Shui Yu, Aimin Yang:
Smartphone Malware and Its Propagation Modeling: A Survey. IEEE Commun. Surv. Tutorials 16(2): 925-941 (2014) - 2013
- [j2]Sancheng Peng, Guojun Wang, Shui Yu:
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. J. Comput. Syst. Sci. 79(5): 586-595 (2013) - [c9]Sancheng Peng, Guojun Wang, Shui Yu:
Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks. HPCC/EUC 2013: 2194-2199 - [c8]Sancheng Peng, Guojun Wang, Shui Yu:
Modeling Malware Propagation in Smartphone Social Networks. TrustCom/ISPA/IUCC 2013: 196-201 - 2011
- [c7]Sancheng Peng, Guojun Wang:
Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. TrustCom 2011: 282-287 - 2010
- [j1]Sancheng Peng, Weijia Jia, Guojun Wang, Jie Wu, Minyi Guo:
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 93-D(3): 510-517 (2010)
2000 – 2009
- 2008
- [c6]Sancheng Peng, Weijia Jia, Guojun Wang:
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. EUC (2) 2008: 3-9 - [c5]Qingjun Mo, Guojun Wang, Weijia Jia, Sancheng Peng:
Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks. ICPADS 2008: 377-382 - [c4]Sancheng Peng, Weijia Jia, Guojun Wang:
Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory. ICYCS 2008: 432-438 - [c3]Yuan Lu, Guojun Wang, Weijia Jia, Sancheng Peng:
Multipath-Based Segment-by-Segment Routing Protocol in MANETs. ICYCS 2008: 527-532 - [c2]Yongxiang Hu, Jingtian Tang, Hong Jiang, Sancheng Peng:
A Fast Algorithm to Estimate Mutual Information for Image Registration. ICYCS 2008: 720-724 - [c1]Yujie Chen, Guojun Wang, Sancheng Peng:
Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs. ISPA 2008: 387-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint