代表性学术成果
2020
1. Peng, T.; Yang, X.*; Xu, Z.; Liang, Y. Constructing an Environmental Friendly Low-Carbon-Emission Intelligent Transportation System Based on Big Data and Machine Learning Methods, Sustainability, 2020, 12, 8118, SCI IF 2.576
2. Tu Peng; Shuliang Wang; Jing Geng;Qinsi Wang;Yun Yang; Kang Zhang, Verification of the Instantiation and Integration of Security Patterns, Journal of Web Engineering, 2020 vol 19, issue 3-4. SCI IF 0.396
3. Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu and Tu Peng, An Efficient Privacy-Aware Authentication Scheme with Hierarchical Access Control for Mobile Cloud Computing Services, IEEE Transactions on Cloud Computing, 2020.9. SCI IF 4.714
2019
4. Ling Xiong, Fagen Li, Shengke Zeng, Tu Peng and Zhicai Liu, A Blockchain-Based Privacy-Awareness Authentication Scheme with Efficient Revocation for Multi-Server Architectures, IEEE Access, 2019, 7(1) SCI IF 3.745 引用数 6
2018
5. Zhi-cai Liu, Ling Xiong, Tu Peng, Dai-Yuan Peng, Hong-Bin Liang, A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks, IEEE Access, Volume 6, Page 26307 – 26317, 2018 引用数12
2011-2016
6. Jing Dong, Tu Peng*, Yajing Zhao, Automated Verification of Security Pattern Compositions, Information and Software Technology (IST), Elsevier-Science, Volume 53, Issue 3, Pages 274-295, March 2010. (SCI 中科院2区)
7. Jing Dong, Tu Peng* and Yajing Zhao, On Instantiation and Integration Commutability of Design Pattern, the Computer Journal, Oxford University Press. Volume 54, Issue 1,Pages 164-184, January 2011. (SCI 中科院3区)
8. Dong J., Zhao Y., Peng T., A REVIEW OF DESIGN PATTERN MINING TECHNIQUES[J]. International Journal of Software Engineering and Knowledge Engineering, 2011, 19(6):823-855.(引用数66)