default search action
Hao Peng 0002
Person information
- affiliation: Zhejiang Normal University, Jinhua, China
Other persons with the same name
- Hao Peng — disambiguation page
- Hao Peng 0001 — Beihang University, Beijing, China
- Hao Peng 0003 — South China University of Technology, Guangzhou, China
- Hao Peng 0004 — Embry-Riddle Aeronautical University, Daytona Beach, FL, USA
- Hao Peng 0005 — Northeastern University, College of Information Science and Engineering, Shenyang, China
- Hao Peng 0006 — University of Michigan, Ann Arbor, MI, USA
- Hao Peng 0007 — University of Georgia, Athens, GA, USA
- Hao Peng 0008 — Apex.AI Inc., Palo Alto, CA, USA
- Hao Peng 0009 — University of Illinois Urbana-Champaign, IL, USA (and 1 more)
- Hao Peng 0010 — Nanjing Tech University, Nanjing, China
- Hao Peng 0011 — Beijing BENZ Automotive CO.LTD, Beijing, China
- Hao Peng 0012 — University of Electronic Science and Technology of China, Chengdu, China
- Hao Peng 0013 — Tianjin University, School of Electrical and Information Engineering, Tianjin, China
- Hao Peng 0014 — Stanford University, Department of Radiation Oncology, Stanford, CA, USA
- Hao Peng 0015 — Tsinghua University, Department of Computer Science and Technology, Beijing, China
- Hao Peng 0016 — ObEN, Inc., Pasadena, CA, USA
- Hao Peng 0017 — Peking University, Beijing, China
- Hao Peng 0018 — University of Edinburgh, Edinburgh, GB
- Hao Peng 0019 — Stony Brook University, Stony Brook, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j27]Hao Peng, Yifan Zhao, Dandan Zhao, Bo Zhang, Cheng Qian, Ming Zhong, Jianming Han, Xiaoyang Liu, Wei Wang:
Robustness of multilayer interdependent higher-order network. J. Netw. Comput. Appl. 233: 104047 (2025) - [j26]Cheng Qian, Dandan Zhao, Ming Zhong, Hao Peng, Wei Wang:
Modeling and analysis of cascading failures in multilayer higher-order networks. Reliab. Eng. Syst. Saf. 253: 110497 (2025) - 2024
- [j25]Cheng Qian, Dandan Zhao, Ming Zhong, Hao Peng, Wei Wang:
Cascading failures on interdependent hypergraph. Commun. Nonlinear Sci. Numer. Simul. 138: 108237 (2024) - [j24]Gangqiang Hu, Jianmin Han, Jianfeng Lu, Juan Yu, Sheng Qiu, Hao Peng, Donglin Zhu, Taiyong Li:
Game-Theoretic Design of Quality-Aware Incentive Mechanisms for Hierarchical Federated Learning. IEEE Internet Things J. 11(15): 26033-26045 (2024) - [j23]Hao Peng, Zhe Wang, Chao Wei, Dandan Zhao, Guangquan Xu, Jianming Han, Shixin Guo, Ming Zhong, Shouling Ji:
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples. Knowl. Based Syst. 300: 112188 (2024) - [j22]Hao Peng, Shixin Guo, Dandan Zhao, Xuhong Zhang, Jianmin Han, Shouling Ji, Xing Yang, Ming Zhong:
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting. IEEE Trans. Dependable Secur. Comput. 21(4): 3901-3916 (2024) - [j21]Hao Peng, Jieshuai Yang, Dandan Zhao, Xiaogang Xu, Yuwen Pu, Jianmin Han, Xing Yang, Ming Zhong, Shouling Ji:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. IEEE Trans. Inf. Forensics Secur. 19: 4881-4896 (2024) - [j20]Jingyi Cui, Guangquan Xu, Jian Liu, Shicheng Feng, Jianli Wang, Hao Peng, Shihui Fu, Zhaohua Zheng, James Xi Zheng, Shaoying Liu:
ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI. ACM Trans. Knowl. Discov. Data 18(7): 161 (2024) - [i2]Qinfeng Li, Yangfan Xie, Tianyu Du, Zhiqiang Shen, Zhenghan Qin, Hao Peng, Xinkui Zhao, Xianwei Zhu, Jianwei Yin, Xuhong Zhang:
CoreGuard: Safeguarding Foundational Capabilities of LLMs Against Model Stealing in Edge Deployment. CoRR abs/2410.13903 (2024) - 2023
- [j19]Hao Peng, Shixin Guo, Dandan Zhao, Yiming Wu, Jianming Han, Zhe Wang, Shouling Ji, Ming Zhong:
Query-efficient model extraction for text classification model in a hard label setting. J. King Saud Univ. Comput. Inf. Sci. 35(4): 10-20 (2023) - [j18]Hao Peng, Zhe Wang, Dandan Zhao, Yiming Wu, Jianming Han, Shixin Guo, Shouling Ji, Ming Zhong:
Efficient text-based evolution algorithm to hard-label adversarial attacks on text. J. King Saud Univ. Comput. Inf. Sci. 35(5): 101539 (2023) - [c16]Tianhan Zhang, Juan Yu, Jianmin Han, Hao Peng, Sheng Qiu:
PGAN-KD:Member Privacy Protection of GANs Based on Knowledge Distillation. IEEE Big Data 2023: 1380-1385 - 2022
- [j17]Dandan Zhao, Runchao Li, Hao Peng, Ming Zhong, Wei Wang:
Percolation on simplicial complexes. Appl. Math. Comput. 431: 127330 (2022) - [j16]Hao Peng, Zhe Kan, Can Liu, Thar Baker, Dandan Zhao:
Risk Assessment of CPS Composed of Edge Consumer Electronics Under Intentional Attack. IEEE Consumer Electron. Mag. 11(2): 36-41 (2022) - [j15]Xin Yao, Juan Yu, Jianmin Han, Jianfeng Lu, Hao Peng, Yijia Wu, Xiaoqian Cao:
DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism. ISPRS Int. J. Geo Inf. 11(12): 607 (2022) - [j14]Hao Peng, Cheng Qian, Dandan Zhao, Ming Zhong, Xianwen Ling, Wei Wang:
Disintegrate hypergraph networks by attacking hyperedge. J. King Saud Univ. Comput. Inf. Sci. 34(7): 4679-4685 (2022) - [j13]Zhao-Long Hu, Jianmin Han, Hao Peng, Jianfeng Lu, Xiangbin Zhu, Riheng Jia, Minglu Li:
Locating Sources in Multiplex Networks for Linear Diffusion Systems. IEEE Trans. Netw. Sci. Eng. 9(5): 3515-3530 (2022) - [c15]Xiaoqian Cao, Juan Yu, Jianmin Han, Xin Yao, Jianfeng Lu, Hao Peng:
A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing. MLNLP 2022: 271-278 - 2021
- [j12]Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han:
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems. Mob. Networks Appl. 26(4): 1532-1542 (2021) - [j11]Dandan Zhao, Can Liu, Hao Peng, Juan Yu, Jianmin Han:
A Security Scheme Based on Intranal-Adding Links for Integrated Industrial Cyber-Physical Systems. Sensors 21(8): 2794 (2021) - [c14]Mohan Fang, Juan Yu, Jianmin Han, Xin Yao, Hao Peng, Jianfeng Lu, Ngounou Bernard:
Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks. CollaborateCom (1) 2021: 20-37 - [c13]Hao Peng, Zhen Qian, Ming Zhong, Dandan Zhao, Guangquan Xu, Songyang Wu, Jianming Han:
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack. FCS 2021: 230-242 - 2020
- [j10]Hao Peng, Can Liu, Dandan Zhao, Hongxia Ye, Zian Fang, Wei Wang:
Security Analysis of CPS Systems Under Different Swapping Strategies in IoT Environments. IEEE Access 8: 63567-63576 (2020) - [j9]Hao Peng, Wangxin Peng, Dandan Zhao, Wei Wang:
Impact of the heterogeneity of adoption thresholds on behavior spreading in complex networks. Appl. Math. Comput. 386: 125504 (2020) - [j8]Tian Wang, Yuzhu Liang, Yi Yang, Guangquan Xu, Hao Peng, Anfeng Liu, Weijia Jia:
An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems. IEEE Netw. 34(3): 16-22 (2020) - [j7]Hao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han:
Security Evaluation under Different Exchange Strategies Based on Heterogeneous CPS Model in Interdependent Sensor Networks. Sensors 20(21): 6123 (2020) - [c12]Rong Fang, Jianmin Han, Juan Yu, Xin Yao, Hao Peng, Jianfeng Lu:
Differentially Private Location Preservation with Staircase Mechanism Under Temporal Correlations. CollaborateCom (2) 2020: 75-92 - [c11]Hao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han:
Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies. FCS 2020: 294-304 - [c10]Hao Peng, Can Liu, Dandan Zhao, Jianmin Han, Zhonglong Zheng:
Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks. FCS 2020: 305-314 - [c9]Hao Peng, Zhen Qian, Zhe Kan, Hongxia Ye, Zian Fang, Dandan Zhao:
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy. FCS 2020: 315-327 - [c8]Hao Peng, Can Liu, Dandan Zhao, Zhao-Long Hu, Jianmin Han, Jianfeng Lu:
Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies. SocialSec 2020: 329-339 - [c7]Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu:
Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links. SocialSec 2020: 369-378
2010 – 2019
- 2019
- [j6]Jianfeng Lu, Shasha Yang, Zhao Zhang, Jianmin Han, Hao Peng, Zhao-Long Hu, Tian Wang:
Multi-Level Two-Sided Rating Protocol Design for Service Exchange Contest Dilemma in Crowdsensing. IEEE Access 7: 78391-78405 (2019) - 2018
- [j5]Jianfeng Lu, Yun Xin, Zhao Zhang, Hao Peng, Jianmin Han:
Supporting user authorization queries in RBAC systems by role-permission reassignment. Future Gener. Comput. Syst. 88: 707-717 (2018) - [c6]Yang Zhao, Jianmin Han, Jianfeng Lu, Hao Peng, Zhao-Long Hu, Li-Xia Wang:
A Two-Step Choice Privacy-Preservation Method for Check-in Data Publishing. ICMLC 2018: 275-281 - [c5]Mengqi Gao, Jianmin Han, Jianfeng Lu, Hao Peng, Zhao-Long Hu:
Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1976-1981 - 2017
- [c4]Jianmin Han, Juan Yu, Jianfeng Lu, Hao Peng, Jiandang Wu:
An Anonymization Method to Improve Data Utility for Classification. CSS 2017: 57-71 - [c3]Jianfeng Lu, Yun Xin, Hao Peng, Jianmin Han, Feilong Lin:
Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment. CSS 2017: 468-476 - 2016
- [j4]Hao Peng, Dandan Zhao, Jianmin Han, Jianfeng Lu:
An anonymity mechanism with reduced server-side cost in peer-to-peer networks. Int. J. High Perform. Comput. Netw. 9(5/6): 409-416 (2016) - [j3]Hao Peng, Dandan Zhao, Yunjie Yu, Zhendong Wu, Songyang Wu:
一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks). 计算机科学 43(10): 66-69 (2016) - 2015
- [c2]Hui Guo, Jianmin Han, Jianfeng Lu, Hao Peng, Changbin Tang:
(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks. UIC/ATC/ScalCom 2015: 1288-1293 - 2014
- [j2]Jianfeng Lu, Dewu Xu, Lei Jin, Jianmin Han, Hao Peng:
On the complexity of role updating feasibility problem in RBAC. Inf. Process. Lett. 114(11): 597-602 (2014) - 2013
- [j1]Jianmin Han, Fangwei Luo, Jianfeng Lu, Hao Peng:
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata. J. Softw. 8(12): 3096-3104 (2013) - 2011
- [i1]Hao Peng, Songnian Lu, Dandan Zhao, Aixin Zhang, Jianhua Li:
An Anti-attack Model Based on Complex Network Theory in P2P networks. CoRR abs/1108.5530 (2011) - 2010
- [c1]Hao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao:
An Anonymity Scheme Based on Pseudonym in P2P Networks. e-Forensics 2010: 287-293
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint