


default search action
Min Peng 0001
- > Home > Persons > Min Peng 0001
Publications
- 2025
- [j21]Wenbo Xiao, Chenchen Xu, Min Peng, Caihong Kai, Tian Chen:
X-CLNN: A Hybrid Neural Network-Based Approach Combining CNN and RNN for Communication Services Classification. J. Netw. Syst. Manag. 33(3): 61 (2025) - 2024
- [j20]Min Peng
, Xianxin Fu, Haiyang Zhao
, Yu Wang, Caihong Kai:
LiKey: Location-independent keystroke recognition on numeric keypads using WiFi signal. Comput. Networks 245: 110354 (2024) - 2023
- [j18]Yuanguang Wu, Lusheng Wang, Caihong Kai, Min Peng:
Dynamics-Based Location Prediction and Neural Network Fine-Tuning for Task Offloading in Vehicular Networks. KSII Trans. Internet Inf. Syst. 17(12): 3416-3435 (2023) - [j17]Dawen Zheng
, Lusheng Wang
, Caihong Kai
, Min Peng
:
Resource Optimization for Task Offloading With Real-Time Location Prediction in Pedestrian-Vehicle Interaction Scenarios. IEEE Trans. Wirel. Commun. 22(11): 7331-7344 (2023) - [j16]Min Peng
, Qiqi Yin, Kai Zhang, Caihong Kai:
Adaptive multi-user uplink resource allocation based on access delay analysis in IEEE 802.11ax. Wirel. Networks 29(3): 1223-1235 (2023) - 2022
- [j15]Caihong Kai
, Shifeng Xiao
, Yibo Yi
, Min Peng
, Wei Huang
:
Dependency-Aware Parallel Offloading and Computation in MEC-Enabled Networks. IEEE Commun. Lett. 26(4): 853-857 (2022) - 2021
- [j14]Junxiang Gou
, Lusheng Wang
, Hai Lin
, Min Peng
, Caihong Kai
:
A Fast Terminal Matching Method for Interference Coordination Based on Wavelet Transform and Graph Theory in Ultra-Dense Multi-Cell Scenarios. IEEE Access 9: 150649-150662 (2021) - [j13]Caihong Kai
, Yibo Yi
, Min Peng
, Wei Huang
:
An Amplify-and-Forward Full-Duplex Cooperative Relay Scheme for Low-Latency Downlink Transmission in CRAN. IEEE Commun. Lett. 25(4): 1259-1263 (2021) - [j12]Caihong Kai
, Yan Wu, Min Peng
, Wei Huang
:
Joint Uplink and Downlink Resource Allocation for NOMA-Enabled D2D Communications. IEEE Wirel. Commun. Lett. 10(6): 1247-1251 (2021) - 2020
- [j10]Min Peng
, Caihong Kai, Lusheng Wang:
Constrained channel bonding based on maximum achievable throughput in WLANs. Wirel. Networks 26(6): 4375-4388 (2020) - 2019
- [j9]Min Peng
, Guoyin He, Lusheng Wang, Caihong Kai
:
AP Selection Scheme Based on Achievable Throughputs in SDN-Enabled WLANs. IEEE Access 7: 4763-4772 (2019) - [j8]Min Peng
, Caihong Kai
, Xusheng Cheng, Qing F. Zhou
:
Network Planning Based on Interference Alignment in Density WLANs. IEEE Access 7: 70525-70534 (2019) - [c10]Min Peng
, Zhou Zhang, Caihong Kai, Lusheng Wang:
Wi-Fi Fingerprint Database Construction Algorithm based on Regional Environment Parameters. SSPS 2019: 51-55 - 2018
- [c9]Caihong Kai, Lei Xu
, Jiaojiao Zhang, Min Peng:
Joint Uplink and Downlink Resource Allocation for D2D Communication Underlying Cellular Networks. WCSP 2018: 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-28 00:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint