Liping Feng

From MaRDI portal
Person:1664694



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Abnormal communication Internet-connected vehicle platoon dynamical modeling and characteristics study
xxxPhysica A
j=[Physica A] a=[ ] j-bytes=[80,104,121,115,105,99,97,32,65]
2024-09-19Paper
A decentralized Nesterov gradient method for stochastic optimization over unbalanced directed networks
xxxAsian Journal of Control
j=[Asian Journal of Control] a=[ ] j-bytes=[65,115,105,97,110,32,74,111,117,114,110,97,108,32,111,102,32,67,111,110,116,114,111,108]
2024-07-25Paper
Distributed generalized Nash equilibrium seeking: a backward-reflected-forward-backward-based algorithm
xxxJournal of the Franklin Institute
j=[Journal of the Franklin Institute] a=[ ] j-bytes=[74,111,117,114,110,97,108,32,111,102,32,116,104,101,32,70,114,97,110,107,108,105,110,32,73,110,115,116,105,116,117,116,101]
2024-02-06Paper
A stochastic averaging gradient algorithm with multi‐step communication for distributed optimization
xxxOptimal Control Applications & Methods
j=[Optimal Control Applications & Methods] a=[ ] j-bytes=[79,112,116,105,109,97,108,32,67,111,110,116,114,111,108,32,65,112,112,108,105,99,97,116,105,111,110,115,32,92,38,32,77,101,116,104,111,100,115]
2023-10-25Paper
Decentralized proximal splitting algorithms for composite constrained convex optimization
xxxJournal of the Franklin Institute
j=[Journal of the Franklin Institute] a=[ ] j-bytes=[74,111,117,114,110,97,108,32,111,102,32,116,104,101,32,70,114,97,110,107,108,105,110,32,73,110,115,116,105,116,117,116,101]
2022-09-06Paper
S-DIGing: A Stochastic Gradient Tracking Algorithm for Distributed Optimization
xxx 
j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59]
2019-10-19Paper
Pattern dynamics of a spatial epidemic model with time delay
xxxApplied Mathematics and Computation
j=[Applied Mathematics and Computation] a=[ ] j-bytes=[65,112,112,108,105,101,100,32,77,97,116,104,101,109,97,116,105,99,115,32,97,110,100,32,67,111,109,112,117,116,97,116,105,111,110]
2019-03-25Paper
Modeling peer-to-peer botnet on scale-free network
xxxAbstract and Applied Analysis
j=[Abstract and Applied Analysis] a=[ ] j-bytes=[65,98,115,116,114,97,99,116,32,97,110,100,32,65,112,112,108,105,101,100,32,65,110,97,108,121,115,105,115]
2019-02-14Paper
Dynamical analysis and control strategies on malware propagation model
xxxApplied Mathematical Modelling
j=[Applied Mathematical Modelling] a=[ ] j-bytes=[65,112,112,108,105,101,100,32,77,97,116,104,101,109,97,116,105,99,97,108,32,77,111,100,101,108,108,105,110,103]
2018-10-10Paper
Modeling and stability analysis of worm propagation in wireless sensor network
xxxMathematical Problems in Engineering
j=[Mathematical Problems in Engineering] a=[ ] j-bytes=[77,97,116,104,101,109,97,116,105,99,97,108,32,80,114,111,98,108,101,109,115,32,105,110,32,69,110,103,105,110,101,101,114,105,110,103]
2018-08-27Paper
Influence of removable devices' heterouse on the propagation of malware
xxxAbstract and Applied Analysis
j=[Abstract and Applied Analysis] a=[ ] j-bytes=[65,98,115,116,114,97,99,116,32,97,110,100,32,65,112,112,108,105,101,100,32,65,110,97,108,121,115,105,115]
2014-06-23Paper
Hopf bifurcation analysis of a delayed viral infection model in computer networks
xxxMathematical and Computer Modelling
j=[Mathematical and Computer Modelling] a=[ ] j-bytes=[77,97,116,104,101,109,97,116,105,99,97,108,32,97,110,100,32,67,111,109,112,117,116,101,114,32,77,111,100,101,108,108,105,110,103]
2013-01-24Paper
Modeling and analysis of peer-to-peer botnets
xxxDiscrete Dynamics in Nature and Society
j=[Discrete Dynamics in Nature and Society] a=[ ] j-bytes=[68,105,115,99,114,101,116,101,32,68,121,110,97,109,105,99,115,32,105,110,32,78,97,116,117,114,101,32,97,110,100,32,83,111,99,105,101,116,121]
2012-12-18Paper
Complex dynamics behaviors in cellular automata rule 35
xxx 
j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59]
2012-04-24Paper
Improved SIR model of computer virus propagation in the network
xxx 
j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59]
2011-08-19Paper
Stability of solutions to combined BBM-Burgers equation
xxx 
j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59]
2009-07-22Paper
scientific article; zbMATH DE number 5371456 (Why is no real title available?)
xxx 
j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59]
2008-11-24Paper
Conditional stability of solitary-wave solutions for generalized Boussinesq equations
xxxChaos, Solitons and Fractals
j=[Chaos, Solitons and Fractals] a=[ ] j-bytes=[67,104,97,111,115,44,32,83,111,108,105,116,111,110,115,32,97,110,100,32,70,114,97,99,116,97,108,115]
2008-01-15Paper


Research outcomes over time


This page was built for person: Liping Feng