default search action
Kun Peng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Kun Peng, Yufeng Chen, Carla Seatzu, Zhiwu Li, Alessandro Giua:
Concealability Analysis for Current-State Opacity Enforcement via Editing Functions. IEEE Trans. Autom. Control. 69(10): 7231-7238 (2024) - [j29]Shanke Li, Kun Peng, Fei Hui, Ziqi Li, Cheng Wei, Wenbo Wang:
A Decision-Making Approach for Complex Unsignalized Intersection by Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 73(11): 16134-16147 (2024) - [c80]Kun Peng, Lei Jiang, Qian Li, Haoran Li, Xiaoyan Yu, Li Sun, Shuo Sun, Yanxian Bi, Hao Peng:
Table-Filling via Mean Teacher for Cross-domain Aspect Sentiment Triplet Extraction. CIKM 2024: 1888-1898 - [c79]Shuo Wang, Chaodong Tong, Kun Peng, Lei Jiang:
Local Attention Augmentation for Chinese Spelling Correction. ICCS (3) 2024: 438-452 - [c78]Kun Peng, Lei Jiang, Hao Peng, Rui Liu, Zhengtao Yu, Jiaqian Ren, Zhifeng Hao, Philip S. Yu:
Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction. SDM 2024: 145-153 - [i4]Kun Peng, Lei Jiang, Qian Li, Haoran Li, Xiaoyan Yu, Li Sun, Shuo Sun, Yanxian Bi, Hao Peng:
Table-Filling via Mean Teacher for Cross-domain Aspect Sentiment Triplet Extraction. CoRR abs/2407.21052 (2024) - 2023
- [j28]Kun Peng, Yu Zheng, Yuewei Qiu, Qingrui Li:
Rage of righteousness: Anger's role in promoting debunking effects during the COVID-19 pandemic. Comput. Hum. Behav. 148: 107896 (2023) - [j27]Licheng Zhang, Kun Peng, Xiangmo Zhao, Asad J. Khattak:
New fuel consumption model considering vehicular speed, acceleration, and jerk. J. Intell. Transp. Syst. 27(2): 174-186 (2023) - [c77]Kun Peng:
How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. AsiaCCS 2023: 539-551 - [c76]Kun Peng:
Receipt-Freeness By Flexible Usage Of Mix Network. AsiaJCIS 2023: 9-16 - [c75]Kun Peng:
Research on constructing digital teaching technology of knowledge graph with three dimensional fusion characteristics. ICIEAI 2023: 550-556 - [c74]Kun Peng, Qun Hou, Xin Liu:
Modified Vehicle Recognition Method Based on Attribute Fusion and Fuzzy Product Quantization. ICITE 2023: 113-119 - [c73]Cheng Wei, Fei Hui, Kenan Mu, Kun Peng, Shanke Li:
A Neural Network-Based Model with Conditional-Deactivation Structure for Autonomous Vehicle Motivation Prediction at Intersections. PCCNT 2023: 16:1-16:10 - [i3]Kun Peng, Lei Jiang, Hao Peng, Rui Liu, Zhengtao Yu, Jiaqian Ren, Zhifeng Hao, Philip S. Yu:
Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction. CoRR abs/2312.11152 (2023) - 2022
- [j26]Kun Peng, Pengjian Shang:
Characterizing ordinal network of time series based on complexity-entropy curve. Pattern Recognit. 124: 108464 (2022) - [c72]Kun Peng, Nannan Sun, Jiahao Cao, Rui Liu, Jiaqian Ren, Lei Jiang:
Prompt as a Knowledge Probe for Chinese Spelling Check. KSEM (3) 2022: 516-527 - [c71]Kun Peng:
Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application. PST 2022: 1-8 - [c70]Kun Peng:
Brief Announcement: Secure and Efficient Participant Authentication - Application to Mobile E-Voting. SSS 2022: 364-369 - 2021
- [j25]Aiguo Chen, Kun Peng, Zexin Sha, Xincen Zhou, Zhen Yang, Guoming Lu:
ToAM: a task-oriented authentication model for UAVs based on blockchain. EURASIP J. Wirel. Commun. Netw. 2021(1): 166 (2021) - [c69]Kun Peng:
Perfect ZK Argument of Knowledge of Discrete Logarithm in A Cyclic Group with Unknown Order. APKC@AsiaCCS 2021: 33-40 - 2020
- [j24]Kun Peng:
To be attractive or to be authentic? How two competing motivations influence self-presentation in online dating. Internet Res. 30(4): 1143-1165 (2020) - [c68]Kun Peng:
Brief Announcements: Verifiable Data Sharing in Distributed Computing. SSS 2020: 205-210 - [c67]Kun Peng:
Paid and Anonymous Usage of Cloud Software. WISA 2020: 308-320
2010 – 2019
- 2019
- [c66]Kun Peng, Yang Xu, Mingqian Sun:
Ultra-Low-Power CMOS Temperature Sensor for UHF RFID Systems. ASICON 2019: 1-4 - 2018
- [c65]Michael Madaio, Kun Peng, Amy Ogan, Justine Cassell:
A Climate of Support: A Process-Oriented Analysis of the Impact of Rapport on Peer Tutoring. ICLS 2018 - 2016
- [c64]Kun Peng, Qing Li, Min Zhang, Xiaoyue Kong, Youli Yuan:
Fiber optic perimeter detection based on human engineering. WOCC 2016: 1-4 - 2014
- [j23]Kun Peng:
Assumptions and conditions for mix networks: analysis, clarification and improvement. Int. J. Secur. Networks 9(3): 133-143 (2014) - [j22]Kun Peng:
Efficient homomorphic sealed-bid auction free of bid validity check and equality test. Secur. Commun. Networks 7(1): 64-76 (2014) - 2013
- [j21]Kun Peng:
Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. IET Inf. Secur. 7(1): 11-21 (2013) - [j20]Kun Peng:
A shuffle to achieve high efficiency through pre-computation and batch verification. Int. J. Inf. Sec. 12(4): 337-345 (2013) - [j19]Kun Peng:
A Secure Network for Mobile Wireless Service. J. Inf. Process. Syst. 9(2): 247-258 (2013) - [j18]Xianghua Ying, Kun Peng, Yongbo Hou, Sheng Guan, Jing Kong, Hongbin Zha:
Self-Calibration of Catadioptric Camera with Two Planar Mirrors from Silhouettes. IEEE Trans. Pattern Anal. Mach. Intell. 35(5): 1206-1220 (2013) - [c63]Kun Peng:
Modification and Optimisation of an ElGamal-Based PVSS Scheme. AFRICACRYPT 2013: 311-327 - [c62]Kun Peng, Li Yi:
Studying a Range Proof Technique - Exception and Optimisation. AFRICACRYPT 2013: 328-341 - [c61]Kun Peng, Matt Henricksen:
Multiplicative Homomorphic E-Auction with Formally Provable Security. WISTP 2013: 1-17 - 2012
- [j17]Andrew Maimone, Jonathan Bidwell, Kun Peng, Henry Fuchs:
Enhanced personal autostereoscopic telepresence system using commodity depth cameras. Comput. Graph. 36(7): 791-807 (2012) - [j16]Kun Peng:
Attack against a batch zero-knowledge proof system. IET Inf. Secur. 6(1): 1-5 (2012) - [j15]Kun Peng:
Critical survey of existing publicly verifiable secret sharing schemes. IET Inf. Secur. 6(4): 249-257 (2012) - [j14]Kun Peng:
Threshold distributed access control with public verification: a practical application of PVSS. Int. J. Inf. Sec. 11(1): 23-31 (2012) - [j13]Kun Peng:
How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks. Int. J. Secur. Networks 7(3): 133-147 (2012) - [j12]Kun Peng:
Attack and Correction: How to Design a Secure and Efficient Mix Network. J. Inf. Process. Syst. 8(1): 175 (2012) - [j11]Kun Peng:
Efficient and General PVSS Based on ElGamal Encryption. J. Inf. Process. Syst. 8(2): 375 (2012) - [j10]Bo Li, Kun Peng, Xianghua Ying, Hongbin Zha:
Vanishing point detection using cascaded 1D Hough Transform from single images. Pattern Recognit. Lett. 33(1): 1-8 (2012) - [c60]Kun Peng, Matt Henricksen:
How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. ACISP 2012: 223-234 - [c59]Kun Peng:
A Secure and Efficient Mix Network Especially Suitable for E-Voting. ICDKE 2012: 161-174 - [c58]Kun Peng, Yuexin Zhang:
A Secure Mix Network with an Efficient Validity Verification Mechanism. IDCS 2012: 85-96 - 2011
- [j9]Kun Peng, Ed Dawson, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. Int. J. Inf. Sec. 10(1): 33-47 (2011) - [j8]Kun Peng:
A general and efficient countermeasure to relation attacks in mix-based e-voting. Int. J. Inf. Sec. 10(1): 49-60 (2011) - [j7]Kun Peng:
Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting. J. Inf. Process. Syst. 7(3): 549-560 (2011) - [j6]Kun Peng:
Efficient VSS free of computational assumption. J. Parallel Distributed Comput. 71(12): 1592-1597 (2011) - [j5]Kun Peng:
An efficient shuffling based eVoting scheme. J. Syst. Softw. 84(6): 906-922 (2011) - [c57]Kun Peng:
Survey, analysis and re-evaluation - How efficient and secure a mix network can be. CIT 2011: 249-254 - [c56]Kun Peng:
Impracticality of Efficient PVSS in Real Life Security Standard (Poster). ACISP 2011: 451-455 - [c55]Kun Peng, Feng Bao:
Analysing a Batch Range Proof to Address a Security Concern. CSE 2011: 68-72 - [c54]Kun Peng:
A General, Flexible and Efficient Proof of Inclusion and Exclusion. CT-RSA 2011: 33-48 - [c53]Kun Peng:
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification. DBSec 2011: 217-230 - [c52]Kun Peng:
A Secure and Efficient Proof of Integer in an Interval Range. IMACC 2011: 97-111 - [c51]Kun Peng:
A General, Flexible and Efficient Proof of Inclusion and Exclusion. INTRUST 2011: 168-183 - [c50]Kun Peng:
Investigation and Survey of Secret Sharing in Verifiable Distributed Systems. PDCAT 2011: 342-347 - [c49]Kun Peng:
Secure E-Commerce Based on Distributed Processing. PDCAT 2011: 406-411 - [c48]Kun Peng:
Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network. WISTP 2011: 351-360 - [i2]Kun Peng:
Failure of A Mix Network. CoRR abs/1101.5449 (2011) - 2010
- [c47]Kun Peng, Feng Bao:
Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. CIT 2010: 1044-1049 - [c46]Kun Peng, Feng Bao:
Batch Range Proof for Practical Small Ranges. AFRICACRYPT 2010: 114-130 - [c45]Xianghua Ying, Kun Peng, Ren Ren, Hongbin Zha:
Geometric properties of multiple reflections in catadioptric camera with two planar mirrors. CVPR 2010: 1126-1132 - [c44]Kun Peng, Feng Bao:
A Secure RFID Ticket System for Public Transport. DBSec 2010: 350-357 - [c43]Kun Peng, Lulu Hou, Ren Ren, Xianghua Ying, Hongbin Zha:
Single View Metrology Along Orthogonal Directions. ICPR 2010: 1658-1661 - [c42]Bo Li, Kun Peng, Xianghua Ying, Hongbin Zha:
Simultaneous Vanishing Point Detection and Camera Calibration from Single Images. ISVC (2) 2010: 151-160 - [c41]Kun Peng, Feng Bao:
Efficient Multiplicative Homomorphic E-Voting. ISC 2010: 381-393 - [c40]Kun Peng, Feng Bao:
Efficient Proof of Validity of Votes in Homomorphic E-Voting. NSS 2010: 17-23 - [c39]Kun Peng, Feng Bao:
Formal and Precise Analysis of Soundness of Several Shuffling Schemes. ProvSec 2010: 133-143 - [c38]Kun Peng, Feng Bao:
Vulnerability of a Non-membership Proof Scheme. SECRYPT 2010: 419-422 - [c37]Kun Peng, Feng Bao:
A Shuffling Scheme with Strict and Strong Security. SECURWARE 2010: 201-206 - [c36]Kun Peng, Feng Bao:
An Efficient Range Proof Scheme. SocialCom/PASSAT 2010: 826-833 - [c35]Kun Peng, Feng Bao:
Efficiency Improvement of Homomorphic E-Auction. TrustBus 2010: 238-249
2000 – 2009
- 2009
- [c34]Kun Peng, Feng Bao:
Practicalization of a Range Test and Its Application to E-Auction. EuroPKI 2009: 179-194 - [c33]Kun Peng:
A Hybrid E-Voting Scheme. ISPEC 2009: 195-206 - [c32]Xianghua Ying, Kun Peng, Hongbin Zha:
Walkthrough in large environments using concatenated panoramas. ROBIO 2009: 286-291 - [c31]Kun Peng, Feng Bao:
A Design of Secure Preferential E-Voting. VoteID 2009: 141-156 - [c30]Kun Peng, Feng Bao:
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. WISA 2009: 118-132 - 2008
- [j4]Kun Peng, Feng Bao, Ed Dawson:
Correct, Private, Flexible and Efficient Range Test. J. Res. Pract. Inf. Technol. 40(4): 275-289 (2008) - [c29]Kun Peng, Feng Bao:
Batch ZK Proof and Verification of OR Logic. Inscrypt 2008: 141-156 - [c28]Kun Peng, Feng Bao:
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Inscrypt 2008: 425-437 - [c27]Kun Peng, Feng Bao:
Efficient Vote Validity Check in Homomorphic Electronic Voting. ICISC 2008: 202-217 - 2007
- [j3]Kun Peng, Colin Boyd, Ed Dawson:
Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): 6 (2007) - [c26]Kun Peng, Ed Dawson:
A Range Test Secure in the Active Adversary Model. ACSW 2007: 159-162 - [c25]Kun Peng:
Secure Multiparty Computation of DNF. ICICS 2007: 254-268 - [c24]Kun Peng, Ed Dawson:
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ISPEC 2007: 209-224 - 2006
- [j2]Kun Peng, Colin Boyd, Ed Dawson:
Batch verification of validity of bids in homomorphic e-auction. Comput. Commun. 29(15): 2798-2805 (2006) - [c23]Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto:
A Novel Range Test. ACISP 2006: 247-258 - [c22]Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 - [c21]Kun Peng, Colin Boyd, Ed Dawson:
Sealed-Bid Micro Auctions. SEC 2006: 246-257 - [c20]Kun Peng, Liming Chen, Su Ruan:
A Smart Identification Card System Using Facial Biometric: From Architecture to Application. UIC 2006: 61-70 - 2005
- [c19]Ming Yao, Kun Peng, Ed Dawson:
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. ACISP 2005: 158-169 - [c18]Kun Peng, Liming Chen, Su Ruan:
A novel scheme of face verification using active appearance models. AVSS 2005: 247-252 - [c17]Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López:
A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 - [c16]Kun Peng, Colin Boyd, Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204 - [c15]Kun Peng, Liming Chen, Su Ruan, Georgy Kukharev:
A Robust and Efficient Algorithm for Eye Detection on Gray Intensity Face. ICAPR (2) 2005: 302-308 - [c14]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 - [c13]Kun Peng, Colin Boyd, Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388 - [c12]Kun Peng, Colin Boyd, Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98 - [i1]Kun Peng, Colin Boyd, Ed Dawson:
Batch Verification of Validity of Bids in Homomorphic E-auction. IACR Cryptol. ePrint Arch. 2005: 346 (2005) - 2004
- [c11]Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508 - [c10]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 - [c9]Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173 - [c8]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66 - [c7]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72 - [c6]Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454 - 2003
- [c5]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Five Sealed-bid Auction Models. ACSW 2003: 77-86 - [c4]Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256 - [c3]Ming Yao, Ernest Foo, Kun Peng, Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285 - 2002
- [c2]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159 - [c1]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420 - 2000
- [j1]Pengjun Pei, Guohua Cui, Kun Peng:
On a Session Key Compromise Problem in [KC95] protocol. ACM SIGOPS Oper. Syst. Rev. 34(3): 16-18 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint