default search action
Peng Lv
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Peng Lv 0001 — Beijing Institute of Technology, China
- Peng Lv 0002 — Shanghai Jiao Tong University, Shanghai, China
- Peng Lv 0003 — Chinese Academy of Sciences Aerospace Information Research Institute, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Ruoyu Ji, Fangmin Xu, Shihui Duan, Jinyu Zhu, Yiwen Tao, Meihui Liu, Peng Lv, Chenglin Zhao:
A cooperative timestamp-free clock synchronization scheme based on fast unscented Kalman filtering for time-sensitive networking. Comput. Networks 253: 110711 (2024) - [j11]Tianyu Zhang, Hongguang Wang, Peng Lv, Xinan Pan, Huiyang Yu:
Force manipulability-oriented manipulation planning for collaborative robot. Ind. Robot 51(5): 857-869 (2024) - 2023
- [c11]Peng Lv, Yan Liu:
Analysis of Graph Data Structure from the Perspective of Clustering. CSAI 2023: 414-419 - [c10]Hongguang Wang, Bingbing Yuan, Xinan Pan, Lijuan Guo, Lie Ling, Peng Lv, Tianyu Zhang:
IDRRS-I- Development of a Robot System for Insulators Detection and Replacement Task. ICARM 2023: 1187-1193 - [c9]Tianyu Zhang, Hongguang Wang, Peng Lv, Fanxu Kong, Daqian Wang, Xinan Pan:
Optimization-Based Motion Planning Method for a Robot Manipulator Under the Conditions of Confined Space and Heavy Load. ICIRA (1) 2023: 128-138 - 2022
- [j10]Peng Lv, Bing Zheng:
Structured backward error analysis for a class of block three-by-three saddle point problems. Numer. Algorithms 90(1): 59-78 (2022) - [c8]Shaowei Fan, Peng Lv, Qiang Liu, Jiaping Sun, Cong Ming:
A Compliant Strategy of a Underactuated Gripper to Grasp a Space Cooperative Target Based on Hybrid Impedance Control. ICIRA (1) 2022: 482-492 - [c7]Yanze Ren, Yan Liu, Guangsheng Zhang, Lian Liu, Peng Lv:
Discrimination of News Political Bias Based on Heterogeneous Graph Neural Network. KSEM (1) 2022: 542-555 - 2021
- [j9]Tiansheng Hong, Yan Su, Mingyi Fan, Shun Dai, Peng Lv, Chunyu Ding, Zongyu Zhang, Ruigang Wang, Chendi Liu, Wei Du, Shuning Liu, Chunlai Li:
Flight Experiment Validation of Altitude Measurement Performance of MOSIR on Tianwen-1 Orbiter. Remote. Sens. 13(24): 5049 (2021) - [j8]Wei Yu, Hongjian You, Peng Lv, Yuxin Hu, Bing Han:
A Moving Ship Detection and Tracking Method Based on Optical Remote Sensing Images from the Geostationary Satellite. Sensors 21(22): 7547 (2021) - 2020
- [j7]Bing Zheng, Peng Lv:
Structured backward error analysis for generalized saddle point problems. Adv. Comput. Math. 46(2): 34 (2020) - [j6]Quan Cai, Si-Yao Du, Si Gao, Guo-Liang Huang, Zheng Zhang, Shu Li, Xin Wang, Pei-Ling Li, Peng Lv, Gang Hou, Lina Zhang:
A model based on CT radiomic features for predicting RT-PCR becoming negative in coronavirus disease 2019 (COVID-19) patients. BMC Medical Imaging 20(1): 118 (2020) - [j5]Long Chen, Dezheng Zhang, Peng Li, Peng Lv:
Change Detection of Remote Sensing Images Based on Attention Mechanism. Comput. Intell. Neurosci. 2020: 6430627:1-6430627:11 (2020) - [j4]Peng Lv, Yanwei Yu, Yangyang Fan, Xianfeng Tang, Xiangrong Tong:
Layer-constrained variational autoencoding kernel density estimation model for anomaly detection. Knowl. Based Syst. 196: 105753 (2020) - [j3]Zhao Liu, Peng Lv:
RO-RAW: Run-Time Restricted Access Window Optimization in IEEE 802.11ah Network with Extended Kalman Filter. Wirel. Commun. Mob. Comput. 2020: 8876669:1-8876669:10 (2020) - [c6]Yanwei Yu, Peng Lv, Xiangrong Tong, Junyu Dong:
Anomaly Detection in High-Dimensional Data Based on Autoregressive Flow. DASFAA (2) 2020: 125-140 - [c5]Guangyao Chen, Shaoqiong Yang, Tongshuai Sun, Peng Lv:
An experimental comparison of ventilated supercavitation with disk-shaped cavitators and elliptical disk-shaped cavitators. ICSSE 2020: 1-4
2010 – 2019
- 2019
- [c4]Xue Miao, Xi Guo, Xiaochun Yang, Zhaoshun Wang, Peng Lv:
Range Nearest Neighbor Query with the Direction Constraint. WISE Workshops 2019: 115-131 - 2018
- [j2]Zhenyu Wu, Hao Luo, Yunong Yang, Peng Lv, Xinning Zhu, Yang Ji, Bian Wu:
K-PdM: KPI-Oriented Machinery Deterioration Estimation Framework for Predictive Maintenance Using Cluster-Based Hidden Markov Model. IEEE Access 6: 41676-41687 (2018) - [j1]Xiao Shan Chen, Peng Lv:
On estimating the separation between (A, B) and (C, D) associated with the generalized Sylvester equation AXD-BXC=E. J. Comput. Appl. Math. 330: 128-140 (2018)
2000 – 2009
- 2008
- [c3]Chundi Si, Enli Chen, Peng Lv:
Safety Comprehensive Assessment of Tailing Reservior Based on Information Entropy and Fuzzy Mathematics. FSKD (3) 2008: 419-424 - 2007
- [c2]Yuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, Peng Lv:
Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment. NBiS 2007: 177-186 - 2006
- [c1]Yibing Liu, Zhiyong Ma, He Qian, Peng Lv:
Early Identification of Machine Fault Based on Kernel Principal Components Analysis. ICICIC (3) 2006: 149-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint