Name
Affiliation
Papers
PENG LU
Chinese Academy of Sciences, China
43
Collaborators
Citations 
PageRank 
108
126
17.62
Referers 
Referees 
References 
371
407
197
Search Limit
100407
Title
Citations
PageRank
Year
Ensemble of fast learning stochastic gradient boosting00.342022
Domain-Aware SE Network for Sketch-based Image Retrieval with Multiplicative Euclidean Margin Softmax10.362021
The mutuality of social emotions: How the victim's reactive attitude influences the transgressor's emotional responses00.342021
Swarm intelligence, social force and multi-agent modeling of heroic altruism behaviors under collective risks00.342021
Air Data Sensor Fault Detection and Diagnosis in the Presence of Atmospheric Turbulence: Theory and Experimental Validation With Real Flight Data00.342021
Precise Weather Parameter Predictions for Target Regions via Neural Networks00.342021
Effective electricity load forecasting using enhanced double-reservoir echo state network00.342021
Application of News Features in News Recommendation Methods: A Survey.00.342020
Bpu: A Blockchain Processing Unit For Accelerated Smart Contract Execution00.342020
Advanced backtracking search optimization algorithm for a new joint replenishment problem under trade credits with grouping constraint10.352020
Effective long short-term memory with fruit fly optimization algorithm for time series forecasting10.482020
INTB - A New FPGA Interconnect Model for Architecture Exploration.00.342020
Agent-based modeling and simulations of terrorist attacks combined with stampedes00.342020
Balance of memory footprint and runtime for high-density routing in large-scale FPGAs00.342019
A Computer Immune Optimization Algorithm Based on Group Evolutionary Strategy.00.342019
An Analytical-based Hybrid Algorithm for FPGA Placement00.342019
Dynamic Obstacle Avoidance for UAVs Using a Fast Trajectory Planning Approach.10.372019
Research On Application Of Artificial Intelligence In Computer Network Technology10.372019
Learning decomposed subspaces for supervised bidirectional image generation00.342019
TC-Net for iSBIR: Triplet Classification Network for Instance-level Sketch Based Image Retrieval30.372019
An Effective Hybrid Differential Evolution Algorithm Incorporating Simulated Annealing For Joint Replenishment And Delivery Problem With Trade Credit00.342016
E-Learning-Oriented Software Architecture Design And Case Study00.342015
Sentiment analysis of microblog combining dictionary and rules00.342014
Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing40.382013
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data351.102013
Two-level soft error vulnerability prediction on SMT/CMP architectures20.362011
Function Design Of Township Enterprise Online Approval System00.342010
Efficient Microarchitectural Vulnerabilities Prediction Using Boosted Regression Trees and Patient Rule Inductions120.592010
Studying On Construction Programs Of The Platform Of Primary Products Marketing00.342010
Research On Docking Of Supply And Demand Of Rural Informationization And "Internet Digital Divide" In Urban And Rural Areas In China00.342010
Sum-Rate Analysis of Multiuser MIMO System with Zero-Forcing Transmit Beamforming90.672009
Versatile Prediction And Fast Estimation Of Architectural Vulnerability Factor From Processor Performance Metrics341.112009
Accurate and efficient processor performance prediction via regression tree based modeling140.632009
Metric planar rectification from perspective view via circles00.342009
The implementation and application of programming port communication between industry PC and Mitsubishi FX series PLC00.342008
Seccmp: Enhancing Critical Secrets Protection In Chip-Multiprocessors00.342008
A High Performance Low Power Consumption Robot Vision System00.342007
Hierarchical Conditional Random Fields (HCRF) for Chinese Named Entity Tagging10.402007
A fast individual face modeling and facial animation system00.342006
Fist tracking using bayesian network00.342005
Head gesture recognition based on bayesian network30.462005
A vision based game control method40.492005
Address-free memory access based on program syntax correlation of loads and stores00.342003