default search action
Yuling Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Yuling Chen, Xiaoxia Li, Zhenxiang He, Hang Chen, Jinwei Chen, Bin Wu:
IoU_MDA: An Occluded Object Detection Algorithm Based on Fuzzy Sample Anchor Box IoU Matching Degree Deviation Aware. IEEE Access 12: 47630-47645 (2024) - [j65]Zhenxiang He, Xiaoxia Li, Nianzu Lv, Yuling Chen, Yong Cai:
Retinal Vascular Segmentation Network Based on Multi-Scale Adaptive Feature Fusion and Dual-Path Upsampling. IEEE Access 12: 48057-48067 (2024) - [j64]Tao Wu, Yaopan Hou, Guanghao Xin, Jingyan Niu, Shanshan Peng, Fanfan Xu, Ying Li, Yuling Chen, Yifangfei Yu, Huixue Zhang, Xiaotong Kong, Yuze Cao, Shangwei Ning, Lihua Wang, Junwei Hao:
MSGD: a manually curated database of genomic, transcriptomic, proteomic and drug information for multiple sclerosis. Database J. Biol. Databases Curation 2024 (2024) - [j63]Bing Zhang, Xuyang Zhao, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Dusit Niyato:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. ACM Comput. Surv. 56(8): 203:1-203:39 (2024) - [j62]Yuling Chen, Xiong Yang, Tao Li, Yi Ren, Yangyang Long:
A blockchain-empowered authentication scheme for worm detection in wireless sensor network. Digit. Commun. Networks 10(2): 265-272 (2024) - [j61]Yibo Lai, Weiyan Zheng, Zhiqing Sun, Yan Zhou, Yuling Chen:
Micro-grid source-load storage energy minimization method based on improved competitive depth Q - network algorithm and digital twinning. Energy Inform. 7(1): 126 (2024) - [j60]Zhongxiang He, Yuling Chen, Yun Luo, Lingyun Zhang, Yingying Tang:
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems. Entropy 26(1): 45 (2024) - [j59]Chaoyang Li, Bohao Jiang, Mianxiong Dong, Yuling Chen, Zhifeng Zhang, Xiangjun Xin, Kaoru Ota:
Efficient Designated Verifier Signature for Secure Cross-Chain Health Data Sharing in BIoMT. IEEE Internet Things J. 11(11): 19838-19851 (2024) - [j58]Yangyang Long, Changgen Peng, Yuling Chen, Weijie Tan, Jing Sun:
BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment. IEEE Internet Things J. 11(23): 38508-38520 (2024) - [j57]Yun Luo, Yuling Chen, Hui Dou, Chaoyue Tan, Huiyu Zhou:
Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption. Inf. Process. Manag. 61(5): 103789 (2024) - [j56]Chang Shu, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou:
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model. J. Cloud Comput. 13(1): 4 (2024) - [j55]Yun Luo, Yuling Chen, Tao Li, Chaoyue Tan, Hui Dou:
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption. J. Cloud Comput. 13(1): 22 (2024) - [j54]Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang:
Cross-chain asset trading scheme for notaries based on edge cloud storage. J. Cloud Comput. 13(1): 90 (2024) - [j53]Yan Zheng, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Chang Shu, Lang Chen:
Optimization model for vehicular network data queries in edge environments. J. Cloud Comput. 13(1): 145 (2024) - [j52]Yangyang Long, Changgen Peng, Weijie Tan, Yuling Chen:
Blockchain-assisted full-session key agreement for secure data sharing in cloud computing. J. Parallel Distributed Comput. 193: 104943 (2024) - [j51]Zhong Long, Yuling Chen, Hui Dou, Yangwen Zhang, Yao Chen:
FedSQ: Sparse-Quantized Federated Learning for Communication Efficiency. IEEE Trans. Consumer Electron. 70(1): 4050-4061 (2024) - [j50]Yangyang Long, Changgen Peng, Weijie Tan, Yuling Chen:
Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps. IEEE Trans. Ind. Informatics 20(5): 7883-7893 (2024) - [j49]Le Yu, Shufan Zhang, Yan Meng, Suguo Du, Yuling Chen, Yanli Ren, Haojin Zhu:
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability. IEEE Trans. Mob. Comput. 23(8): 8256-8273 (2024) - [j48]Pengyu Chen, Yuling Chen, Xuewei Wang, Linlin Yuan, Chaoyue Tan, Yuxiang Yang:
A high-capacity slicing PBFT protocol based on reputation evaluation model. Wirel. Networks 30(8): 7469-7482 (2024) - [c41]Pengyu Chen, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Bo Li, Jiachen Huang:
Slicing PBFT Consensus Algorithm Based on VRF. Blockchain 2024: 569-574 - [c40]Yuling Chen, Zhenxiang He, Jinwei Chen, Bin Wu:
ACBA: Object detection algorithm based on Adaptive Class Blurry Aware. CSAIDE 2024: 659-664 - [c39]Bo Li, Yuling Chen, Siyuan Huang, Yuxiang Yang:
Cross-Chain Asset Trading Scheme Without Trusted Third-Party. DSPP (1) 2024: 39-51 - [c38]Yancheng Sun, Yuling Chen, Ziyang Liu, Hui Dou, Chaoyue Tan:
Targeted Universal Adversarial Attack Based on Fourier Transform. DSPP (1) 2024: 244-259 - [c37]Yuling Chen, Ningyu Fan, Hongyang Wu:
AI-Enabled Metaverse for Education: Challenges and Opportunities. METAVERSE 2024: 103-113 - [c36]Guoquan Wu, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Luchao Han, Zehui Xiong:
Diffusion Model-based Metaverse Rendering in UAV-Enabled Edge Networks With Dual Connectivity. WCNC 2024: 1-6 - 2023
- [j47]Zhenxiang He, Xiaoxia Li, Yuling Chen, Nianzu Lv, Yong Cai:
Attention-based dual-path feature fusion network for automatic skin lesion segmentation. BioData Min. 16(1) (2023) - [j46]Yancheng Sun, Yuling Chen, Peng Wu, Xuewei Wang, Qi Wang:
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution. Comput. Commun. 205: 14-23 (2023) - [j45]Xin Li, Yang Xin, Hongliang Zhu, Yixian Yang, Yuling Chen:
Cross-domain vulnerability detection using graph embedding and domain adaptation. Comput. Secur. 125: 103017 (2023) - [j44]Chaoyue Tan, Yuling Chen, Xiaojun Ren, Changgen Peng:
A mobile energy trading scheme based on Lightning Network. Concurr. Comput. Pract. Exp. 35(20) (2023) - [j43]Yuling Chen, Yufeng Li, Qi Chen, Xianmin Wang, Tao Li, Chaoyue Tan:
Energy trading scheme based on consortium blockchain and game theory. Comput. Stand. Interfaces 84: 103699 (2023) - [j42]Yuling Chen, Hao Yang, Xuewei Wang, Qi Wang, Huiyu Zhou:
GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection. Entropy 25(3): 461 (2023) - [j41]Yuling Chen, Hui Zhou, Tao Li, Jin Li, Huiyu Zhou:
Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach. IEEE Internet Things J. 10(24): 21595-21606 (2023) - [j40]Ruonan Shi, Yuling Chen, Chaoyue Tan, Yun Luo, Tao Li:
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism. J. Cloud Comput. 12(1): 117 (2023) - [j39]Hao Yang, Xuewei Wang, Yuling Chen, Hui Dou, Yangwen Zhang:
RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation. J. Cloud Comput. 12(1): 169 (2023) - [j38]Tiantian Zhang, Yongtang Wu, Yuling Chen, Tao Li, Xiaojun Ren:
Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games. Symmetry 15(2): 443 (2023) - [c35]Yangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Maolin Xiong:
A High Capacity Combined Carrier Steganography Without Embedding Image. DASC/PiCom/CBDCom/CyberSciTech 2023: 95-100 - [c34]Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo, Yuling Chen:
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain. DASC/PiCom/CBDCom/CyberSciTech 2023: 389-394 - [c33]Zhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yancheng Sun:
Communication-Efficient Federated Learning with Sparsity and Quantization. DASC/PiCom/CBDCom/CyberSciTech 2023: 415-421 - [c32]Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Pengyu Chen:
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism. DASC/PiCom/CBDCom/CyberSciTech 2023: 492-498 - [c31]Maolin Xiong, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Adversarial Attack Method Based on Dual- frequency Domain Transformation. DASC/PiCom/CBDCom/CyberSciTech 2023: 543-548 - [c30]Hao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Robust Object Detection Based on a Comparative Learning Perspective. DASC/PiCom/CBDCom/CyberSciTech 2023: 557-563 - [c29]Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Yuxiang Yang:
A Blockchain of Blockchains Structure Based on Asset Trading Scheme. DASC/PiCom/CBDCom/CyberSciTech 2023: 582-588 - [c28]Taiqi He, Zhiwen Yang, Xiaoxia Li, Yuling Chen:
Adaptive Fusion of Global Pooling Feature Attention for Object Detection. IoTAAI 2023: 219-227 - [i3]Bing Zhang, Xuyang Zhao, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Dusit Niyato:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. CoRR abs/2303.12588 (2023) - 2022
- [j37]Songbiao Zhu, Wenxi Ding, Yuling Chen, Weixuan Wang, Renhua Xu, Chongdong Liu, Xiaohui Liu, Haiteng Deng:
High VHL Expression Reverses Warburg Phenotype and Enhances Immunogenicity in Kidney Tumor Cells. Genom. Proteom. Bioinform. 20(4): 657-669 (2022) - [j36]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 37(2): 1204-1221 (2022) - [j35]Yuling Chen, Juan Ma, Xianmin Wang, Xinyu Zhang, Huiyu Zhou:
DE-RSTC: A rational secure two-party computation protocol based on direction entropy. Int. J. Intell. Syst. 37(11): 8947-8967 (2022) - [j34]Tao Li, Zhaojie Wang, Yuling Chen, Chunmei Li, Yanling Jia, Yixian Yang:
Is semi-selfish mining available without being detected? Int. J. Intell. Syst. 37(12): 10576-10597 (2022) - [j33]Xinyu Zhang, Yujun Liu, Yuling Chen:
A new entropic criterion model in rational secure two-party computation. J. Ambient Intell. Humaniz. Comput. 13(3): 1363-1372 (2022) - [j32]Hui Dou, Yuling Chen, Yixian Yang, Yangyang Long:
A secure and efficient privacy-preserving data aggregation algorithm. J. Ambient Intell. Humaniz. Comput. 13(3): 1495-1503 (2022) - [j31]Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
A trusted de-swinging k-anonymity scheme for location privacy protection. J. Cloud Comput. 11: 2 (2022) - [j30]Chaoyue Tan, Yuling Chen, Yongtang Wu, Xiaochuan He, Tao Li:
A designated verifier multi-signature scheme in multi-clouds. J. Cloud Comput. 11: 61 (2022) - [j29]Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, Xiaomei Yu:
An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model. J. Organ. End User Comput. 34(10): 1-17 (2022) - [c27]Jing Sun, Yuling Chen, Xiao Lv, Xiaobin Qian:
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 280-286 - [c26]Xiaochuan He, Chaoyue Tan, Yongtang Wu, Yuling Chen:
A Security Transaction Model Based on HTLC. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 328-331 - [c25]Junhong Tao, Yongtang Wu, Yuling Chen:
A Secure Comparison Protocol in the Malicious Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 332-337 - [c24]Yun Luo, Yuling Chen, Tao Li, Yilei Wang:
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 338-342 - [c23]Kaicheng Yang, Yongtang Wu, Yuling Chen:
A Blockchain-based Scalable Electronic Contract Signing System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 343-348 - [c22]Manxiang Yang, Yongtang Wu, Yuling Chen:
A K-anonymity Optimization Algorithm Under Attack Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 357-362 - [c21]Juan Ma, Yuling Chen, Xiao Lv, Xiaobin Qian:
The optimal attack-defense scheme for secret sharing. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 363-367 - [c20]Lingyun Zhang, Yuling Chen, Xiaobin Qian:
Data Confirmation Scheme based on Auditable CP-ABE. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 439-443 - 2021
- [j28]Xinying Yu, Zhaojie Wang, Yilei Wang, Fengyin Li, Tao Li, Yuling Chen, Youliang Tian, Xiaomei Yu:
ImpSuic: A quality updating rule in mixing coins with maximum utilities. Int. J. Intell. Syst. 36(3): 1182-1198 (2021) - [j27]Tao Li, Zhaojie Wang, Guoyu Yang, Yang Cui, Yuling Chen, Xiaomei Yu:
Semi-selfish mining based on hidden Markov decision process. Int. J. Intell. Syst. 36(7): 3596-3612 (2021) - [j26]Juan Ma, Yuling Chen, Ziping Wang, Guoxu Liu, Hongliang Zhu:
A rational delegating computation protocol based on reputation and smart contract. J. Cloud Comput. 10(1): 51 (2021) - [j25]Xiaogang Xing, Yuling Chen, Tao Li, Yang Xin, Hongwei Sun:
A blockchain index structure based on subchain query. J. Cloud Comput. 10(1): 52 (2021) - [j24]Jianwen Hu, Yuling Chen, Xiaojun Ren, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things. Mob. Inf. Syst. 2021: 7397926:1-7397926:13 (2021) - [j23]Yuling Chen, Wentao Teng, Zhen Li, Qiqi Zhu, Qingfeng Guan:
Cross-Domain Scene Classification Based on a Spatial Generalized Neural Architecture Search for High Spatial Resolution Remote Sensing Images. Remote. Sens. 13(17): 3460 (2021) - [j22]Mingzhen Li, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, Guangcan Yang:
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. Secur. Commun. Networks 2021: 5556155:1-5556155:22 (2021) - [j21]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". Secur. Commun. Networks 2021: 9856969:1-9856969:2 (2021) - [j20]Zhan Li, Jianhang Zhang, Ruibin Zhong, Bir Bhanu, Yuling Chen, Qingfeng Zhang, Haoqing Tang:
Lightweight and Efficient Image Dehazing Network Guided by Transmission Estimation from Real-World Hazy Scenes. Sensors 21(3): 960 (2021) - [j19]Yuling Chen, Sen Dong, Tao Li, Yilei Wang, Huiyu Zhou:
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE. IEEE Trans. Inf. Forensics Secur. 16: 5239-5249 (2021) - [c19]Ping Guo, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A location data protection protocol based on differential privacy. DASC/PiCom/CBDCom/CyberSciTech 2021: 306-311 - [c18]Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang:
Using information entropy to analyze secure multi-party computation protocol. DASC/PiCom/CBDCom/CyberSciTech 2021: 312-318 - [c17]Jianwen Hu, Yuling Chen, Xiaoiun Ren, Yixian Yang, Xiaobin Qian:
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things. DASC/PiCom/CBDCom/CyberSciTech 2021: 319-325 - [c16]Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A De-swinging Scheme in Location Privacy Protection via Smart Contract. DASC/PiCom/CBDCom/CyberSciTech 2021: 326-333 - [c15]Jing Sun, Yuling Chen, Tao Li, Jia Liu, Yixian Yang:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. DASC/PiCom/CBDCom/CyberSciTech 2021: 334-340 - [c14]Dongdong Yang, Baopeng Ye, Yuling Chen, Huiyu Zhou, Xiaobin Qian:
A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance. ISPEC 2021: 283-295 - [c13]Yuling Chen, Lei Li, Fei Zhang, XianLong Ren:
5G Mobile Communication System Based on Cloud Wireless Access Network. IWCMC 2021: 632-636 - [c12]Yuling Chen, Lei Li, Ying Liu:
Application of FPGA Array Structure Digital Signal Processing Platform in Communication Field. IWCMC 2021: 637-641 - [c11]Zi Li, Xiguo Yang, Yuling Chen, Jiarong Zhang:
Application of Wireless Communication in Intelligent Distribution Network Communication Technology. IWCMC 2021: 1879-1883 - [i2]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. CoRR abs/2109.13774 (2021) - [i1]Juan Ma, Yuling Chen:
DE-RSTC: A rational secure two-party computation protocol based on direction entropy. CoRR abs/2110.09160 (2021) - 2020
- [j18]Xuefeng Li, Yang Xin, Chensu Zhao, Yixian Yang, Shoushan Luo, Yuling Chen:
Using User Behavior to Measure Privacy on Online Social Networks. IEEE Access 8: 108387-108401 (2020) - [j17]Yangyang Long, Yuling Chen, Wei Ren, Hui Dou, Neal Naixue Xiong:
DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity. IEEE Access 8: 192587-192596 (2020) - [j16]Yuling Chen, Hongyan Yin, Yuexin Xiang, Wei Ren, Yi Ren, Neal Naixue Xiong:
CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts. IEEE Access 8: 220672-220681 (2020) - [j15]Zhujun Jin, Yu Yang, Yuling Chen, Yuwei Chen:
IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel. Int. J. Distributed Sens. Networks 16(3) (2020) - [j14]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. Secur. Commun. Networks 2020: 8839047:1-8839047:11 (2020) - [c10]Hui Dou, Yuling Chen, Yangyang Long, Yuanchao Tu:
A Low Energy-Consuming Security Data Aggregation Protocol. ML4CS (1) 2020: 547-557 - [c9]Xinyu Zhang, YuJun Liu, Yuling Chen, Zhan Wang:
A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy. ML4CS (1) 2020: 566-577
2010 – 2019
- 2019
- [j13]Lunzhi Deng, Yixian Yang, Yuling Chen:
Certificateless Short Aggregate Signature Scheme for Mobile Devices. IEEE Access 7: 87162-87168 (2019) - [j12]Hongliang Zhu, Ying Yuan, Yuling Chen, Yaxing Zha, Wanying Xi, Bin Jia, Yang Xin:
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7: 90036-90044 (2019) - [j11]Yuling Chen, Wei Kong, Xinzhao Jiang:
Anti-Synchronization and Robust Authentication for Noisy PUF-Based Smart Card. IEEE Access 7: 142214-142223 (2019) - [j10]Guangcan Yang, Shoushan Luo, Hongliang Zhu, Yang Xin, Ke Xiao, Yuling Chen, Mingzhen Li, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019) - [j9]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin, Hongliang Zhu, Yuling Chen, Guangcan Yang, Yixian Yang:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019) - [j8]Yuling Chen, Jinyi Guo, Changlou Li, Wei Ren:
FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing. Future Internet 11(11): 225 (2019) - [j7]Lingling Zeng, Wei Ren, Yuling Chen, Min Lei:
LMDGW: a novel matrix based dynamic graph watermark. J. Ambient Intell. Humaniz. Comput. 10(1): 295-304 (2019) - [j6]Yuling Chen, Xiaohan Hao, Wei Ren, Yi Ren:
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications. Mob. Inf. Syst. 2019: 5627497:1-5627497:10 (2019) - [c8]Chenyang Li, Yuling Chen, Yu Yang, Chaochao Li, Yang Zeng:
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid. ICAIS (4) 2019: 529-541 - [c7]Ning Wang, Yuling Chen, Yu Yang, Zigang Fang, Yizhe Sun:
Blockchain Private Key Storage Algorithm Based on Image Information Hiding. ICAIS (4) 2019: 542-552 - [c6]Xi Chen, Jingjie Chen, Yuling Chen, Jinglan Yang, Deyin Li:
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning. ICAIS (4) 2019: 553-565 - [c5]Lin Gan, Jingjie Chen, Yuling Chen, Zhujun Jin, Wenxi Han:
JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network. ICAIS (4) 2019: 566-577 - [c4]Shuangshuang Xu, Yang Xin, Hongliang Zhu, Shoushan Luo, Yuling Chen:
A Authentication and Access Authorization Mechanism on the PaaS Platform. SSCI 2019: 893-900 - 2018
- [j5]Yang Xin, Lingshuang Kong, Zhi Liu, Yuling Chen, Yan-Miao Li, Hongliang Zhu, Mingcheng Gao, Haixia Hou, Chunhua Wang:
Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 6: 35365-35381 (2018) - [j4]Yang Xin, Yankun Cao, Zhi Liu, Yuling Chen, Lizhen Cui, Yaowen Zhu, Haixia Hou, Guangzhe Zhao, Mingyu Wang:
Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform. IEEE Access 6: 43885-43891 (2018) - [j3]Yuling Chen, Min Lei, Wei Ren, Yi Ren, Zhiguo Qu:
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring. Fundam. Informaticae 157(1-2): 167-184 (2018) - [j2]Lunzhi Deng, Yixian Yang, Ronghai Gao, Yuling Chen:
Certificateless short signature scheme from pairing in the standard model. Int. J. Commun. Syst. 31(17) (2018) - [c3]Dengzhi Liu, Jian Shen, Yuling Chen, Chen Wang, Tianqi Zhou, Anxi Wang:
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. Inscrypt 2018: 223-239 - 2017
- [j1]Lunzhi Deng, Yixian Yang, Yuling Chen:
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. KSII Trans. Internet Inf. Syst. 11(11): 5625-5641 (2017) - 2015
- [c2]Yuling Chen, Yinghua Qin, Mark Lambe, Wenjing Chu:
Realizing network function virtualization management and orchestration with model based open architecture. CNSM 2015: 410-418
2000 – 2009
- 2003
- [c1]Thomas R. Dean, Yuling Chen:
Design Recovery of a Two Level System. IWPC 2003: 23-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint