default search action
Peng Cheng 0001
Person information
- affiliation (PhD 2009): Zhejiang University, State Key Laboratory of Industrial Control Technology, Hangzhou, China
Other persons with the same name
- Peng Cheng — disambiguation page
- Peng Cheng 0002 — University of Sydney, School of Electrical and Information Engineering, NSW, Australia (and 3 more)
- Peng Cheng 0003 — East China Normal University, Shanghai, China (and 1 more)
- Peng Cheng 0004 — Intel China Research Center, Beijing, China (and 1 more)
- Peng Cheng 0005 — Microsoft Research Asia, Beijing, China (and 1 more)
- Peng Cheng 0006 — Sichuan University, College of Aeronautics and Astronautics, Chengdu, China
- Peng Cheng 0007 — Zhejiang University, School of Cyber Science and Technology, Hangzhou, China (and 1 more)
- Peng Cheng 0008 — Nanyang Technological University, MIRALab, School of Computer Engineering, Singapore
- Peng Cheng 0009 — University of Pennsylvania, General Robotics, Automation, Sensing, and Perception Laboratory, GRASP, Philadelphia, PA, USA (and 1 more)
- Peng Cheng 0010 — Shanghai Jiao Tong University, Department of Automation, China (and 1 more)
- Peng Cheng 0011 — Harbin Institute of Technology, Shenzhen Graduate School, Shenzhen, Guangdong, China (and 1 more)
- Peng Cheng 0012 — National University of Defense Technology, College of Computer, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j130]Xin Wang, Heng Zhang, Ming Yang, Xiaoming Wu, Peng Cheng:
Privacy-Preserving Collaborative Learning: A Scheme Providing Heterogeneous Protection. IEEE Internet Things J. 11(2): 1840-1853 (2024) - [j129]Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen:
Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review. IEEE Internet Things J. 11(11): 18951-18975 (2024) - [j128]Hengye Zhu, Mengxiang Liu, Binbin Chen, Xin Che, Peng Cheng, Ruilong Deng:
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing. IEEE Trans. Inf. Forensics Secur. 19: 6028-6043 (2024) - [j127]Shuaiting Huang, Chengcheng Zhao, Lingying Huang, Peng Cheng, Junfeng Wu, Lin Cai:
Plug-and-Play Distributed Estimation of Driving States in an Open Vehicle Platoon. IEEE Trans. Ind. Informatics 20(4): 5328-5338 (2024) - [j126]Zichen Wang, Xiangshan Gao, Cong Wang, Peng Cheng, Jiming Chen:
Efficient Vertical Federated Unlearning via Fast Retraining. ACM Trans. Internet Techn. 24(2): 11:1-11:22 (2024) - [j125]Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Tian Wang, Liyi Zhang, Peng Cheng:
Better Pay Attention Whilst Fuzzing. IEEE Trans. Software Eng. 50(2): 190-208 (2024) - [j124]Mengxiang Liu, Fei Teng, Zhenyong Zhang, Pudong Ge, Mingyang Sun, Ruilong Deng, Peng Cheng, Jiming Chen:
Enhancing Cyber-Resiliency of DER-Based Smart Grid: A Survey. IEEE Trans. Smart Grid 15(5): 4998-5030 (2024) - [j123]Ke Zuo, Mingyang Sun, Zhenyong Zhang, Peng Cheng, Goran Strbac, Chongqing Kang:
Transferability-Oriented Adversarial Robust Security-Constrained Optimal Power Flow. IEEE Trans. Smart Grid 15(5): 5169-5181 (2024) - [c95]Linkang Du, Quan Yuan, Min Chen, Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang:
PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems. AsiaCCS 2024 - [c94]Shaojie Bai, Dongxia Wang, Tim Muller, Peng Cheng, Jiming Chen:
Stability of Weighted Majority Voting under Estimated Weights. AAMAS 2024: 96-104 - [c93]Zichen Wang, Jingyi Wang, Fu Song, Kun Wang, Hongyi Pu, Peng Cheng:
K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language. CPSS@AsiaCCS 2024: 64-76 - [c92]Zhen Qin, Zeyu Yang, Yangyang Geng, Xin Che, Tianyi Wang, Hengye Zhu, Peng Cheng, Jiming Chen:
Reverse Engineering Industrial Protocols Driven By Control Fields. INFOCOM 2024: 2408-2417 - [c91]Jialuo Chen, Jingyi Wang, Youcheng Sun, Peng Cheng, Jiming Chen:
Isolation-Based Debugging for Neural Networks. ISSTA 2024: 338-349 - [c90]Xiangshan Gao, Jialuo Chen, Jingyi Wang, Jie Shi, Peng Cheng, Jiming Chen:
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development. ISSTA 2024: 1479-1490 - [c89]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. NDSS 2024 - [c88]Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. NDSS 2024 - [c87]Biao Lyu, Enge Song, Tian Pan, Jianyuan Lu, Shize Zhang, Xiaoqing Sun, Lei Gao, Chenxiao Wang, Han Xiao, Yong Pan, Xiuheng Chen, Yandong Duan, Weisheng Wang, Jinpeng Long, Yanfeng Wang, Kunpeng Zhou, Zhigang Zong, Xing Li, Guangwang Li, Pengyu Zhang, Peng Cheng, Jiming Chen, Shunmin Zhu:
POSEIDON: A Consolidated Virtual Network Controller that Manages Millions of Tenants via Config Tree. NSDI 2024 - [c86]Zeyu Yang, Hongyi Pu, Liang He, Chengtao Yao, Jianying Zhou, Peng Cheng, Jiming Chen:
Deception-Resistant Stochastic Manufacturing for Automated Production Lines. RAID 2024: 546-560 - [i24]Kun Wang, Christopher M. Poskitt, Yang Sun, Jun Sun, Jingyi Wang, Peng Cheng, Jiming Chen:
μDrive: User-Controlled Autonomous Driving. CoRR abs/2407.13201 (2024) - [i23]Jialuo Chen, Jingyi Wang, Xiyue Zhang, Youcheng Sun, Marta Kwiatkowska, Jiming Chen, Peng Cheng:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. CoRR abs/2409.09130 (2024) - 2023
- [j122]Yangyang Geng, Yuqi Chen, Rongkuan Ma, Qiang Wei, Jie Pan, Jingyi Wang, Peng Cheng, Qingxian Wang:
Defending Cyber-Physical Systems Through Reverse-Engineering-Based Memory Sanity Check. IEEE Internet Things J. 10(10): 8331-8347 (2023) - [j121]Xin Wang, Chongrong Fang, Ming Yang, Xiaoming Wu, Heng Zhang, Peng Cheng:
Resilient Distributed Classification Learning Against Label Flipping Attack: An ADMM-Based Approach. IEEE Internet Things J. 10(17): 15617-15631 (2023) - [j120]Hongyi Pu, Liang He, Peng Cheng, Mingyang Sun, Jiming Chen:
Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations. IEEE Netw. 37(1): 111-117 (2023) - [j119]Mengzhi Wang, Peng Cheng, Zhenyong Zhang, Mufeng Wang, Jiming Chen:
Periodic Event-Triggered MPC for Continuous-Time Nonlinear Systems With Bounded Disturbances. IEEE Trans. Autom. Control. 68(12): 8036-8043 (2023) - [j118]Ruopeng Geng, Chongrong Fang, Shiyang Guo, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng:
FlowPinpoint: Localizing Anomalies in Cloud-Client Services for Cloud Providers. IEEE Trans. Cloud Comput. 11(3): 3070-3084 (2023) - [j117]Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma:
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. IEEE Trans. Inf. Forensics Secur. 18: 581-596 (2023) - [j116]Hengye Zhu, Mengxiang Liu, Chongrong Fang, Ruilong Deng, Peng Cheng:
Detection-Performance Tradeoff for Watermarking in Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 18: 2780-2793 (2023) - [j115]Jialuo Chen, Jingyi Wang, Xingjun Ma, Youcheng Sun, Jun Sun, Peixin Zhang, Peng Cheng:
QuoTe: Quality-oriented Testing for Deep Learning Systems. ACM Trans. Softw. Eng. Methodol. 32(5): 125:1-125:33 (2023) - [j114]Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng:
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. IEEE Trans. Software Eng. 49(10): 4796-4813 (2023) - [j113]Mengxiang Liu, Chengcheng Zhao, Jinhui Xia, Ruilong Deng, Peng Cheng, Jiming Chen:
PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids. IEEE Trans. Smart Grid 14(1): 714-731 (2023) - [j112]Shiyi Zhao, Jinhui Xia, Ruilong Deng, Peng Cheng, Qinmin Yang, Xuguo Jiao:
Dual-Triggered Adaptive Torque Control Strategy for Variable-Speed Wind Turbine Against Denial-of-Service Attacks. IEEE Trans. Smart Grid 14(4): 3072-3084 (2023) - [j111]Sha Peng, Zhenyong Zhang, Ruilong Deng, Peng Cheng:
Localizing False Data Injection Attacks in Smart Grid: A Spectrum-Based Neural Network Approach. IEEE Trans. Smart Grid 14(6): 4827-4838 (2023) - [j110]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Mo-Yuen Chow:
Security Enhancement of Power System State Estimation With an Effective and Low-Cost Moving Target Defense. IEEE Trans. Syst. Man Cybern. Syst. 53(5): 3066-3081 (2023) - [c85]Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, Jianying Zhou:
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic. ACSAC 2023: 310-323 - [c84]Shaojie Bai, Dongxia Wang, Tim Muller, Peng Cheng, Jiming Chen:
Stability of Weighted Majority Voting under Estimated Weights. AAMAS 2023: 2691-2693 - [c83]Xiaoyu Luo, Chongrong Fang, Chengcheng Zhao, Peng Cheng, Jianping He:
Optimal Sequential False Data Injection Attack Scheme: Finite-Time Inverse Convergence. CDC 2023: 1820-1825 - [c82]Jialuo Chen, Youcheng Sun, Jingyi Wang, Peng Cheng, Xingjun Ma:
DEEPJUDGE: A Testing Framework for Copyright Protection of Deep Learning Models. ICSE Companion 2023: 64-67 - [c81]Jie Zhang, Hongjing Huang, Lingjun Zhu, Shu Ma, Dazhong Rong, Yijun Hou, Mo Sun, Chaojie Gu, Peng Cheng, Chao Shi, Zeke Wang:
SmartDS: Middle-Tier-centric SmartNIC Enabling Application-aware Message Split for Disaggregated Block Storage. ISCA 2023: 42:1-42:13 - [c80]Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun:
PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. USENIX Security Symposium 2023: 3241-3258 - [c79]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. USENIX Security Symposium 2023: 4517-4534 - [i22]Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun:
PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. CoRR abs/2304.02401 (2023) - [i21]Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen:
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review. CoRR abs/2308.15736 (2023) - [i20]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. CoRR abs/2309.03081 (2023) - 2022
- [j109]Zhenyong Zhang, Ruilong Deng, Peng Cheng, Qiang Wei:
On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems. IEEE Internet Things J. 9(11): 8720-8736 (2022) - [j108]Zeyu Yang, Liang He, Hua Yu, Chengcheng Zhao, Peng Cheng, Jiming Chen:
Detecting PLC Intrusions Using Control Invariants. IEEE Internet Things J. 9(12): 9934-9947 (2022) - [j107]Zhenyong Zhang, Ruilong Deng, Peng Cheng, Mo-Yuen Chow:
Strategic Protection Against FDI Attacks With Moving Target Defense in Power Grids. IEEE Trans. Control. Netw. Syst. 9(1): 245-256 (2022) - [j106]Mengxiang Liu, Chengcheng Zhao, Ruilong Deng, Peng Cheng, Jiming Chen:
False Data Injection Attacks and the Distributed Countermeasure in DC Microgrids. IEEE Trans. Control. Netw. Syst. 9(4): 1962-1974 (2022) - [j105]Ji-Ming Chen, Xiangshan Gao, Ruilong Deng, Yang He, Chongrong Fang, Peng Cheng:
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 1810-1825 (2022) - [j104]Hongyi Pu, Liang He, Chengcheng Zhao, David K. Y. Yau, Peng Cheng, Jiming Chen:
Fingerprinting Movements of Industrial Robots for Replay Attack Detection. IEEE Trans. Mob. Comput. 21(10): 3629-3643 (2022) - [j103]Yulong Cui, Mincheng Wu, Shibo He, Peng Cheng, Hairong Dong:
Fast Restoring the Controllability of Networked Systems With Symmetric Weights. IEEE Trans. Netw. Sci. Eng. 9(4): 2098-2109 (2022) - [j102]Chongrong Fang, Haoyu Liu, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng, Jiming Chen:
Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network. IEEE/ACM Trans. Netw. 30(3): 1178-1192 (2022) - [j101]Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng, Jiming Chen:
Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids. IEEE Trans. Smart Grid 13(5): 3984-3996 (2022) - [c78]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang:
