default search action
Lizhi Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j31]Ying Pang, Lizhi Peng, Haibo Zhang, Zhenxiang Chen, Bo Yang:
Imbalanced ensemble learning leveraging a novel data-level diversity metric. Pattern Recognit. 157: 110886 (2025) - 2024
- [j30]Lizhi Peng, Bo Zhao:
Navigating the ethical landscape behind ChatGPT. Big Data Soc. 11(1) (2024) - [j29]Muwei Jian, Chen Tao, Ronghua Wu, Haoran Zhang, Xiaoguang Li, Rui Wang, Yanlei Wang, Lizhi Peng, Jian Zhu:
HRU-Net: A high-resolution convolutional neural network for esophageal cancer radiotherapy target segmentation. Comput. Methods Programs Biomed. 250: 108177 (2024) - [j28]Ying Pang, Haibo Zhang, Jeremiah D. Deng, Lizhi Peng, Fei Teng:
Collaborative Learning With Heterogeneous Local Models: A Rule-Based Knowledge Fusion Approach. IEEE Trans. Knowl. Data Eng. 36(11): 5768-5783 (2024) - [i4]Xiaojie Yu, Haibo Zhang, Lizhi Peng, Fengyang Sun, Jeremiah D. Deng:
ESS-ReduNet: Enhancing Subspace Separability of ReduNet via Dynamic Expansion with Bayesian Inference. CoRR abs/2411.17961 (2024) - 2023
- [j27]Ting Wu, Yihang Hao, Bo Yang, Lizhi Peng:
ECM-EFS: An ensemble feature selection based on enhanced co-association matrix. Pattern Recognit. 139: 109449 (2023) - [c51]Hui Li, Yihang Hao, Mengda Lyu, Xiaojie Yu, Bo Yang, Lizhi Peng:
An Early Stage Identification of Cryptomining Behavior with DNS Requests. ADMA (5) 2023: 30-44 - [c50]Licheng Zhang, Shuaili Liu, Qingsheng Yang, Zhongfeng Qu, Lizhi Peng:
A Novel Adaptive Distribution Distance-Based Feature Selection Method for Video Traffic Identification. ADMA (4) 2023: 226-240 - [c49]Peng Yuan, Shanshan Wang, Chuan Zhao, Wenyue Wang, Daokuan Bai, Lizhi Peng, Zhenxiang Chen:
Adversarial Attack with Genetic Algorithm against IoT Malware Detectors. ICC 2023: 1413-1418 - [c48]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c47]Yaqi Li, Lizhi Peng, Yihang Hao, Hui Li, Xiang Chen, Bo Yang:
D-CoA: Probability Density-based Confidence Assignment Semi-Supervised Clustering Ensemble. ICPADS 2023: 327-332 - [c46]Mengda Lyu, Lizhi Peng, Hui Li, Bo Yang, Xiang Chen:
Sketch-based Real-time Intrusion Detection Framework for Industrial Internet of Things. ICPADS 2023: 2227-2234 - [c45]Yingshuo Bao, Shuaili Liu, Zhongfeng Qu, Lizhi Peng:
Live-Stream Identification Based on Reasoning Network with Core Traffic Set. KSEM (2) 2023: 16-26 - [i3]Licheng Zhang, Shuaili Liu, Qingsheng Yang, Zhongfeng Qu, Lizhi Peng:
Video traffic identification with novel feature extraction and selection method. CoRR abs/2303.03949 (2023) - 2022
- [j26]Peifa Sun, Mengda Lyu, Hui Li, Bo Yang, Lizhi Peng:
An early stage convolutional feature extracting method using for mining traffic detection. Comput. Commun. 193: 346-354 (2022) - [j25]Xiao Sun, Jindong Xu, Yongli Ma, Tianyu Zhao, Shifeng Ou, Lizhi Peng:
Blind image separation based on attentional generative adversarial network. J. Ambient Intell. Humaniz. Comput. 13(3): 1397-1404 (2022) - [j24]Shuzhuang Zhang, Yaning Zhang, Min Zhou, Lizhi Peng:
Community detection based on similarities of communication behavior in IP networks. J. Ambient Intell. Humaniz. Comput. 13(3): 1451-1461 (2022) - [j23]Yuxi Xie, Min Qiu, Haibo Zhang, Lizhi Peng, Zhenxiang Chen:
Gaussian Distribution Based Oversampling for Imbalanced Data Classification. IEEE Trans. Knowl. Data Eng. 34(2): 667-679 (2022) - [c44]Yihang Hao, Ting Wu, Lizhi Peng, Bo Yang:
NB-Radar: An Effective Method for Detecting Local Network Behaviors. ICCT 2022: 634-638 - [c43]Shuaili Liu, Licheng Zhang, Peifa Sun, Yingshuo Bao, Lizhi Peng:
Video traffic identification with a distribution distance-based feature selection. IPCCC 2022: 80-86 - [c42]Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. ISPA/BDCloud/SocialCom/SustainCom 2022: 774-781 - [c41]Ying Pang, Haibo Zhang, Jeremiah D. Deng, Lizhi Peng, Fei Teng:
Rule-Based Collaborative Learning with Heterogeneous Local Learning Models. PAKDD (1) 2022: 639-651 - [i2]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i1]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j22]Min Qiu, Lizhi Peng, Ying Pang, Bo Yang, Panpan Li:
Similarity-evaluation-based evolving of flexible neural trees for imbalanced classification. Appl. Soft Comput. 111: 107852 (2021) - [j21]Anli Yan, Zhenxiang Chen, Haibo Zhang, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [c40]Peifa Sun, Lizhi Peng, Bo Yang, Shuaili Liu:
A Novel Feature Method for Fast Extraction of Mining Traffic. HPCC/DSS/SmartCity/DependSys 2021: 783-790 - [c39]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c38]Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. TrustCom 2021: 651-658 - 2020
- [j20]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j19]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Gradient descent evolved imbalanced data gravitation classification with an application on Internet video traffic identification. Inf. Sci. 539: 447-460 (2020) - [c37]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10 - [c36]Xiaojie Yu, Min Qiu, Lizhi Peng:
A Novel Method to Classify Videos Based VBR Trace. ML4CS (2) 2020: 270-282 - [c35]Xuemei Li, Bo Yang, Lizhi Peng, Baosheng Li, Jian Zhu:
An Imbalanced Learning Based Method for Esophageal Squamous Cell Carcinoma (ESCC) Distant Metastasis Predicting. ML4CS (3) 2020: 441-453
2010 – 2019
- 2019
- [j18]Yuxi Xie, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang:
Generative learning for imbalanced data using the Gaussian mixed model. Appl. Soft Comput. 79: 439-451 (2019) - [j17]Ying Pang, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang:
Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection. Inf. Sci. 484: 95-112 (2019) - [j16]Hanbo Deng, Lizhi Peng, Haibo Zhang, Bo Yang, Zhenxiang Chen:
Ranking-based biased learning swarm optimizer for large-scale optimization. Inf. Sci. 493: 120-137 (2019) - [j15]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - [j14]Lizhi Peng, Haibo Zhang, Houcine Hassan, Yuehui Chen, Bo Yang:
Accelerating data gravitation-based classification using GPU. J. Supercomput. 75(6): 2930-2949 (2019) - [c34]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification. BigDataSecurity/HPSC/IDS 2019: 172-177 - [c33]Kaipeng Fan, Jifeng Guo, Bo Yang, Lin Wang, Lizhi Peng, Baosheng Li, Jian Zhu, Ajith Abraham:
A Prognosis Method for Esophageal Squamous Cell Carcinoma Based on CT Image and Three-Dimensional Convolutional Neural Networks. ISDA 2019: 622-631 - [c32]Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. TrustCom/BigDataSE 2019: 256-263 - 2018
- [j13]Zhenxiang Chen, Qiben Yan, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [c31]Yuxi Xie, Hanbo Deng, Lizhi Peng, Zhenxiang Chen:
Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features. ICA3PP (1) 2018: 46-58 - [c30]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c29]Sean Hsin-Shyuan Lee, Jeremiah D. Deng, Martin K. Purvis, Maryam Purvis, Lizhi Peng:
An Improved PBIL Algorithm for Optimal Coalition Structure Generation of Smart Grids. PAKDD (Workshops) 2018: 345-356 - [c28]Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. SPAC 2018: 14-19 - [c27]Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. SPAC 2018: 146-151 - [c26]Rui Wang, Jinfeng Zhao, Lizhi Peng, Bo Yang, Lin Wang, Baosheng Li:
Medical entity recognition of Esophageal Carcinoma based on word clustering. SPAC 2018: 348-353 - 2017
- [j12]Lizhi Peng, Haibo Zhang, Yuehui Chen, Bo Yang:
Imbalanced traffic identification using an imbalanced data gravitation-based classification model. Comput. Commun. 102: 177-189 (2017) - [j11]Lizhi Peng, Hongli Zhang, Haibo Zhang, Bo Yang:
A fast feature weighting algorithm of data gravitation classification. Inf. Sci. 375: 54-78 (2017) - [j10]Zhenxiang Chen, Zhusong Liu, Lizhi Peng, Lin Wang, Lei Zhang:
A novel semi-supervised learning method for Internet application identification. Soft Comput. 21(8): 1963-1975 (2017) - [j9]Zhenxiang Chen, Lizhi Peng, Chongzhi Gao, Bo Yang, Yuehui Chen, Jin Li:
Flexible neural trees based early stage identification for IP traffic. Soft Comput. 21(8): 2035-2046 (2017) - [j8]Haibo Zhang, Luming Wan, Yawen Chen, Laurence T. Yang, Lizhi Peng:
Adaptive Message Routing and Replication in Mobile Opportunistic Networks for Connected Communities. ACM Trans. Internet Techn. 18(1): 2:1-2:22 (2017) - [c25]Sean Hsin-Shyuan Lee, Jeremiah D. Deng, Lizhi Peng, Martin K. Purvis, Maryam Purvis:
Top-k Merit Weighting PBIL for Optimal Coalition Structure Generation of Smart Grids. ICONIP (4) 2017: 171-181 - 2016
- [j7]Lizhi Peng, Bo Yang, Yuehui Chen, Zhenxiang Chen:
Effectiveness of Statistical Features for Early Stage Internet Traffic Identification. Int. J. Parallel Program. 44(1): 181-197 (2016) - [c24]Lizhi Peng, Haibo Zhang, Bo Yang, Yuehui Chen, Xiaoqing Zhou:
Early Stage Internet Traffic Identification Using Data Gravitation Based Classification. DASC/PiCom/DataCom/CyberSciTech 2016: 504-511 - [c23]Lizhi Peng, Haibo Zhang, Bo Yang, Yuehui Chen, Xiaoqing Zhou:
SMOTE-DGC: An Imbalanced Learning Approach of Data Gravitation Based Classification. ICIC (2) 2016: 133-144 - [c22]Chengwei Wang, Dan Kang, Xiuyang Zhao, Lizhi Peng, Caiming Zhang:
Extraction of Feature Points on 3D Meshes Through Data Gravitation. ICIC (2) 2016: 601-612 - [c21]Lizhi Peng, Bo Yang, Yuehui Chen, Xiaoqing Zhou:
An under-sampling imbalanced learning of data gravitation based classification. ICNC-FSKD 2016: 419-425 - [c20]Lizhi Peng, Haibo Zhang, Bo Yang, Majing Su, Yuehui Chen:
On the Effectiveness of Packet Sampling for Early Stage Traffic Identification. iThings/GreenCom/CPSCom/SmartData 2016: 468-473 - [c19]Linlin Wang, Lizhi Peng, Majing Su, Bo Yang, Xiaoqing Zhou:
On the Impact of Packet Inter Arrival Time for Early Stage Traffic Identification. iThings/GreenCom/CPSCom/SmartData 2016: 510-515 - [c18]Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. IWQoS 2016: 1-6 - [c17]Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - 2015
- [j6]Lizhi Peng, Bo Yang, Yuehui Chen:
Effective packet number for early stage internet traffic identification. Neurocomputing 156: 252-267 (2015) - [c16]Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - [c15]Zhenxiang Chen, Keke Wang, Lizhi Peng, Tao Sun, Lei Zhang:
High Performance NetFPGA and Multi-fractal Wavelet Model Based Network Traffic Generator. ICSI (3) 2015: 287-296 - [c14]Zhenxiang Chen, Qiben Yan, Lei Zhang, Lizhi Peng, Hongbo Han:
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities. ICSI (3) 2015: 479-490 - [c13]Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. TrustCom/BigDataSE/ISPA (1) 2015: 206-213 - 2014
- [j5]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen:
A new approach for imbalanced data classification based on data gravitation. Inf. Sci. 288: 347-373 (2014) - [c12]Lizhi Peng, Bo Yang, Yuehui Chen:
Hierarchical RBF Neural Network Using for Early Stage Internet Traffic Identification. CSE 2014: 1188-1195 - [c11]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen:
Feature Evaluation for Early Stage Internet Traffic Identification. ICA3PP (1) 2014: 511-525 - [c10]Zhenxiang Chen, Lizhi Peng, Shupeng Zhao, Lei Zhang, Shan Jing:
Feature Selection Toward Optimizing Internet Traffic Behavior Identification. ICA3PP (2) 2014: 631-644 - 2011
- [j4]Lizhi Peng, Bo Yang, Lei Zhang, Yuehui Chen:
A parallel evolving algorithm for flexible neural tree. Parallel Comput. 37(10-11): 653-666 (2011) - 2010
- [c9]Runyuan Sun, Bo Yang, Lizhi Peng, Zhenxiang Chen, Lei Zhang, Shan Jing:
Traffic classification using probabilistic neural networks. ICNC 2010: 1914-1919 - [c8]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen, Mahmoud T. Qassrawi, Gang Lu:
Traffic identification using flexible neural trees. IWQoS 2010: 1-5
2000 – 2009
- 2009
- [j3]Zhenxiang Chen, Bo Yang, Yuehui Chen, Ajith Abraham, Crina Grosan, Lizhi Peng:
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors. Appl. Soft Comput. 9(2): 685-694 (2009) - [j2]Lizhi Peng, Bo Yang, Yuehui Chen, Ajith Abraham:
Data gravitation based classification. Inf. Sci. 179(6): 809-819 (2009) - 2007
- [j1]Yuehui Chen, Bo Yang, Ajith Abraham, Lizhi Peng:
Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems Using Evolutionary Algorithms. IEEE Trans. Fuzzy Syst. 15(3): 385-397 (2007) - [c7]Lin Wang, Bo Yang, Zhenxiang Chen, Ajith Abraham, Lizhi Peng:
A Novel Improvement of Neural Network Classification Using Further Division of Partition Space. IWINAC (1) 2007: 214-223 - 2006
- [c6]Bo Yang, Lizhi Peng, Yuehui Chen, Hanxing Liu, Runzhang Yuan:
A DGC-Based Data Classification Method Used for Abnormal Network Intrusion Detection. ICONIP (3) 2006: 209-216 - [c5]Yuehui Chen, Lizhi Peng, Ajith Abraham:
Gene Expression Profiling Using Flexible Neural Trees. IDEAL 2006: 1121-1128 - [c4]Zhenxiang Chen, Haiyang Wang, Lizhi Peng, Bo Yang, Yuehui Chen:
A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree. ISDA (2) 2006: 556-561 - [c3]Yuehui Chen, Lizhi Peng, Ajith Abraham:
Exchange Rate Forecasting Using Flexible Neural Trees. ISNN (2) 2006: 518-523 - [c2]Yuehui Chen, Lizhi Peng, Ajith Abraham:
Hierarchical Radial Basis Function Neural Networks for Classification Problems. ISNN (1) 2006: 873-879 - [c1]Yuehui Chen, Lizhi Peng, Ajith Abraham:
Stock Index Modeling Using Hierarchical Radial Basis Function Networks. KES (3) 2006: 398-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint