代表论文 |
1. Li L, Peng H, Kurths J, et al. Chaos-order transition in foraging behavior of ants[J], Proceedings of the National Academy of Sciences of the United States of America, 2014, 111(23): 8392-8397. 2. Peng H, Yang B, Li L, et al. Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System[J]. IEEE Internet of Things Journal, 2019, 7(3): 2432-2451. 3. Peng H, Mi Y, Li L, et al. P-tensor product in compressed sensing[J]. IEEE Internet of Things Journal, 2018, 6(2): 3492-3511. 4. Peng H, Tian Y, Kurths J, et al. Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks[J]. IEEE transactions on biomedical circuits and systems, 2017, 11(3): 558-573. 5. Yang Y, Peng H, Li L, et al. General theory of security and a study case in internet of things[J]. IEEE Internet of Things Journal, 2016, 4(2): 592-600. 6. Li L, Liu L, Peng H, et al. Flexible and secure data transmission system based on semitensor compressive sensing in wireless body area networks[J]. IEEE Internet of Things Journal, 2018, 6(2): 3212-3227. 7. Yang Y, Niu X, Li L, Peng H. A secure and efficient transmission method in connected vehicular cloud computing[J]. IEEE Network, 2018, 32(3): 14-19. 8. Chen Z, Li L, Peng H, et al. A novel digital watermarking based on general non-negative matrix factorization[J]. IEEE Transactions on Multimedia, 2018, 20(8): 1973-1986. 9. Zuo X, Li L, Peng H, et al. Privacy-Preserving Subgraph Matching Scheme with Authentication in Social Networks[J]. IEEE Transactions on Cloud Computing, 2020. doi: 10.1109/TCC.2020.3012999. 10. Zuo X, Li L, Peng H, et al. Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid[J]. IEEE Systems Journal, 2020. doi: 10.1109/JSYST.2020.2994363. |