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. EuroS&P 2022: 684-702 - [c77]Zeyu Yang, Liang He, Hua Yu, Chengcheng Zhao, Peng Cheng, Jiming Chen:
Reverse Engineering Physical Semantics of PLC Program Variables Using Control Invariants. SenSys 2022: 548-562 - [c76]Zexuan Jin, Mengxiang Liu, Ruilong Deng, Peng Cheng:
Distributed Data Recovery Against False Data Injection Attacks in DC Microgrids. SmartGridComm 2022: 265-270 - [c75]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. SP 2022: 824-841 - [i19]Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng:
K-ST: A Formal Executable Semantics of PLC Structured Text Language. CoRR abs/2202.04076 (2022) - [i18]Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen:
VeriFi: Towards Verifiable Federated Unlearning. CoRR abs/2205.12709 (2022) - [i17]Shaojie Bai, Dongxia Wang, Tim Muller, Peng Cheng, Jiming Chen:
Stability of Weighted Majority Voting under Estimated Weights. CoRR abs/2207.06118 (2022) - [i16]Ming Yang, Yanhan Wang, Xin Wang, Zhenyong Zhang, Xiaoming Wu, Peng Cheng:
FedSiam-DA: Dual-aggregated Federated Learning via Siamese Network under Non-IID Data. CoRR abs/2211.09421 (2022) - [i15]Bicheng Guo, Shuxuan Guo, Miaojing Shi, Peng Cheng, Shibo He, Jiming Chen, Kaicheng Yu:
α DARTS Once More: Enhancing Differentiable Architecture Search by Masked Image Modeling. CoRR abs/2211.10105 (2022) - [i14]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022) - 2021
- [j100]Chengcheng Zhao, Lin Cai, Peng Cheng:
Stability Analysis of Vehicle Platooning With Limited Communication Range and Random Packet Losses. IEEE Internet Things J. 8(1): 262-277 (2021) - [j99]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng:
Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid. IEEE Internet Things J. 8(8): 6608-6623 (2021) - [j98]Ji-Ming Chen, Zidong Yang, Peng Cheng, Yuanchao Shu:
Rebalancing Bike-Sharing System With Deep Sequential Learning. IEEE Intell. Transp. Syst. Mag. 13(4): 92-98 (2021) - [j97]Yining Qi, Chongrong Fang, Haoyu Liu, Daxiang Kang, Biao Lyu, Peng Cheng, Jiming Chen:
A survey of cloud network fault diagnostic systems and tools. Frontiers Inf. Technol. Electron. Eng. 22(8): 1031-1045 (2021) - [j96]Zhenyong Zhang, Peng Cheng, Junfeng Wu, Jiming Chen:
Secure State Estimation Using Hybrid Homomorphic Encryption Scheme. IEEE Trans. Control. Syst. Technol. 29(4): 1704-1720 (2021) - [j95]Xin Wang, Hideaki Ishii, Jianping He, Peng Cheng:
Dynamic Privacy-Aware Collaborative Schemes for Average Computation: A Multi-Time Reporting Case. IEEE Trans. Inf. Forensics Secur. 16: 3843-3858 (2021) - [j94]Mingjing Sun, Chengcheng Zhao, Jianping He, Peng Cheng, Daniel E. Quevedo:
Privacy-Preserving Correlated Data Publication: Privacy Analysis and Optimal Noise Design. IEEE Trans. Netw. Sci. Eng. 8(3): 2014-2024 (2021) - [j93]Chengcheng Zhao, Xiaoming Duan, Lin Cai, Peng Cheng:
Vehicle Platooning With Non-Ideal Communication Networks. IEEE Trans. Veh. Technol. 70(1): 18-32 (2021) - [c74]Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. CCS 2021: 1266-1288 - [c73]Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. ICSE 2021: 300-311 - [c72]Mengxiang Liu, Zexuan Jin, Jinhui Xia, Mingyang Sun, Ruilong Deng, Peng Cheng:
Demo Abstract: A HIL Emulator-Based Cyber Security Testbed for DC Microgrids. INFOCOM Workshops 2021: 1-2 - [c71]Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah:
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware. ASE 2021: 805-816 - [c70]Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng:
Analysis of Moving Target Defense in Unbalanced and Multiphase Distribution Systems Considering Voltage Stability. SmartGridComm 2021: 207-213 - [c69]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. USENIX Security Symposium 2021: 2777-2794 - [i13]Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. CoRR abs/2102.05913 (2021) - [i12]Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, Jiming Chen:
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. CoRR abs/2110.07505 (2021) - [i11]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. CoRR abs/2112.05588 (2021) - [i10]Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Liyi Zhang, Peng Cheng:
Better Pay Attention Whilst Fuzzing. CoRR abs/2112.07143 (2021) - 2020
- [j92]Chongrong Fang, Yifei Qi, Peng Cheng, Wei Xing Zheng:
Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems. Autom. 112 (2020) - [j91]Dixing Xu, Mengyao Zheng, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng:
Lightweight and Unobtrusive Data Obfuscation at IoT Edge for Remote Inference. IEEE Internet Things J. 7(10): 9540-9551 (2020) - [j90]Zhiyong Chen, Fabio Pasqualetti, Jianping He, Peng Cheng, Harry L. Trentelman, Francesco Bullo:
Guest Editorial: Special Issue on Security and Privacy of Distributed Algorithms and Network Systems. IEEE Trans. Autom. Control. 65(9): 3725-3727 (2020) - [j89]Peng Cheng, Zeyu Yang, Jiming Chen, Yifei Qi, Ling Shi:
An Event-Based Stealthy Attack on Remote State Estimation. IEEE Trans. Autom. Control. 65(10): 4348-4355 (2020) - [j88]Shuang Wu, Kemi Ding, Peng Cheng, Ling Shi:
Optimal Scheduling of Multiple Sensors Over Lossy and Bandwidth Limited Channels. IEEE Trans. Control. Netw. Syst. 7(3): 1188-1200 (2020) - [j87]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power Grid. ACM Trans. Cyber Phys. Syst. 4(3): 25:1-25:29 (2020) - [j86]Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 236-247 (2020) - [j85]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. IEEE Trans. Inf. Forensics Secur. 15: 2320-2335 (2020) - [j84]Xin Lou, David K. Y. Yau, Rui Tan, Peng Cheng:
Cost and Pricing of Differential Privacy in Demand Reporting for Smart Grids. IEEE Trans. Netw. Sci. Eng. 7(3): 2037-2051 (2020) - [j83]Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen:
Privacy-Preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation. IEEE Trans. Signal Process. 68: 4226-4241 (2020) - [c68]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Zero-Parameter-Information FDI Attacks Against Power System State Estimation. ACC 2020: 2987-2992 - [c67]Haoyu Liu, Chongrong Fang, Yining Qi, Jian Bai, Shaozhe Wang, Xiong Xiao, Daxiang Kang, Biao Lyu, Peng Cheng, Jiming Chen:
RAIN: Towards Real-Time Core Devices Anomaly Detection Through Session Data in Cloud Network. NOMS 2020: 1-6 - [c66]Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David K. Y. Yau, Linkang Du:
PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants. RAID 2020: 333-348 - [c65]Hongyi Pu, Liang He, Chengcheng Zhao, David K. Y. Yau, Peng Cheng, Jiming Chen:
Detecting replay attacks against industrial robots via power fingerprinting. SenSys 2020: 285-297 - [c64]Chongrong Fang, Haoyu Liu, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyv, Peng Cheng, Jiming Chen:
VTrace: Automatic Diagnostic System for Persistent Packet Loss in Cloud-Scale Overlay Network. SIGCOMM 2020: 31-43 - [c63]Rui Zhang, Xin Wang, Peng Cheng, Jiming Chen:
A Novel Pseudonym Linking Scheme for Privacy Inference in VANETs. VTC Spring 2020: 1-5 - [i9]Mengxiang Liu, Peng Cheng, Chengcheng Zhao, Ruilong Deng, Wenhai Wang, Jiming Chen:
False Data Injection Attacks and Corresponding Countermeasure in DC Microgrid. CoRR abs/2001.01984 (2020) - [i8]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs/2010.01785 (2020) - [i7]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Ting Wang:
TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask). CoRR abs/2012.09302 (2020)
2010 – 2019
- 2019
- [j82]Liang Xiao, Geyi Sheng, Xiaoyue Wan, Wei Su, Peng Cheng:
Learning-Based PHY-Layer Authentication for Underwater Sensor Networks. IEEE Commun. Lett. 23(1): 60-63 (2019) - [j81]Jianping He, Lin Cai, Peng Cheng, Jianping Pan, Ling Shi:
Distributed Privacy-Preserving Data Aggregation Against Dishonest Nodes in Network Systems. IEEE Internet Things J. 6(2): 1462-1470 (2019) - [j80]Peng Cheng, Congwei Xu, Pierre R. Lebreton, Zidong Yang, Jiming Chen:
TERP: Time-Event-Dependent Route Planning in Stochastic Multimodal Transportation Networks With Bike Sharing System. IEEE Internet Things J. 6(3): 4991-5000 (2019) - [j79]Rongkuan Ma, Peng Cheng, Zhenyong Zhang, Wenwen Liu, Qingxian Wang, Qiang Wei:
Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System. IEEE Internet Things J. 6(6): 9783-9793 (2019) - [j78]Jianping He, Lin Cai, Peng Cheng, Jianping Pan, Ling Shi:
Consensus-Based Data-Privacy Preserving Data Aggregation. IEEE Trans. Autom. Control. 64(12): 5222-5229 (2019) - [j77]Dima Rabadi, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan, Hao Zheng, Peng Cheng:
Resilient Clock Synchronization Using Power Grid Voltage. ACM Trans. Cyber Phys. Syst. 3(3): 31:1-31:26 (2019) - [j76]Zidong Yang, Jiming Chen, Ji Hu, Yuanchao Shu, Peng Cheng:
Mobility Modeling and Data-Driven Closed-Loop Prediction in Bike-Sharing Systems. IEEE Trans. Intell. Transp. Syst. 20(12): 4488-4499 (2019) - [j75]Peng Cheng, Ji Hu, Zidong Yang, Yuanchao Shu, Jiming Chen:
Utilization-Aware Trip Advisor in Bike-Sharing Systems Based on User Behavior Analysis. IEEE Trans. Knowl. Data Eng. 31(9): 1822-1835 (2019) - [j74]Xin Wang, Jianping He, Peng Cheng, Jiming Chen:
Differentially Private Maximum Consensus: Design, Analysis and Impossibility Result. IEEE Trans. Netw. Sci. Eng. 6(4): 928-939 (2019) - [j73]Jianping He, Lin Cai, Chengcheng Zhao, Peng Cheng, Xinping Guan:
Privacy-Preserving Average Consensus: Privacy Analysis and Algorithm Design. IEEE Trans. Signal Inf. Process. over Networks 5(1): 127-138 (2019) - [j72]Xin Wang, Jianping He, Peng Cheng, Jiming Chen:
Privacy Preserving Collaborative Computing: Heterogeneous Privacy Guarantee and Efficient Incentive Mechanism. IEEE Trans. Signal Process. 67(1): 221-233 (2019) - [j71]Minghui Min, Liang Xiao, Ye Chen, Peng Cheng, Di Wu, Weihua Zhuang:
Learning-Based Computation Offloading for IoT Devices With Energy Harvesting. IEEE Trans. Veh. Technol. 68(2): 1930-1941 (2019) - [j70]Jiming Chen, Weixin Lin, Zidong Yang, Jianyuan Li, Peng Cheng:
Adaptive Ramp Metering Control for Urban Freeway Using Large-Scale Data. IEEE Trans. Veh. Technol. 68(10): 9507-9518 (2019) - [c62]Mengxiang Liu, Chengcheng Zhao, Ruilong Deng, Peng Cheng, Wenhai Wang, Jiming Chen:
Nonzero-Dynamics Stealthy Attack and Its Impacts Analysis in DC Microgrids. ACC 2019: 3922-3927 - [c61]Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen:
Differential Privacy-preserving Distributed Machine Learning. CDC 2019: 7339-7344 - [c60]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
On Effectiveness of Detecting FDI Attacks on Power Grid using Moving Target Defense. ISGT 2019: 1-5 - [i6]Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen:
Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation. CoRR abs/1908.01059 (2019) - [i5]Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng:
Challenges of Privacy-Preserving Machine Learning in IoT. CoRR abs/1909.09804 (2019) - [i4]Dixing Xu, Mengyao Zheng, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng:
Lightweight and Unobtrusive Privacy Preservation for Remote Inference via Edge Data Obfuscation. CoRR abs/1912.09859 (2019) - [i3]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, Jiming Chen:
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid. CoRR abs/1912.11372 (2019) - 2018
- [j69]Endong Liu, Peng Cheng:
Mitigating Cyber Privacy Leakage for Distributed DC Optimal Power Flow in Smart Grid With Radial Topology. IEEE Access 6: 7911-7920 (2018) - [j68]Jianping He, Chengcheng Zhao, Lin Cai, Peng Cheng, Ling Shi:
Practical closed-loop dynamic pricing in smart grid for supply and demand balancing. Autom. 89: 92-102 (2018) - [j67]Hongzi Zhu, Tom H. Luan, Mianxiong Dong, Peng Cheng:
Guest editorial: fog computing on wheels. Peer-to-Peer Netw. Appl. 11(4): 735-737 (2018) - [j66]Zhu Ren, Peng Cheng, Ling Shi, Yanyun Dai:
State Estimation Over Delayed Mutihop Network. IEEE Trans. Autom. Control. 63(10): 3545-3550 (2018) - [j65]Yaqin Zhou, David K. Y. Yau, Pengcheng You, Peng Cheng:
Optimal-Cost Scheduling of Electrical Vehicle Charging Under Uncertainty. IEEE Trans. Smart Grid 9(5): 4547-4554 (2018) - [j64]Chengcheng Zhao, Jiming Chen, Jianping He, Peng Cheng:
Privacy-Preserving Consensus-Based Energy Management in Smart Grids. IEEE Trans. Signal Process. 66(23): 6162-6176 (2018) - [j63]Jie Su, Junfeng Wu, Peng Cheng, Jiming Chen:
Autonomous Vehicle Control Through the Dynamics and Controller Learning. IEEE Trans. Veh. Technol. 67(7): 5650-5657 (2018) - [c59]Xin Wang, Jianping He, Peng Cheng, Jiming Chen:
Privacy Preserving Average Consensus with Different Privacy Guarantee. ACC 2018: 5189-5194 - [c58]Pengcheng You, Peng Cheng, John Z. F. Pang, Steven H. Low:
Efficient Online Station Assignment for EV Battery Swapping. e-Energy 2018: 383-385 - [c57]Canhuang Dai, Xingyu Xiao, Liang Xiao, Peng Cheng:
Reinforcement Learning Based Power Control for VANET Broadcast against Jamming. GLOBECOM 2018: 1-6 - [c56]Hailu Zhang, Minghui Min, Liang Xiao, Sicong Liu, Peng Cheng, Mugen Peng:
Reinforcement Learning-Based Interference Control for Ultra-Dense Small Cells. GLOBECOM 2018: 1-6 - [c55]Xing Li, Mengxiang Liu, Rui Zhang, Peng Cheng, Jiming Chen:
An industrial control system testbed for the encrypted controller: demo abstract. ICCPS 2018: 343-344 - [c54]Zhenyong Zhang, Junfeng Wu, David K. Y. Yau, Peng Cheng, Jiming Chen:
Secure kalman filter state estimation by partially homomorphic encryption. ICCPS 2018: 345-346 - 2017
- [j62]Jianping He, Xiaoming Duan, Peng Cheng, Ling Shi, Lin Cai:
Accurate clock synchronization in wireless sensor networks with bounded noise. Autom. 81: 350-358 (2017) - [j61]Jianping He, Peng Cheng, Junfeng Wu, Nikolaos M. Freris, Peng Zeng:
Distributed control and optimization with resource-constrained networked systems. Neurocomputing 270: 1-3 (2017) - [j60]Ruilong Deng, Shibo He, Peng Cheng, Youxian Sun:
Towards balanced energy charging and transmission collision in wireless rechargeable sensor networks. J. Commun. Networks 19(4): 341-350 (2017) - [j59]Yifei Qi, Peng Cheng, Jiming Chen:
Optimal Sensor Data Scheduling for Remote Estimation Over a Time-Varying Channel. IEEE Trans. Autom. Control. 62(9): 4611-4617 (2017) - [j58]Peng Cheng, Ling Shi, Bruno Sinopoli:
Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems. IEEE Trans. Control. Netw. Syst. 4(1): 1-3 (2017) - [j57]Zequ Yang, Peng Cheng, Jiming Chen:
Learning-Based Jamming Attack against Low-Duty-Cycle Networks. IEEE Trans. Dependable Secur. Comput. 14(6): 650-663 (2017) - [j56]Xiaoming Duan, Chengcheng Zhao, Shibo He, Peng Cheng, Junshan Zhang:
Distributed Algorithms to Compute Walrasian Equilibrium in Mobile Crowdsensing. IEEE Trans. Ind. Electron. 64(5): 4048-4057 (2017) - [j55]Chengcheng Zhao, Jianping He, Peng Cheng, Jiming Chen:
Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks. IEEE Trans. Ind. Electron. 64(6): 5107-5117 (2017) - [j54]Jianping He, Lin Cai, Jianping Pan, Peng Cheng:
Delay Analysis and Routing for Two-Dimensional VANETs Using Carry-and-Forward Mechanism. IEEE Trans. Mob. Comput. 16(7): 1830-1841 (2017) - [j53]Chengcheng Zhao, Jianping He, Peng Cheng, Jiming Chen:
Consensus-Based Energy Management in Smart Grid With Transmission Losses and Directed Communication. IEEE Trans. Smart Grid 8(5): 2049-2061 (2017) - [j52]Endong Liu, Peng Cheng:
Achieving Privacy Protection Using Distributed Load Scheduling: A Randomized Approach. IEEE Trans. Smart Grid 8(5): 2460-2473 (2017) - [j51]Hao Liu, Xianghui Cao, Jianping He, Peng Cheng, Chunguang Li, Jiming Chen, Youxian Sun:
Reply to "Comments on 'Distributed Identification of the Most Critical Node for Average Consensus"'. IEEE Trans. Signal Process. 65(5): 1268-1271 (2017) - [c53]Chongrong Fang, Yifei Qi, Peng Cheng, Wei Xing Zheng:
Cost-effective watermark based detector for replay attacks on cyber-physical systems. ASCC 2017: 940-945 - [c52]Ji Hu, Zidong Yang, Yuanchao Shu, Peng Cheng, Jiming Chen:
Data-Driven Utilization-Aware Trip Advisor for Bike-Sharing Systems. ICDM 2017: 167-176 - [c51]Xin Lou, Rui Tan, David K. Y. Yau, Peng Cheng:
Cost of differential privacy in demand reporting for smart grid economic dispatch. INFOCOM 2017: 1-9 - [c50]Jie Su, Jianping He, Peng Cheng, Jiming Chen:
Actuator fault diagnosis of a Hexacopter: A nonlinear analytical redundancy approach. MED 2017: 413-418 - [c49]Zhuoying Shi, Zhenyong Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen:
Indoor Navigation Leveraging Gradient WiFi Signals. SenSys 2017: 48:1-48:2 - 2016
- [j50]Yuelong Tian, Peng Cheng, Liang He, Yu Gu, Jiming Chen:
Achieving Collision-Free Communication by Time of Charge in WRSN. Mob. Networks Appl. 21(3): 414-424 (2016) - [j49]Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen:
Privacy and performance trade-off in cyber-physical systems. IEEE Netw. 30(2): 62-66 (2016) - [j48]Mianxiong Dong, Fen Hou, Peng Cheng, Kyoung-Sook Kim:
Guest editorial: Special issue on crowd sensing networks. Peer-to-Peer Netw. Appl. 9(4): 613-615 (2016) - [j47]Peng Cheng, Yifei Qi, Kefei Xin, Jiming Chen, Lihua Xie:
Energy-Efficient Data Forwarding for State Estimation in Multi-Hop Wireless Sensor Networks. IEEE Trans. Autom. Control. 61(5): 1322-1327 (2016) - [j46]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal DoS Attack Scheduling in Wireless Networked Control System. IEEE Trans. Control. Syst. Technol. 24(3): 843-852 (2016) - [j45]Xiaoming Duan, Jianping He, Peng Cheng, Jiming Chen:
Exploiting a Mobile Node for Fast Discrete Time Average Consensus. IEEE Trans. Control. Syst. Technol. 24(6): 1993-2001 (2016) - [j44]Jianping He, Mengjie Zhou, Peng Cheng, Ling Shi, Jiming Chen:
Consensus Under Bounded Noise in Discrete Network Systems: An Algorithm With Fast Convergence and High Accuracy. IEEE Trans. Cybern. 46(12): 2874-2884 (2016) - [j43]Yuanchao Shu, Yinghua Huang, Jiaqi Zhang, Philippe Coué, Peng Cheng, Jiming Chen, Kang G. Shin:
Gradient-Based Fingerprinting for Indoor Localization and Tracking. IEEE Trans. Ind. Electron. 63(4): 2424-2433 (2016) - [j42]Yifei Qi, Peng Cheng, Jing Bai, Jiming Chen, Adrien Guenard, Ye-Qiong Song, Zhiguo Shi:
Energy-Efficient Target Tracking by Mobile Sensors With Limited Sensing Range. IEEE Trans. Ind. Electron. 63(11): 6949-6961 (2016) - [j41]Yuanchao Shu, Hamed Yousefi, Peng Cheng, Jiming Chen, Yu Jason Gu, Tian He, Kang G. Shin:
Near-Optimal Velocity Control for Mobile Charging in Wireless Rechargeable Sensor Networks. IEEE Trans. Mob. Comput. 15(7): 1699-1713 (2016) - [j40]Jianping He, Lin Cai, Peng Cheng, Jianping Pan:
Delay Minimization for Data Dissemination in Large-Scale VANETs with Buses and Taxis. IEEE Trans. Mob. Comput. 15(8): 1939-1950 (2016) - [j39]Lingkun Fu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
Optimal Charging in Wireless Rechargeable Sensor Networks. IEEE Trans. Veh. Technol. 65(1): 278-291 (2016) - [j38]Lingkun Fu, Liang He, Peng Cheng, Yu Jason Gu, Jianping Pan, Jiming Chen:
ESync: Energy Synchronized Mobile Charging in Rechargeable Wireless Sensor Networks. IEEE Trans. Veh. Technol. 65(9): 7415-7431 (2016) - [c48]Xiaoming Duan, Nikolaos M. Freris, Peng Cheng:
Secure clock synchronization under collusion attacks. Allerton 2016: 1142-1148 - [c47]Yue Hu, Yuanchao Shu, Peng Cheng, Jiming Chen:
Urban Area Vehicle Number Estimation Based on RTMS Data. BigData Congress 2016: 369-376 - [c46]Xiaoxia Jia, Peng Cheng, Jiming Chen:
A data analysis and visualization system for large-scale e-bike data. IEEE BigData 2016: 3998-4000 - [c45]Lihuan Zhang, Siyuan Tang, Zidong Yang, Ji Hu, Yuanchao Shu, Peng Cheng, Jiming Chen:
Demo: Data Analysis and Visualization in Bike-Sharing Systems. MobiSys (Companion Volume) 2016: 128 - [c44]Zidong Yang, Ji Hu, Yuanchao Shu, Peng Cheng, Jiming Chen, Thomas Moscibroda:
Mobility Modeling and Prediction in Bike-Sharing Systems. MobiSys 2016: 165-178 - [c43]Zheng Dong, Cong Liu, Lingkun Fu, Peng Cheng, Liang He, Yu Gu, Wei Gao, Chau Yuen, Tian He:
Energy Synchronized Task Assignment in Rechargeable Sensor Networks. SECON 2016: 1-9 - [i2]Jianping He, Lin Cai, Chengcheng Zhao, Peng Cheng:
Privacy-preserving Average Consensus: Privacy Analysis and Optimal Algorithm Design. CoRR abs/1609.06368 (2016) - [i1]Jianping He, Lin Cai, Peng Cheng, Min Xing, Jianping Pan, Ling Shi:
Private and Accurate Data Aggregation against Dishonest Nodes. CoRR abs/1609.06381 (2016) - 2015
- [j37]Zhu Ren, Peng Cheng:
Energy management for event capture in rechargeable sensor network with limited capacitor size. Peer-to-Peer Netw. Appl. 8(1): 111-119 (2015) - [j36]Jianping He, Qing-Guo Wang, Peng Cheng, Jiming Chen, Youxian Sun:
Multi-Period Mean-Variance Portfolio Optimization With High-Order Coupled Asset Dynamics. IEEE Trans. Autom. Control. 60(5): 1320-1335 (2015) - [j35]Yuzhe Li, Ling Shi, Peng Cheng, Jiming Chen, Daniel E. Quevedo:
Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach. IEEE Trans. Autom. Control. 60(10): 2831-2836 (2015) - [j34]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal Denial-of-Service Attack Scheduling With Energy Constraint. IEEE Trans. Autom. Control. 60(11): 3023-3028 (2015) - [j33]Jianping He, Lin Cai, Peng Cheng, Jialu Fan:
Optimal Investment for Retail Company in Electricity Market. IEEE Trans. Ind. Informatics 11(5): 1210-1219 (2015) - [j32]Yuanchao Shu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
TOC: Localizing Wireless Rechargeable Sensors with Time of Charge. ACM Trans. Sens. Networks 11(3): 44:1-44:22 (2015) - [j31]Jianping He, Lingjie Duan, Fen Hou, Peng Cheng, Jiming Chen:
Multiperiod Scheduling for Wireless Sensor Networks: A Distributed Consensus Approach. IEEE Trans. Signal Process. 63(7): 1651-1663 (2015) - [j30]Hao Liu, Xianghui Cao, Jianping He, Peng Cheng, Chunguang Li, Jiming Chen, Youxian Sun:
Distributed Identification of the Most Critical Node for Average Consensus. IEEE Trans. Signal Process. 63(16): 4315-4328 (2015) - [j29]Jie Wang, Qinghua Gao, Hongyu Wang, Peng Cheng, Kefei Xin:
Device-Free Localization With Multidimensional Wireless Link Information. IEEE Trans. Veh. Technol. 64(1): 356-366 (2015) - [j28]Kefei Xin, Peng Cheng, Jiming Chen:
Multi-target localization in wireless sensor networks: a compressive sampling-based approach. Wirel. Commun. Mob. Comput. 15(5): 801-811 (2015) - [j27]Bo Chai, Ruilong Deng, Zhiguo Shi, Peng Cheng, Jiming Chen:
Energy-efficient power allocation in cognitive sensor networks: a coupled constraint game approach. Wirel. Networks 21(5): 1577-1589 (2015) - [c42]Rong Zhang, Yuanchao Shu, Zequ Yang, Peng Cheng, Jiming Chen:
Hybrid Traffic Speed Modeling and Prediction Using Real-World Data. BigData Congress 2015: 230-237 - [c41]Xiaoming Duan, Jianping He, Peng Cheng, Yilin Mo, Jiming Chen:
Privacy Preserving Maximum Consensus. CDC 2015: 4517-4522 - [c40]Jianping He, Chengcheng Zhao, Lin Cai, Peng Cheng, Ling Shi:
Supply and demand in smart grid: A closed-loop pricing strategy. CDC 2015: 6004-6009 - [c39]Yifei Qi, Peng Cheng, Ling Shi, Jiming Chen:
Event-based attack against remote state estimation. CDC 2015: 6844-6849 - [c38]Haiding Tang, Zhouzheng Lu, Lifu Zhang, Yang Chen, Peng Cheng, Jiming Chen:
LQG control under Denial-of-Service attacks: An experimental study. ETFA 2015: 1-7 - [c37]Dongxu Zheng, Xi Zhang, Yuanchao Shu, Chongrong Fang, Peng Cheng, Jiming Chen:
iParking: An intelligent parking system for large parking lots. INFOCOM Workshops 2015: 37-38 - [c36]Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks. MASS 2015: 181-189 - [c35]Yang Zhou, Yuanchao Shu, Peng Cheng, Zhiguo Shi, Jiming Chen:
Phonemeter: Bringing EMF Detection to Smartphones. MASS 2015: 469-470 - 2014
- [j26]Zhu Ren, Peng Cheng, Jiming Chen, Ling Shi, Huanshui Zhang:
Dynamic sensor transmission power scheduling for remote state estimation. Autom. 50(4): 1235-1242 (2014) - [j25]Xianghui Cao, Peng Cheng, Jiming Chen, Shuzhi Sam Ge, Yu Cheng, Youxian Sun:
Cognitive Radio Based State Estimation in Cyber-Physical Systems. IEEE J. Sel. Areas Commun. 32(3): 489-502 (2014) - [j24]Jianping He, Peng Cheng, Ling Shi, Jiming Chen, Youxian Sun:
Time Synchronization in WSNs: A Maximum-Value-Based Consensus Approach. IEEE Trans. Autom. Control. 59(3): 660-675 (2014) - [j23]Duo Han, Peng Cheng, Jiming Chen, Ling Shi:
An Online Sensor Power Schedule for Remote State Estimation With Communication Energy Constraint. IEEE Trans. Autom. Control. 59(7): 1942-1947 (2014) - [j22]Jie Wang, Qinghua Gao, Peng Cheng, Yan Yu, Kefei Xin, Hongyu Wang:
Lightweight Robust Device-Free Localization in Wireless Networks. IEEE Trans. Ind. Electron. 61(10): 5681-5689 (2014) - [j21]Jianping He, Jiming Chen, Peng Cheng, Xianghui Cao:
Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach. IEEE Trans. Parallel Distributed Syst. 25(4): 1055-1065 (2014) - [j20]Zhu Ren, Peng Cheng, Jiming Chen, David K. Y. Yau, Youxian Sun:
Dynamic Activation Policies for Event Capture in Rechargeable Sensor Network. IEEE Trans. Parallel Distributed Syst. 25(12): 3124-3134 (2014) - [j19]Jianping He, Peng Cheng, Jiming Chen, Ling Shi, Rongxing Lu:
Time Synchronization for Random Mobile Sensor Networks. IEEE Trans. Veh. Technol. 63(8): 3935-3946 (2014) - [c34]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control. ACC 2014: 3996-4001 - [c33]Xu Tan, Yuanchao Shu, Xie Lu, Peng Cheng, Jiming Chen:
Characterizing and Modeling Package Dynamics in Express Shipping Service Network. BigData Congress 2014: 144-151 - [c32]Jianping He, Xiaoming Duan, Peng Cheng, Ling Shi, Lin Cai:
Distributed time synchronization under bounded noise in wireless sensor networks. CDC 2014: 6883-6888 - [c31]Yuelong Tian, Peng Cheng, Liang He, Yu Gu, Jiming Chen:
Optimal reader location for collision-free communication in WRSN. GLOBECOM 2014: 4418-4423 - [c30]Yifei Qi, Peng Cheng, Jiming Chen:
Dynamic sensor data scheduling for remote estimation over Gilbert-Elliot channel. ICCC 2014: 26-30 - [c29]Yuanchao Shu, Philippe Coué, Yinghua Huang, Jiaqi Zhang, Peng Cheng, Jiming Chen:
G-Loc: Indoor localization leveraging gradient-based fingerprint map. INFOCOM Workshops 2014: 129-130 - [c28]Yuanchao Shu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
TOC: Localizing wireless rechargeable sensors with time of charge. INFOCOM 2014: 388-396 - [c27]Liang He, Peng Cheng, Yu Gu, Jianping Pan, Ting Zhu, Cong Liu:
Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks. INFOCOM 2014: 1195-1203 - [c26]Zequ Yang, Peng Cheng, Jiming Chen:
LearJam: An Energy-Efficient Learning-Based Jamming Attack against Low-Duty-Cycle Networks. MASS 2014: 354-362 - [c25]Liang He, Lingkun Fu, Likun Zheng, Yu Gu, Peng Cheng, Jiming Chen, Jianping Pan:
ESync: an energy synchronized charging protocol for rechargeable wireless sensor networks. MobiHoc 2014: 247-256 - [c24]Lingkun Fu, Hao Liu, Liang He, Yu Gu, Peng Cheng, Jiming Chen:
Demo: an energy synchronized charging protocol for rechargeable wireless sensor networks. MobiHoc 2014: 411-412 - [c23]Yuelong Tian, Peng Cheng, Liang He, Yu Gu, Jiming Chen:
Exploiting time of charge to achieve collision-free communications in WRSN. QSHINE 2014: 115-121 - [c22]Zheng Dong, Linghe Kong, Peng Cheng, Liang He, Yu Gu, Lu Fang, Ting Zhu, Cong Liu:
REPC: Reliable and efficient participatory computing for mobile devices. SECON 2014: 257-265 - [c21]Yuanchao Shu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
Minimizing communication delay in RFID-based wireless rechargeable sensor networks. SECON 2014: 441-449 - 2013
- [j18]Shibo He, Xu Li, Jiming Chen, Peng Cheng, Youxian Sun, David Simplot-Ryl:
EMD: Energy-Efficient P2P Message Dissemination in Delay-Tolerant Wireless Sensor and Actor Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 75-84 (2013) - [j17]Zhu Ren, Peng Cheng, Jiming Chen, Ling Shi, Youxian Sun:
Optimal Periodic Sensor Schedule for Steady-State Estimation Under Average Transmission Energy Constraint. IEEE Trans. Autom. Control. 58(12): 3265-3271 (2013) - [j16]Peng Cheng, Fan Zhang, Jiming Chen, Youxian Sun, Xuemin Shen:
A Distributed TDMA Scheduling Algorithm for Target Tracking in Ultrasonic Sensor Networks. IEEE Trans. Ind. Electron. 60(9): 3836-3845 (2013) - [j15]Jie Wang, Qinghua Gao, Yan Yu, Peng Cheng, Lifei Wu, Hongyu Wang:
Robust Device-Free Wireless Localization Based on Differential RSS Measurements. IEEE Trans. Ind. Electron. 60(12): 5943-5952 (2013) - [j14]Xianghui Cao, Peng Cheng, Jiming Chen, Youxian Sun:
An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems. IEEE Trans. Ind. Informatics 9(1): 439-450 (2013) - [j13]Jianping He, Peng Cheng, Ling Shi, Jiming Chen:
SATS: Secure Average-Consensus-Based Time Synchronization in Wireless Sensor Networks. IEEE Trans. Signal Process. 61(24): 6387-6400 (2013) - [j12]Huan Zhou, Jiming Chen, Hongyang Zhao, Wei Gao, Peng Cheng:
On Exploiting Contact Patterns for Data Forwarding in Duty-Cycle Opportunistic Mobile Networks. IEEE Trans. Veh. Technol. 62(9): 4629-4642 (2013) - [j11]Peng Cheng, Shibo He, Fachang Jiang, Yu Gu, Jiming Chen:
Optimal Scheduling for Quality of Monitoring in Wireless Rechargeable Sensor Networks. IEEE Trans. Wirel. Commun. 12(6): 3072-3084 (2013) - [c20]Kefei Xin, Peng Cheng, Jiming Chen, Lihua Xie:
Sensor data forwarding strategies for state estimation in multi-hop wireless networks. CDC 2013: 4772-4777 - [c19]Mengjie Zhou, Jianping He, Peng Cheng, Jiming Chen:
Discrete average consensus with bounded noise. CDC 2013: 5270-5275 - [c18]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal DoS attack policy against remote state estimation. CDC 2013: 5444-5449 - [c17]Hao Li, Jianping He, Peng Cheng, Jiming Chen:
Consensus-based Time Synchronization in sensor networks: An experimental study. GLOBECOM 2013: 207-212 - [c16]Liping Ni, Xianghui Cao, Peng Cheng, Jiming Chen, Youxian Sun:
Distributed formation control with pose estimation in multi-robot systems. ICCA 2013: 834-839 - [c15]Lingkun Fu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
Minimizing charging delay in wireless rechargeable sensor networks. INFOCOM 2013: 2922-2930 - [c14]Zheng Dong, Banghui Lu, Liang He, Peng Cheng, Yu Gu, Lu Fang:
Exploring smartphone-based participatory computing to improve pervasive surveillance. SenSys 2013: 69:1-69:2 - 2012
- [j10]Peng Cheng, Xianghui Cao, Jing Bai, Youxian Sun:
On optimizing sensing quality with guaranteed coverage in autonomous mobile sensor networks. Comput. Commun. 35(9): 1107-1114 (2012) - [j9]Shibo He, Jiming Chen, Peng Cheng, Yu Gu, Tian He, Youxian Sun:
Maintaining Quality of Sensing with Actors in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(9): 1657-1667 (2012) - [j8]Ruilong Deng, Jiming Chen, Chau Yuen, Peng Cheng, Youxian Sun:
Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks. IEEE Trans. Veh. Technol. 61(2): 716-725 (2012) - [j7]Peng Cheng, Ruilong Deng, Jiming Chen:
Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks. IEEE Wirel. Commun. 19(6): 100-105 (2012) - [c13]Jianping He, Peng Cheng, Ling Shi, Jiming Chen:
Clock synchronization for random mobile sensor networks. CDC 2012: 2712-2717 - [c12]Jing Bai, Peng Cheng, Jiming Chen, Adrien Guenard, Yeqiong Song:
Target Tracking with Limited Sensing Range in Autonomous Mobile Sensor Networks. DCOSS 2012: 329-334 - [c11]Bo Chai, Ruilong Deng, Peng Cheng, Jiming Chen:
Energy-efficient power allocation in cognitive sensor networks: A game theoretic approach. GLOBECOM 2012: 416-421 - [c10]Kefei Xin, Xianghui Cao, Peng Cheng, Jiming Chen:
Optimal controller location in wireless sensor and actuator networks. ICARCV 2012: 560-565 - [c9]Zhu Ren, Peng Cheng, Jiming Chen, David K. Y. Yau, Youxian Sun:
Dynamic Activation Policies for Event Capture with Rechargeable Sensors. ICDCS 2012: 152-162 - 2011
- [j6]Ling Shi, Peng Cheng, Jiming Chen:
Sensor data scheduling for optimal state estimation with communication energy constraint. Autom. 47(8): 1693-1698 (2011) - [j5]Ling Shi, Peng Cheng, Jiming Chen:
Optimal Periodic Sensor Scheduling With Limited Resources. IEEE Trans. Autom. Control. 56(9): 2190-2195 (2011) - [j4]Jiming Chen, Qing Yu, Peng Cheng, Youxian Sun, Yanfei Fan, Xuemin Shen:
Game Theoretical Approach for Channel Allocation in Wireless Sensor and Actuator Networks. IEEE Trans. Autom. Control. 56(10): 2332-2344 (2011) - [c8]Jianping He, Peng Cheng, Ling Shi, Jiming Chen:
Time synchronization in WSNs: A maximum value based consensus approach. CDC/ECC 2011: 7882-7887 - [c7]Fan Zhang, Peng Cheng, Jiming Chen, Youxian Sun, Xuemin Shen:
Distributed Saturation Degree Based TDMA Scheduling Algorithm for Target Tracking. ICC 2011: 1-5 - [c6]Peng Cheng, Yong-Yan Cao, Youxian Sun:
A new LMI method for strong γk-γcl H∞ stabilization. ICCA 2011: 94-99 - [c5]Peng Cheng, Xianghui Cao, Jiming Chen, Kejie Cao, Youxian Sun, Xuemin Shen:
A Data Processing and Analysis Testbed for WSNs: Design and Implementation. CMC 2011: 475-480 - [c4]Fachang Jiang, Shibo He, Peng Cheng, Jiming Chen:
On Optimal Scheduling in Wireless Rechargeable Sensor Networks for Stochastic Event Capture. MASS 2011: 69-74 - [c3]Jie Wang, Peng Cheng, Jiming Chen, Youxian Sun, Xuemin (Sherman) Shen:
Target tracking with size estimation in wireless sensor networks. WCSP 2011: 1-5 - 2010
- [j3]Jiming Chen, Xianghui Cao, Peng Cheng, Yang Xiao, Youxian Sun:
Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks. IEEE Trans. Ind. Electron. 57(12): 4219-4230 (2010) - [c2]Ling Shi, Peng Cheng, Jiming Chen:
Sensor scheduling with limited communication energy and bandwidth. ICARCV 2010: 537-542
2000 – 2009
- 2009
- [j2]Peng Cheng, Yong-Yan Cao, Youxian Sun:
Strong gammak-gamma cl Hinfinity stabilization with a new slack variable approach. Autom. 45(8): 1861-1867 (2009) - 2008
- [j1]Peng Cheng, Yong-Yan Cao, Youxian Sun:
Some New Results on Strong γk - γcl H∞ Stabilization. IEEE Trans. Autom. Control. 53(5): 1268-1273 (2008) - 2007
- [c1]Peng Cheng, Yong-Yan Cao, Youxian Sun:
On strong γk-γcl H∞ stabilization and simultaneous γk-γcl H∞ control. CDC 2007: 5417-5422
Coauthor Index
aka: Yu Jason Gu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint