Liping Feng
From MaRDI portal
Person:1664694
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Abnormal communication Internet-connected vehicle platoon dynamical modeling and characteristics study xxxPhysica A j=[Physica A] a=[ ] j-bytes=[80,104,121,115,105,99,97,32,65] | 2024-09-19 | Paper |
| A decentralized Nesterov gradient method for stochastic optimization over unbalanced directed networks xxxAsian Journal of Control j=[Asian Journal of Control] a=[ ] j-bytes=[65,115,105,97,110,32,74,111,117,114,110,97,108,32,111,102,32,67,111,110,116,114,111,108] | 2024-07-25 | Paper |
| Distributed generalized Nash equilibrium seeking: a backward-reflected-forward-backward-based algorithm xxxJournal of the Franklin Institute j=[Journal of the Franklin Institute] a=[ ] j-bytes=[74,111,117,114,110,97,108,32,111,102,32,116,104,101,32,70,114,97,110,107,108,105,110,32,73,110,115,116,105,116,117,116,101] | 2024-02-06 | Paper |
| A stochastic averaging gradient algorithm with multi‐step communication for distributed optimization xxxOptimal Control Applications & Methods j=[Optimal Control Applications & Methods] a=[ ] j-bytes=[79,112,116,105,109,97,108,32,67,111,110,116,114,111,108,32,65,112,112,108,105,99,97,116,105,111,110,115,32,92,38,32,77,101,116,104,111,100,115] | 2023-10-25 | Paper |
| Decentralized proximal splitting algorithms for composite constrained convex optimization xxxJournal of the Franklin Institute j=[Journal of the Franklin Institute] a=[ ] j-bytes=[74,111,117,114,110,97,108,32,111,102,32,116,104,101,32,70,114,97,110,107,108,105,110,32,73,110,115,116,105,116,117,116,101] | 2022-09-06 | Paper |
| S-DIGing: A Stochastic Gradient Tracking Algorithm for Distributed Optimization xxx j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59] | 2019-10-19 | Paper |
| Pattern dynamics of a spatial epidemic model with time delay xxxApplied Mathematics and Computation j=[Applied Mathematics and Computation] a=[ ] j-bytes=[65,112,112,108,105,101,100,32,77,97,116,104,101,109,97,116,105,99,115,32,97,110,100,32,67,111,109,112,117,116,97,116,105,111,110] | 2019-03-25 | Paper |
| Modeling peer-to-peer botnet on scale-free network xxxAbstract and Applied Analysis j=[Abstract and Applied Analysis] a=[ ] j-bytes=[65,98,115,116,114,97,99,116,32,97,110,100,32,65,112,112,108,105,101,100,32,65,110,97,108,121,115,105,115] | 2019-02-14 | Paper |
| Dynamical analysis and control strategies on malware propagation model xxxApplied Mathematical Modelling j=[Applied Mathematical Modelling] a=[ ] j-bytes=[65,112,112,108,105,101,100,32,77,97,116,104,101,109,97,116,105,99,97,108,32,77,111,100,101,108,108,105,110,103] | 2018-10-10 | Paper |
| Modeling and stability analysis of worm propagation in wireless sensor network xxxMathematical Problems in Engineering j=[Mathematical Problems in Engineering] a=[ ] j-bytes=[77,97,116,104,101,109,97,116,105,99,97,108,32,80,114,111,98,108,101,109,115,32,105,110,32,69,110,103,105,110,101,101,114,105,110,103] | 2018-08-27 | Paper |
| Influence of removable devices' heterouse on the propagation of malware xxxAbstract and Applied Analysis j=[Abstract and Applied Analysis] a=[ ] j-bytes=[65,98,115,116,114,97,99,116,32,97,110,100,32,65,112,112,108,105,101,100,32,65,110,97,108,121,115,105,115] | 2014-06-23 | Paper |
| Hopf bifurcation analysis of a delayed viral infection model in computer networks xxxMathematical and Computer Modelling j=[Mathematical and Computer Modelling] a=[ ] j-bytes=[77,97,116,104,101,109,97,116,105,99,97,108,32,97,110,100,32,67,111,109,112,117,116,101,114,32,77,111,100,101,108,108,105,110,103] | 2013-01-24 | Paper |
| Modeling and analysis of peer-to-peer botnets xxxDiscrete Dynamics in Nature and Society j=[Discrete Dynamics in Nature and Society] a=[ ] j-bytes=[68,105,115,99,114,101,116,101,32,68,121,110,97,109,105,99,115,32,105,110,32,78,97,116,117,114,101,32,97,110,100,32,83,111,99,105,101,116,121] | 2012-12-18 | Paper |
| Complex dynamics behaviors in cellular automata rule 35 xxx j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59] | 2012-04-24 | Paper |
| Improved SIR model of computer virus propagation in the network xxx j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59] | 2011-08-19 | Paper |
| Stability of solutions to combined BBM-Burgers equation xxx j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59] | 2009-07-22 | Paper |
| scientific article; zbMATH DE number 5371456 (Why is no real title available?) xxx j=[ ] a=[ ] j-bytes=[38,110,98,115,112,59] | 2008-11-24 | Paper |
| Conditional stability of solitary-wave solutions for generalized Boussinesq equations xxxChaos, Solitons and Fractals j=[Chaos, Solitons and Fractals] a=[ ] j-bytes=[67,104,97,111,115,44,32,83,111,108,105,116,111,110,115,32,97,110,100,32,70,114,97,99,116,97,108,115] | 2008-01-15 | Paper |
Research outcomes over time
This page was built for person: Liping Feng