default search action
Peiqiang Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Yuheng Zhang:
EAOS: Exposing attacks in smart contracts through analyzing opcode sequences with operands. Comput. Networks 257: 110959 (2025) - [j11]Wanyi Gu, Guojun Wang, Peiqiang Li, Guangxin Zhai, Xubin Li:
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model. Int. J. Inf. Sec. 24(1): 33 (2025) - 2024
- [j10]Peiqiang Li, Guojun Wang, Guangxin Zhai, Wanyi Gu, Xubin Li, Xiangyong Liu, Yuheng Zhang:
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model. Comput. Electr. Eng. 120: 109682 (2024) - [j9]Peiqiang Li, Guo-Jun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
Detecting abnormal behaviors in smart contracts using opcode sequences. Comput. Commun. 220: 12-22 (2024) - [j8]Peiqiang Li, Guojun Wang, Xiaofei Xing, Xiangbin Li, Jinyao Zhu:
Detecting unknown vulnerabilities in smart contracts using opcode sequences. Connect. Sci. 36(1) (2024) - [j7]Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
A smart contract vulnerability detection method based on deep learning with opcode sequences. Peer Peer Netw. Appl. 17(5): 3222-3238 (2024) - [c16]Xuelei Liu, Guojun Wang, Mingfei Chen, Peiqiang Li, Jinyao Zhu:
A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length. ICIC (8) 2024: 369-380 - 2023
- [c15]Jinyao Zhu, Xiaofei Xing, Guojun Wang, Peiqiang Li:
Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning. TrustCom 2023: 284-291 - [c14]Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. UbiSec 2023: 63-75 - [i1]Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model. CoRR abs/2311.14514 (2023) - 2022
- [j6]Wei Zhao, Wenqi Xue, Peiqiang Li, Xuexian Tang, Ertao Lei, Hanbin Diao, Xiaoxiu Lv:
Research on Cluster Economy Operation Model Considering Customer Satisfaction. IEEE Access 10: 57352-57361 (2022) - [j5]Kuan Zhang, Bin Zhou, C. Y. Chung, Zhikang Shuai, Jiayong Li, Peiqiang Li:
A Multilateral Transactive Energy Framework of Hybrid Charging Stations for Low-Carbon Energy-Transport Nexus. IEEE Trans. Ind. Informatics 18(11): 8270-8281 (2022) - [c13]Mingle Zuo, Peiqiang Li, Jiangtao Fan, Xiuhua Fan:
Low carbon economic scheduling of integrated energy system based on particle swarm optimization algorithm. CAIBDA 2022: 1-5 - [c12]Guanghui Feng, Guojun Wang, Tao Peng, Xiaofei Xing, Shuhong Chen, Peiqiang Li:
A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2022: 945-952 - [c11]Peiqiang Li, Liang Yuan, Teng Ran, Jianbo Zhang:
Geometry-appearance Ensemble Object Association for Semantic SLAM. ROBIO 2022: 1934-1940 - [c10]Wanyi Gu, Guojun Wang, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen:
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM. UbiSec 2022: 52-63 - [c9]Xiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li, Xiangyong Liu:
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning. UbiSec 2022: 179-192 - [c8]Xiao Wang, Xiaofei Xing, Peiqiang Li, Shaohong Zhang:
Optimization Scheme of Single-Objective Task Offloading with Multi-user Participation in Cloud-Edge-End Environment. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1166-1171 - 2021
- [j4]Wei Zhao, Hanbin Diao, Peiqiang Li, Xiaoxiu Lv, Ertao Lei, Zhenyu Mao, Wenqi Xue:
Transactive Energy-Based Joint Optimization of Energy and Flexible Reserve for Integrated Electric-Heat Systems. IEEE Access 9: 14491-14503 (2021) - [c7]Yusheng Chen, Peiqiang Li, Kuo-Chi Chang, Rongsheng Zhang:
Research on Battery Energy Storage to Improve Transient Voltage Stability of Weak Nodes in Power System. AISI 2021: 165-173 - [c6]Huiqiong Deng, Qin-Bin Li, Rongjin Zheng, Peiqiang Li, Kuo-Chi Chang:
Research on Pre-view Method of Safety Level of Cascading Trip for Power Grid. AMLTA 2021: 855-862
2010 – 2019
- 2019
- [c5]Peidong Sun, Pengcheng Cao, Peiqiang Li:
Power Flow Calculation Based Newton-Raphson Calculation. ICGEC 2019: 200-209 - 2018
- [j3]Peiqiang Li, Qiyuan Li, Canbing Li, Bin Zhou, Yijia Cao, Qiuwei Wu, Baling Fang:
Sparsity Prevention Pivoting Method for Linear Programming. IEEE Access 6: 19560-19567 (2018) - [j2]Peiqiang Li, Jiang Zhang, Canbing Li, Bin Zhou, Yongjun Zhang, Manman Zhu, Ning Li:
Dynamic Similar Sub-Series Selection Method for Time Series Forecasting. IEEE Access 6: 32532-32542 (2018) - [j1]Peiqiang Li, Zhuangxi Tan, Yanji Zhou, Canbing Li, Ruo Li, Xuezhong Qi:
Secondary Frequency Regulation Strategy With Fuzzy Logic Method and Self-Adaptive Modification of State of Charge. IEEE Access 6: 43575-43585 (2018) - [c4]Peiqiang Li, Zhengbang Xia, Lu-Qi Jie, Chuan Lin, Peidong Sun, Pengcheng Cao:
Influence of SVC and STATCOM Access on Voltage Stability of Doubly Fed Wind Turbine. ICGEC 2018: 103-111 - [c3]Peiqiang Li, Lu-Qi Jie, Zheng-Bang Xia, Cai-Jie Weng:
Influence of Wind Farm Access on System Small Signal Stability. ICGEC 2018: 113-122
2000 – 2009
- 2009
- [c2]Peiqiang Li, Yi Zeng, Spyros Kotoulas, Jacopo Urbani, Ning Zhong:
The Quest for Parallel Reasoning on the Semantic Web. AMT 2009: 430-441 - [c1]Peiqiang Li, Guojun Wang, Jie Wu, Hong-Chuan Yang:
Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks. GLOBECOM 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint