微信扫描,关注珞珈图腾微信公众号
论文
当前位置: 首页 > 科研成果 > 论文
实验室发表论文
浏览次数: | 评论次数: | 发布人:管理员 | 发布时间:2020/12/18 22:40:18

英文论文:

[1] Shengkun Zhu, Quanqing Xu, Jinshan Zeng, Sheng Wang, Yuan Sun, Zhifeng Yang, Chuanhui Yang, and Zhiyong Peng. 2023. F3KM: Federated, Fair, and Fast 𝑘-means. Proc. ACM Manag. Data 1, 4 (SIGMOD), Article 241 (December 2023), 25 pages.

[2] Juntao Zhang, Sheng Wang, Yuan Sun, Zhiyong Peng: Prerequisite-driven Fair Clustering on Heterogeneous Information Networks. Proc. ACM Manag. Data 1(2): 122:1-122:27 (2023)

[3] Wei Song, Yu Wu, Yihui Cui, Qilie Liu, Yuan Shen, Zicheng Qiu, Jianjun Yao, Zhiyong Peng: Public integrity verification for data sharing in cloud with asynchronous revocation. Digit. Commun. Networks 8(1): 33-43 (2022)

[4] Yan Li, Liwei Wang, Sheng Wang, Yuan Sun, Zhiyong Peng. A Resource-Aware Deep Cost Model for Big Data Query Processing[C]//2022 IEEE 38th International Conference on Data Engineering (ICDE). IEEE, 2022: 885-897.

[5] Songsong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng: Towards an Optimal Bus Frequency Scheduling: When the Waiting Time Matters. IEEE Trans. Knowl. Data Eng. 34(9): 4484-4498 (2022)

[6] Wenzhe Yang, Sheng Wang, Yuan Sun, Zhiyong Peng: Fast Dataset Search with Earth Mover's Distance. Proc.VLDB Endow. 15(11): 2517-2529 (2022)

[7] Juntao Zhang, Hai Lan, Xiandi Yang, Shuaichao Zhang, Wei Song, Zhiyong Peng. Weakly supervised setting for learning concept prerequisite relations using multi-head attention variational graph auto-encoders. Knowl. Based Syst. 247: 108689 (2022)

[8] Yuan Shen, Wei Song, Changsheng Zhao, Zhiyong Peng. Secure Access Control for eHealth Data in Emergency Rescue Case Based on Traceable Attribute-Based Encryption.TrustCom 2022

[9] Huan Jiang, Honghao Liu, Rongrong Li, Yuwei Peng, Bin Xu, Zhiyong Peng: An Object-Deputy Approach For Chinese Genealogy Collaborative Management. CSCWD 2022: 95-100

[10] Juntao Zhang, Nanzhou Lin, Xuelong Zhang, Wei Song, Xiandi Yang, Zhiyong Peng:Learning Concept Prerequisite Relations from Educational Data via Multi-Head Attention Variational Graph Auto-Encoders. WSDM 2022: 1377-1385

[11] Songsong Mo, Zhifeng Bao, Ping Zhang, Zhiyong Peng. Towards an efficient weighted random walk domination[J]. Proceedings of the VLDB Endowment, 2020, 14(4): 560- 572.

[12] Nanzhou Lin, Juntao Zhang, Xiandi Yang, Wei Song, ZhiyongPeng. GRHAM: Towards Group Recommendation Using Hierarchical Attention Mechanism. Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2021: 295-309.

[13] Zhang Zheng, Song Wei, Shen Yuan. A Reasonable Data Pricing Mechanism for Personal Data Transactions with Privacy Concern. Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2021: 64-71.

[14] Zhang Juntao, Lin Nanzhou, Zhang Xuelong, Yang Xiandi, Song Wei, Peng Zhiyongl. Learning Concept Prerequisite Relations from Educational Data via Multi-Head Attention Variational Graph Auto-Encoders. Proceedings of the 15th ACM International Conference on Web Search and Data Mining.(Accepted)

[15] Shan Tian, Songsong Mo, Liwei Wang, Zhiyong Peng. Deep reinforcement learning-based approach to tackle topic-aware influence maximization[J]. Data Science and Engineering, 2020, 5(1): 1-11.

[16] Songyong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng. FASTS: A satisfaction-boosting bus scheduling assistant[J]. Proceedings of the VLDB Endowment 2020, 13(12): 2873-2876

[17] Ping Zhang, Zhifeng Bao, Yuchen Li, Guoliang Li, Yipeng Zhang, Zhiyong Peng Towards an Optimal Outdoor Advertising Placement: When a Budget Constraint Meets Moving Trajectories[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2020, 14(5): 1-32.

[18] Juntao Zhang, Biao Li, Wei Song, Nanzhou Lin, Xiandi Yang, Zhiyong Peng. Learning Ability Community for Personalized Knowledge Tracing[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2020: 176-192.

[19] Songsong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng. Bus Frequency Optimization: When Waiting Time Matters in User Satisfaction[J]. International Conference on Database Systems for Advanced Applications (DASFAA), 2020: 192-208

[20] Fan Wu, Juntao Zhang, Yuling Shi, Xiandi Yang, Wei Song, Zhiyong Peng. Predicting MOOCs Dropout with a Deep Model[C]//International Conference on Web Information Systems Engineering(WISE). Springer, Cham, 2020: 488-502.

[21] Yicheng Ding, Wei Song, Yuan Shen, Yan Sun, Enabling Efficient Multi-Keyword Search over Fine-grained Authorized Healthcare Blockchain System[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2020:27-41

[22] Qianwen Luo, Chen Chen, Song Wang, Rongrong Li, Yuwei Peng, Tool Data Modeling Method Based on an Object Deputy Model[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2020: 491-499.

[23] Hai Lan, Zhifeng Bao, Yuwei Peng, An Index Advisor Using Deep Reinforcement Learning[C]//Conference on Information and Knowledge Management, 2020:2105-2108.

[24] Fei Wang, Tieyun Qian, Bin Liu, Zhiyong Peng. Patent expanded retrieval via word embedding under composite-domain perspectives[J]. Frontiers of Computer Science, 2019, 13(5): 1048-1061.

[25] Ping Zhang, Zhifeng Bao, Yudong Niu, Yipeng Zhang, Songsong Mo, Fei Geng, Zhiyong Peng, Proactive rumor control in online networks[J]. World Wide Web-Internet and Web Information Systems, 2019, 22(4):1799-1818.

[26] Wei Song, Chengliang Shi, Yuan Shen, Zhiyong Peng. Select the Best for Me: Privacy-Preserving Polynomial Evaluation Algorithm over Road Network[M]// Complexity in Polish Phonotactics. 2019:281-297.

[27] Shan Tian, Ping Zhang, Songsong Mo, Liwei Wang, Zhiyong Peng. A Learning Approach for Topic-Aware Influence Maximization[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2019: 125-140.

[28] Songsong Mo, Shan Tian, Liwei Wang, Zhiyong Peng. Minimizing the spread of rumor within budget constraint in online network[C]//National Conference of Theoretical Computer Science. Springer, Singapore, 2019: 131-149.

[29] Yu Wu, Nanzhou Lin, Wei Song, Shen Yuan, Xiandi Yang, Juntao Zhang, Yan Sun. Adaptive Authorization Access Method for Medical Cloud Data Based on Attribute Encryption[C]//International Conference on Web Information Systems and Applications. Springer, Cham, 2019: 361-367.

[30] Chaoqun Yang, Yuanyuan Zhu, Ming Zhong, Rongrong Li. Semantic Similarity Computation in Knowledge Graphs: Comparisons and Improvements[C]//International Conference on Data Engineering Workshops (ICDEW), 2019: 249-252.

[31] Ping Zhang, Zhifeng Bao, Yuchen Li, Guoliang Li, Yipeng Zhang, Zhiyong Peng. Trajectory-driven Influential Billboard Placement[C]// International Conference on Knowledge Discovery & Data Mining(ACM SIGKDD), 2018:2748-2757.

[32] Yuwei Peng, Hai Lan, Mingliang Yue, Yu Xue. Multipurpose watermarking for vector map protection and authentication[J]. Multimedia Tools and Applications, 2018,77:7239–7259.

[33] Yuling Shi, Zhiyong Peng, Liang Hong, Qian Yu. SoC-constrained Team Formation with Self-Organizing mechanism in Social Networks[J]. Knowledge-Based Systems, 2017, 138:1-14

[34] Yuling Shi, Zhiyong Peng, Hongning Wang. Modeling Student Learning Styles in MOOCs[C]//ACM on Conference on Information and Knowledge Management, 2017:979-988.

[35] Liang Wang, Liwei Wang, Zhiyong Peng. Probabilistic object deputy model for uncertain data and lineage management[J]. Data & Knowledge Engineering, 2017,109:70-84.

[36] Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou. Tell me the truth: Practically public authentication for outsourced databases with multi-user modification[J]. Information Sciences, 2017,387:221-237.

[37] Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou, Yihui Cui. A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications[J]. Journal of Parallel and Distributed Computing, 2017, 99:14-27.

[38] Wei Song, Bing Wang, Qian Wang, Chengliang Shi, Wenjing Lou, Zhiyong Peng. Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources[J]. IEEE Transactions on Information Forensics & Security, 2017,12(10):2334-2347.

[39] Bing Wang , Wei Song, Wenjing Lou , Y. Thomas Hou. Privacy-preserving pattern matching over encrypted genetic data in cloud computing[C]// IEEE Conference on Computer Communications(IEEE INFOCOM), 2017:1-9.

[40] Hai Lan, Yuwei Peng. Reversible fragile watermarking for fine-grained tamper localization in spatial data[C]//Australasian Database Conference. Springer, Cham, 2017: 233-247.

[41] Tieyun Qian, Bin Liu, Chen Li, Zhiyong Peng. Tri-Training for authorship attribution with limited training data: a comprehensive study[J]. Neurocomputing, 2016, 171: 798-806.

[42] Song Wang, Hao Huang , Yunjun Gao, Tieyun Qian, Liang Hong, Zhiyong Peng. Fast rare category detection using nearest centroid neighborhood[C]//Asia-Pacific Web Conference. Springer, Cham, 2016: 383-394

[43] Xiaoying Wu , Theodoratos D, Zhiyong Peng . Efficiently mining homomorphic patterns from large data trees[C]//International Conference on Database Systems for Advanced Applications. Springer, Cham, 2016: 180-196.

[44] Wei Song, Zou Hua, Haowen Liu, Chen Jun. A practical group key management algorithm for cloud data sharing with dynamic group[J]. China Communications, 2016, 13(6):205-216.

[45] Liang Wang , Liwei Wang, Zhiyong Peng. Probabilistic object deputy model for uncertain data and lineage management[J]. Data & Knowledge Engineering, 2017, 109: 70-84.

[46] Liang Wang, Liwei Wang, Zhiyong Peng. A Working Model for Uncertain Data with Lineage[C]//International Conference on Conceptual Modeling. Springer, Cham, 2015: 369-383.

[47] Xia Wu, Yuanyuan Zhu, Shengchao Xiong, Yuwei Peng, Zhiyong Peng. A new similarity measure between semantic trajectories based on road networks[C]//Asia-Pacific Web Conference. Springer, Cham, 2015: 522-535.

[48] Yuwei Peng, Mingliang Yue. A Zero-Watermarking Scheme for Vector Map Based on Feature Vertex Distance Ratio[J]. Journal of Electrical & Computer Engineering, 2015, 2015:35.

[49] Zhiyong Peng, Mingliang Yue, Xia Wu, Yuwei Peng. Blind watermarking scheme for polylines in vector geo-spatial data[J]. Multimedia Tools and Applications, 2015,74(24):11721-11739.

[50] Wei Song , Zhiyong Peng , Qian Wang, Fanquan Cheng. Efficient privacy‐preserved data query over ciphertext in cloud computing[J]. Security & Communication Networks, 2014, 7(6):1049-1065.

[51] Ge Xie , Zhiyong Peng , Wei Song . Query Authentication over Cloud Data from Multiple Contributors[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 469-477.

[52] Qian Yu, Zhiyong Peng, Liang Hong, Bin Liu, Haiping Peng. Novel community recommendation based on a user-community total relation[C]//International Conference on Database Systems for Advanced Applications. Springer, Cham, 2014: 281-295.

[53] Mingliang Yue, Zhiyong Peng, Kai Zheng, Yuwei Peng. Rights protection for trajectory streams[C]//International Conference on Database Systems for Advanced Applications. Springer, Cham, 2014: 407-421.

[54] Ling Feng, Zhiyong Peng, Bin Liu, Dunren Che. Finding Novel Patents Based on Patent Association[C]//International Conference on Web-Age Information Management. Springer, Cham, 2014: 5-17.

[55] Fangquan Cheng, Qian Wang, Qianwen Zhang, Zhiyong Peng. Highly efficient indexing for privacy-preserving multi-keyword query over encrypted cloud data[C]//International Conference on Web-Age Information Management. Springer, Cham, 2014: 348-359.

[56] Qian Wang, Meiqi He, Wei Song, Yun Rui. Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective[J]. Science China Information Sciences, 2014, 57(4): 1-14.

[57] Wenfeng Li, Liwei Wang, Zhiyong Peng, Deyi Li. A Sampling Method of Finding Top-k Frequent Items on Timestamp-Based Stream[C]//2014 11th Web Information System and Application Conference. IEEE, 2014: 221-226.

[58] Jia Zhu, Yi Yang, Qing Xie, Liwei Wang. Saeed-Ul Hassan. Robust hybrid name disambiguation framework for large databases[J]. Scientometrics, 2014, 98(3): 2255-2274.

[59] Mingliang Yue, Zhiyong Peng, Yuwei Peng. A fragile watermarking scheme for modification type characterization in 2d vector maps[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 129-140.

[60] Tieyun Qian , Qing Li, Jaideep Srivastava, Zhiyong Peng, Yang Yang , Shuo Wang. Exploiting small world property for network clustering[J]. World Wide Web-internet & Web Information Systems, 2014, 17(3):405-425.

[61] Yihui Cui , Zhiyong Peng , Wei Song , Xiaojuan Li, Fangquan Cheng, LuXiao Ding. A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 117-128.

[62] Dacheng Liu, Zhiyong Peng, Bin Liu, Xu Chen, Yuqi Guo. A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 117-128.

[63] Junyan Jiang, Zhiyong Peng, Xiaoying Wu, Nan Liang. Sharing-Aware Scheduling of Web Services[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 153-164.

[64] Bin Fu , Wenfeng Li , Zhiyong Peng . Sublinear Time Approximate Sum via Uniform Random Sampling[C]//International Computing and Combinatorics Conference. Springer, Berlin, Heidelberg, 2013: 713-720.

[65] Chuanjian Wang, Zhiyong Peng, Yuwei Peng, Liang Yu, Junzhou Wang, Qingzhan Zhao. Watermarking geographical data on spatial topological relations[J]. Multimedia Tools & Applications, 2012, 57(1):67-89.

[66] Xu Chen , Zhiyong Peng , Cheng Zeng . A co-training based method for Chinese patent semantic annotation[C]//Proceedings of the 21st ACM international conference on Information and knowledge management. 2012: 2379-2382.

[67] Dawen Jia, Cheng Zeng, Wenhui Nie, Zhihao Li, Zhiyong Peng. A new approach for date sharing and recommendation in social web[C]//International Conference on Database and Expert Systems Applications. Springer, Berlin, Heidelberg, 2012: 314-328.

[68] Liwei Wang, Koehler H, Ke Deng, Xiaofang Zhou. Flexible Provenance Tracing[J]. International Journal of Systems & Service Oriented Engineering, 2011, 2(2):1-20.

[69] Zhixu Li, Sitbon L, Liwei Wang, Xiaofang Zhou. Aml: Efficient approximate membership localization within a web-based join framework[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 25(2): 298-310.

[70] Liang Wang, Liwei Wang, Zufa Fu, Zeqian Huang, Zhiyong Peng. Sorting of Search Results Based on Data Quality[C]//Web Information Systems and Applications Conference. 2011: 119-124.

[71] Jia Zhu , Gabriel Fung , Liwei Wang. Efficient name disambiguation in digital libraries[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2011: 430-441.

[72] Yuwei Peng, Hefei Ge, Mao Ding, Zeqian Huang, Chuanjian Wang. Index structure for cross-class query in object deputy database[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2011: 493-504.

[73] Rongrong Li, Weixiang Zhai, Zhiyong Peng. Supporting query over dynamic combination of data sources for social media[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2011: 185-196.

[74] Zhiyong Peng , Hui Wang , Yuwei Peng , Bo Xu. A three layer system architecture for web-based unstructured data management[C]//International Asia-Pacific Web Conference, IEEE, 2010: 447-450.

[75] Xiaozhu Liu , Zhiyong Peng . An efficient random access inverted index for information retrieval[C]//International conference on World wide web. 2010: 1153-1154.

[76] Liwei Wang, Köehler H, Ke Deng, Xiaofang Zhou. Providing flexible tradeoff for provenance tracking[C]//International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2010: 226-240.

[77] Ke Deng, Liwei Wang, Xiaofang Zhou, Shazia Sadiq. Active duplicate detection[C]//International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg, 2010: 565-579.

[78] Zhixu Li, Laurianne Sitbon, Liwei Wang, Xiaofang Zhou , Xiaoyong Du. Approximate membership localization (AML) for web-based join[C]//ACM international conference on Information and knowledge management. 2010: 1321-1324.

[79] Tieyun Qian, Jaideep Srivastava, Zhiyong Peng, Phillip C. Y. Sheu. Simultaneously Finding Fundamental Articles and New Topics Using a Community Tracking Method //Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin, Heidelberg, 2009: 796-803.

[80] Liwei Wang, Zeqian Huang, Ming Luo. Supporting Dynamic Workflow Adaptation in a Dataflow-Constrained Workflow Net[C]//International Conference on New Trends in Information and Service Science. IEEE, 2009: 1000-1005.

[81] Xiandi Yang, Zhiyong Peng, Yuwei Peng. Personalized Information Integration by Object Deputy Model[C]//International Conference on Computer and Information Technology. IEEE, 2009, 1: 324-329.

[81] Xiang Zhou, Min Huang, Zhiyong Peng. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image[C]//ACM symposium on Applied computing. 2007: 254-258.

[82] Xiandi Yang, Ning He, Libing Wu, Junqiang Liu. Ontology based approach of semantic information integration[J]. Journal of Southeast University (English Edition), 2007, 23(3): 338-342.

[83] Junqiang Liu, Xiandi Yang. Deputy Mechanism for OLAP over Imprecise Data and Composite Measure[C]//International Conference on Computer and Information Technology (CIT 2007). IEEE, 2007: 65-70.

[84] Zhiyong Peng , Yuan Shi , Boxuan Zhai . Realization of Biological Data Management by Object Deputy Database System[M]//Transactions on Computational Systems Biology. Springer, Berlin, Heidelberg, 2006: 49-67.

[85] Zhe Shan, Yu Yang, Qing Li, Yi Luo, Zhiyong Peng. A light-weighted approach to workflow view implementation[C]//Asia-Pacific Web Conference. Springer, Berlin, Heidelberg, 2006: 1059-1070.

[86] Boxuan Zhai, Yuan Shi, Zhiyong Peng. Object Deputy Database Language [C]// International Conference on Creating, Connecting and Collaborating through Computing (C5'06). IEEE, 2006: 88-95.

[87] Yuan Shi , Boxuan Zhai , Xiang Zhou , Zhiyong Peng. Object Identifier Reuse Mechanism for TOTEM[C]//International Conference on Data Engineering Workshops (ICDEW'06). IEEE, 2006: 127-127.

[88] Liwei Wang, Zhiyong Peng, Min Luo, Wenhao Ji, Zeqian Huang. A Scientific Workflow Framework Integrated with Object Deputy Model for Data Provenance[C]// International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2006: 569-580.

[89] Bin Liu, Baohua Cao, Bing Li, Deyi Li. Mining representative nodes in scale-free networks[J]. Dynamics of Continuous, Discrete and Impulsive Systems Series B: Applications and Algorithms, 2006, 13(3): 395.

[90] Xuhui Li , Zhiyong Peng , Jiaheng Cao. A practical approach to specifying and verifying mobile agent algorithms[J]. International Journal of Pervasive Computing and Communications, 2005, 1(2):115-122.

[91] Zhiyong Peng, Qing Li, Ling Feng, Xuhui Li, Junqang Liu. Using object deputy model to prepare data for data warehousing[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(9):1274-1288.

[92] Zhiyong Peng, Kai Huang, Shijun Li, Yi Luo. Integration of multiple heterogeneous databases in Smalltalk[C]//International Conference on Creating, Connecting and Collaborating through Computing (C5'05). IEEE, 2005: 108-115.

[93] Zhe Shan, Qing Li, Yi Luo, Zhiyong Peng. Deputy mechanism for workflow views[C]//International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg, 2005: 816-827.

[94] Yuwei Peng, Weiping Xie, Boxuan Zhai. A Personalized Electronic Map System Based on Object Deputy Model[C]//International Conference on Data Engineering Workshops (ICDEW'05). IEEE, 2005: 1252-1252.

[95] Cheng Zeng, Jiaheng Cao, Zhiyong Peng. A novel 3D video trajectory tracking method[C]// International Conference on Computer and Information Technology. IEEE, 2004: 221-226.

[96] Shijun Li , Zhiyong Peng , Mengchi Liu. Extraction and integration information in HTML tables[C]// International Conference on Computer and Information Technology. IEEE, 2004: 315-320.

[97] Min Huang, Jiaheng Cao, Zhiyong Peng. A new watermark mechanism for relational data[C]// International Conference on Computer and Information Technology. IEEE, 2004:  946-950.

[98] Liwei Wang , Zhiyong Peng. Extension of multi-version concurrency control mechanisms for long-duration transaction based on nested transaction model[C]// International Conference on Computer and Information Technology. IEEE, 2004:963-968.

[99] Shijun Li, Mengchi Liu, Guoren Wang, Zhiyong Peng. Capturing Semantic Hierarchies to Perform Meaningful Integration in HTML Tables[C]//Asia-Pacific Web Conference. Springer, Berlin, Heidelberg, 2004: 899-902.

[100] Juan Ye, Zhiyong Peng. A Squeak-based educational software-Happy Learning[C]// International Conference on Creating, Connecting and Collaborating through Computing. IEEE, 2004: 138-145.

[101] Zhe Shan, Zhiyi Long, Yi Luo, Zhiyong Peng. Object-Oriented Realization of Workflow Views for Web Services–An Object Deputy Model Based Approach[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2004: 468-477.

[102] Shijun Li , Mengchi Liu , Ling T W , Zhiyong Peng. Automatic HTML to XML conversion[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2004: 714-719.

[103] Shijun Li, Mengchi Liu , Zhiyong Peng . Wrapping HTML tables into XML[C]//International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2004: 147-152.

[104] Yi Luo, Zhiyong Peng, Zhe Shan, Qing Li. Semantics based conformance assessment of ebXML business processes[C]//International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2004: 590-595.

[105] Zhiyong Peng, Kai Huang, Juan Ye. Development of smalltalk in China[C]//Conference on Creating, Connecting and Collaborating Through Computing, IEEE, 2003: 52-59.

[106] Jihong Guan, Shuigeng Zhou, Junpeng Chen, Zhiyong Peng. MAG2DL: A framework for information retrieval and integration of distributed Geographic Digital Libraries[C]//International Conference on Asian Digital Libraries. Springer, Berlin, Heidelberg, 2003: 351-364.

[107] Zhiyong Peng, Yahiko Kambaya, Resolving conflicts and handling replication during integration of multiple databases by object deputy model[C]//International Conference on Conceptual Modeling. Springer, Berlin, Heidelberg, 2001: 285-298.

[108] Zukai Tang, Zhiyong Peng, Yi Ren: Using Object Deputy Model for Aspect Oriented Programming[C]//International Conference on Creating, Connecting and Collaborating through Computing (C5'07). IEEE, 2007: 170-177.

[109] Min Huang, Xiang Zhou, Jiaheng Cao, Zhiyong Peng. Geo-WDBMS: An Improved DBMS with the Function of Watermarking Geographical Data[C]// International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg, 2007: 1098-1109.

[110] Zhiyong Peng, Yuwei Peng, Boxuan Zhai. Using object deputy database to realize multi-representation geographic information system[C]//Annual ACM international symposium on Advances in geographic information systems. 2007: 1-4.

中文论文:

[1]. 赖思超, 吴小莹 ,彭煜玮, 彭智勇. 数据库索引调优技术研究综述[J]. 计算机研究与发展


[2]. 张俊涛, 杨先娣, 宋伟, 张雪龙, 贺宇阳,彭智勇.在线教育环境中学习共同体研究综述[J/OL]. 软件学报:1-26 [2023-05-19].


[3]. 方焱志,黄煜坤,彭煜玮. 基于统计量特征的数据库指纹方法[J]. 软件学报, 2022, 33(9):3422-3436.


[5]. 王淞,彭煜玮,兰海,罗倩雯,彭智勇.数据集成方法发展与展望[J]. 软件学报, 2020, 000(003):893-908.


[6]. 胡聪睿,刘斌,冯岭,王飞,彭智勇. 对象代理数据库的双向指针存储优化方法[J]. 计算机学报, 2018, 41(8): 1752-1765.


[7]. 吴瑕,唐祖锴,祝园园,彭煜玮,彭智勇. 近似到达时间约束下的语义轨迹频繁模式挖掘[J]. 软件学报. 2018, 29(10): 3184-3204


[8]. 张平,王黎维,彭智勇,岳昆,黄浩. 一种面向团体的影响最大化方法[J]. 软件学报, 2017, 28(8):2161-2174


[9]. 崔一辉,宋伟,王占兵,史成良,程芳权. 一种基于格的隐私保护聚类数据挖掘方法[J]. 软件学报, 2017, 28(9):2293-2308


[10]. 江俊彦, 彭智勇, 吴小莹,彭承晨,王敏. 基于分层抽样的重叠深网数据源选择[J]. 软件学报, 2017, 28(5):1271-1295


[11]. 崔一辉, 宋伟, 王占兵, 史成良,程芳权. 一种基于格的隐私保护聚类数据挖掘方法[J]. 软件学报, 2017, 28(009):2293-2308.


[12]. 刘斌, 冯岭, 王飞, 彭智勇. 支持技术创新的专利检索与分析[J]. 通信学报, 2016, 37(3): 79-89. 


[13]. 余骞, 彭智勇, 洪亮, 万言历. 基于用户邻域和主题的新颖性Web社区推荐方法[J]. 软件学报, 2016(5):1266-1284.


[14]. 王淞,黄浩,余果,梁楠,王黎维,孙月明. 一种基于 k 近邻图的稀有类检测算法[J]. 软件学报, 2016 (9): 2320-2331.


[15]. 冯岭,彭智勇,刘斌,车敦仁. 一种基于潜在引用网络的专利价值评估方法[J]. 计算机研究与发展, 2015, 52(3): 649.


[16]. 宋伟、彭智勇、王骞、李瑞轩、程芳权、崔一辉.Mimir:一种基于密文的全文检索服务系统[J],计算机学报,2014,37(5):1170-1183.


[17]. 王梁,周光焱,王黎维,彭智勇. 不确定关系数据属性级溯源表示与概率计算[J]. 软件学报, 2014, 4: 863-879.


[18]. 程芳权,彭智勇,宋伟,王书林,崔一辉.可信云存储环境下支持访问控制的密钥管理[J],计算机研究与发展,2013, 50(8):1613-1627.


[19]. 王黎维,付祖发,刘东明,王梁,李佳瑾,彭智勇. 生物实验信息管理系统[J]. 计算机研究与发展, 2013 (S1): 410-415.


[20]. 李文凤, 彭智勇, 李德毅. 不确定性Top-K查询处理[J]. 软件学报, 2012, 23(006):1542-1560.


[21]. 贾大文,曾承, 彭智勇,成鹏,阳志敏, 卢舟. 一种基于用户偏好自动分类的社会媒体共享和推荐方法[J].计算机学报,2012.11:2381—2391.


[22]. 程芳权,彭智勇,宋伟,王书林,崔一辉.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报, 2012,35(11):2215-2227


[23]. 汪传建,葛贺飞,丁卯,彭智勇,彭煜玮,宋伟,王俊舟. 一种基于可变步长量化调制的地理数据库水印方法[J]. 计算机研究与发展. 2011, 48(10): 1960-1971.


[24]. 程芳权,宋伟,任毅,江小华,黄小婷,陈立,彭智勇. 可信Web电子邮件服务系统[J]. 计算机研究与发展, 2011, 048(0z2):792-798.


[25]. 宋伟,彭智勇,程芳权,李文海,胡文斌,任毅. 可信数据库环境下面向服务的自适应密文数据查询方法[J]. 计算机学报, 2010, 33(8): 1324-1338.


[26]. 黄泽谦,彭智勇,李越,彭煜玮. 一种支持对象代理数据库高效查询处理的索引结构[J]. 计算机学报. 2010, 33(8): 1446-1459.


[27]. 陈旭,黄泽谦,彭煜玮,曾承,彭智勇.网上专利个性化管理与服务系统[J]. 计算机研究与发展. 2010, 47(z1): 489-493.


[28]. 刘小珠, 彭智勇. 全文索引技术时空效率分析[J]. 软件学报, 2009, 20(007):1768-1784.


[29]. 王黎维, 黄泽谦, 罗敏, 彭智勇. 集成对象代理数据库的科学工作流服务框架中的数据跟踪[J]. 计算机学报, 2008, 31(5): 721-732.


[30]. 宋伟,李瑞轩,卢正鼎,於光灿. 一种支持多维资源描述的高效 P2P 路由算法[J]. 软件学报, 2007, 18(11): 2851-2862.


[31]. 黄敏,韩南,周祥,彭煜玮,曹加恒,彭智勇. 2006. 一种带有纠错机制的数据库水印技术[J]. 计算机研究与发展. 2006, 43(z3): 276-283


[32]. 彭智勇,罗义,单喆,李青. 基于对象代理模型的工作流视图实现[J]. 计算机学报, 2005(04):222-231.