关注
Peng jialiang
Peng jialiang
Heilongjiang University, China
在 hlju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A Secure Federated Learning Framework for 5G Networks
Y Liu, J Peng, J Kang, AM Iliyasu, D Niyato, AAA El-Latif
IEEE Wireless Communications 27 (4), 24-31, 2020
1752020
Deploying machine and deep learning models for efficient data-augmented detection of COVID-19 infections
A Sedik, AM Iliyasu, B Abd El-Rahiem, ME Abdel Samea, ...
Viruses 12 (7), 769, 2020
1642020
Multimodal biometric authentication based on score level fusion of finger biometrics
J Peng, AA Abd El-Latif, Q Li, X Niu
Optik 125 (23), 6891-6897, 2014
1092014
Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities
AA Abd El-Latif, B Abd-El-Atty, I Mehmood, K Muhammad, ...
Information Processing & Management 58 (4), 102549, 2021
982021
Finger-vein verification using Gabor filter and SIFT feature matching
J Peng, N Wang, AA Abd El-Latif, Q Li, X Niu
2012 eighth international conference on intelligent information hiding and …, 2012
892012
PPGAN: Privacy-preserving generative adversarial network
Y Liu, J Peng, JQ James, Y Wu
2019 IEEE 25Th international conference on parallel and distributed systems …, 2019
652019
A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption
AA Abd El-Latif, X Yan, L Li, N Wang, JL Peng, X Niu
Optics & Laser Technology 54, 389-400, 2013
642013
Dominant data set selection algorithms for electricity consumption time-series data analysis based on affine transformation
Y Wu, Y Liu, SH Ahmed, J Peng, AA Abd El-Latif
IEEE Internet of Things Journal 7 (5), 4347-4360, 2019
612019
An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients
N Wang, Q Li, AA Abd El-Latif, J Peng, X Niu
Multimedia tools and applications 72, 2339-2358, 2014
452014
Multiagent federated reinforcement learning for Secure Incentive Mechanism in Intelligent Cyber–Physical Systems
M Xu, J Peng, BB Gupta, J Kang, Z Xiong, Z Li, AA Abd El-Latif
IEEE Internet of Things Journal 9 (22), 22095-22108, 2021
422021
Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics
J Peng, Q Li, AA Abd El-Latif, X Niu
Multimedia Tools and Applications 74, 4469-4486, 2015
422015
Finger vein recognition with gabor wavelets and local binary patterns
J Peng, Q Li, AA Abd El-Latif, N Wang, X Niu
IEICE TRANSACTIONS on Information and Systems 96 (8), 1886-1889, 2013
372013
Towards communication-efficient and attack-resistant federated edge learning for industrial Internet of Things
Y Liu, R Zhao, J Kang, A Yassine, D Niyato, J Peng
ACM Transactions on Internet Technology (TOIT) 22 (3), 1-22, 2021
242021
Efficient chaotic nonlinear component for secure cryptosystems
J Peng, AA Abd El-Latif, A Belazi, Z Kotulski
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN …, 2017
232017
Finger multibiometric cryptosystems: fusion strategy and template security
J Peng, Q Li, AA Abd El-Latif, X Niu
Journal of Electronic Imaging 23 (2), 023001-023001, 2014
232014
A biometric cryptosystem scheme based on random projection and neural network
J Peng, B Yang, BB Gupta, AA Abd El-Latif
Soft Computing 25, 7657-7670, 2021
222021
Finger multi-biometric cryptosystem using feature-level fusion
L Lu, J Peng
International Journal of Signal Processing, Image Processing and Pattern …, 2014
202014
An effective preprocessing method for finger vein recognition
JL Peng, Q Li, N Wang, AA Abd El-Latif, X Niu
Fifth International Conference on Digital Image Processing (ICDIP 2013) 8878 …, 2013
192013
A novel finger vein image quality evaluation method based on triangular norm
J Peng, Q Li, X Niu
2014 Tenth International Conference on Intelligent Information Hiding and …, 2014
182014
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system
N Wang, Q Li, AA Abd El-Latif, J Peng, X Yan, X Niu
Signal, Image and Video Processing 9, 99-109, 2015
172015
系统目前无法执行此操作,请稍后再试。
文章 1–20