default search action
Yufan Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yufan Chen 0001 — Karlsruhe Institute of Technology, Institute for Anthropomatics and Robotics, Karlsruhe, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yufan Chen, Han Liu, Zhiping Lu, Hua Wang:
Block Scalable OFDM-Based Waveform for NTN Uplink-A Comparative Study of Multiple Candidate Waveforms Over NTN Scenarios Using NR Numerology. IEEE Access 12: 31262-31278 (2024) - [j22]Wei Yu, Zonglin Li, Qinglin Liu, Yufan Chen, Shengping Zhang, Jingbo Lin:
DifBFSR: Blind Face Super-Resolution via Conditional Diffusion Contraction. Comput. Informatics 43(2): 369-392 (2024) - [j21]Yufan Chen, Jiahai Yang, Susu Cui, Cong Dong, Bo Jiang, Yuling Liu, Zhigang Lu:
Unveiling encrypted traffic types through hierarchical network characteristics. Comput. Secur. 138: 103645 (2024) - [j20]Yufan Chen, Lei Zhu, Cheng Jin, Jiawei Zhang, Changhua Yao, Yuantao Gu:
Boosting Open-Set RF Signal Recognition Under Low SNR Condition in Feature Space. IEEE Commun. Lett. 28(3): 627-631 (2024) - [j19]Yufan Chen, Dongxuan He, Zhiping Lu, Minghao Yuan, Hua Wang:
Design of Precoded Waveform With Low PAPR for High Mobility Communication Systems. IEEE Commun. Lett. 28(9): 2156-2160 (2024) - [j18]Wenyu Wang, Lei Zhu, Yuantao Gu, Yufan Chen, Xingyu Zhou, Lu Yu:
Adversarial Samples Detection Based on Feature Attribution and Contrast in Modulation Recognition. IEEE Commun. Lett. 28(11): 2483-2487 (2024) - [j17]Yufan Chen, Mengqin Wang, Yanling Wei, Xueliang Huang, Shan Gao:
Multi-Encoder Spatio-Temporal Feature Fusion Network for Electric Vehicle Charging Load Prediction. J. Intell. Robotic Syst. 110(3): 94 (2024) - [j16]Yufan Chen, Lei Zhu, Yuchen Jiao, Changhua Yao, Kaixin Cheng, Yuantao Gu:
An Extreme Value Theory-Based Approach for Reliable Drone RF Signal Identification. IEEE Trans. Cogn. Commun. Netw. 10(2): 454-469 (2024) - [j15]Yufan Chen, Wu-Hua Chen, Xiaomei Lu:
Impulsive Consensus Protocols of Discrete-Time Second-Order Multiagent Systems With Lipschitz Nonlinear Dynamics. IEEE Trans. Syst. Man Cybern. Syst. 54(9): 5365-5376 (2024) - [j14]Yufan Chen, Lei Zhu, Jiawei Zhang, Kaixin Cheng, Lu Yu, Yuantao Gu:
Counterfactual Threshold Learning for Drone RF Signal Classification Under Interference Conditions. IEEE Wirel. Commun. Lett. 13(7): 1958-1962 (2024) - [c33]Yang Shi, Xiangyu Zou, Xinyu Chen, Sian Jin, Dingwen Tao, Cai Deng, Yufan Chen, Wen Xia:
Machete: An Efficient Lossy Floating-Point Compressor Designed for Time Series Databases. DCC 2024: 532-541 - [c32]Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang:
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search. EuroS&P 2024: 724-740 - [c31]Jiawei Zhang, Yufan Chen, Cheng Jin, Lei Zhu, Yuantao Gu:
EPA: Neural Collapse Inspired Robust Out-of-distribution Detector. ICASSP 2024: 6515-6519 - [c30]Shaoda Wang, Lianhai Wang, Yufan Chen:
Structural Design and Analysis of Special Small ROV for Mariculture Based on ANSYS. ICCIR 2024: 88-92 - [c29]Zhaopeng Peng, Xiaoliang Fan, Yufan Chen, Zheng Wang, Shirui Pan, Chenglu Wen, Ruisheng Zhang, Cheng Wang:
FedPFT: Federated Proxy Fine-Tuning of Foundation Models. IJCAI 2024: 4806-4814 - [c28]Yufan Chen, Lizhen Wang, Qijing Li, Hongjiang Xiao, Shengping Zhang, Hongxun Yao, Yebin Liu:
MonoGaussianAvatar: Monocular Gaussian Point-based Head Avatar. SIGGRAPH (Conference Paper Track) 2024: 58 - [i12]Jiawei Zhang, Yufan Chen, Cheng Jin, Lei Zhu, Yuantao Gu:
EPA: Neural Collapse Inspired Robust Out-of-Distribution Detector. CoRR abs/2401.01710 (2024) - [i11]Yufan Chen, Ching Ting Leung, Yong Huang, Jianwei Sun, Hao Chen, Hanyu Gao:
MolNexTR: A Generalized Deep Learning Model for Molecular Image Recognition. CoRR abs/2403.03691 (2024) - [i10]Cong Dong, Jiahai Yang, Yun Li, Yue Wu, Yufan Chen, Chenglong Li, Haoran Jiao, Xia Yin, Yuling Liu:
E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet. CoRR abs/2403.12363 (2024) - [i9]Zhaopeng Peng, Xiaoliang Fan, Yufan Chen, Zheng Wang, Shirui Pan, Chenglu Wen, Ruisheng Zhang, Cheng Wang:
FedPFT: Federated Proxy Fine-Tuning of Foundation Models. CoRR abs/2404.11536 (2024) - [i8]Ching Ting Leung, Yufan Chen, Hanyu Gao:
SMiCRM: A Benchmark Dataset of Mechanistic Molecular Images. CoRR abs/2407.18338 (2024) - 2023
- [j13]Hao Ma, Xiang Zheng, Lu Yu, Xingyu Zhou, Yufan Chen:
A novel end-to-end deep separation network based on attention mechanism for single channel blind separation in wireless communication. IET Signal Process. 17(2) (2023) - [j12]Yufan Chen, Lei Zhu, Changhua Yao, Guan Gui, Lu Yu:
Global Context-Based Threshold Strategy for Drone Identification Under the Low SNR Condition. IEEE Internet Things J. 10(2): 1332-1346 (2023) - [j11]Luyuan Zhuang, Nan Guo, Yufan Chen:
TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption. Sensors 23(3): 1164 (2023) - [j10]Xuyang Duan, Yufan Chen, Menghan Li, Yitong Rong, Ruiqi Xie, Jun Han:
UArch: A Super-Resolution Processor With Heterogeneous Triple-Core Architecture for Workloads of U-Net Networks. IEEE Trans. Biomed. Circuits Syst. 17(3): 633-647 (2023) - [c27]Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. ACSAC 2023: 366-378 - [c26]Yufan Chen, Xuyang Duan, Jun Han:
UACT: A Unified Energy-efficient Computing Architecture for CNN and TCNN. ASICON 2023: 1-4 - [c25]Yufan Chen, Zihan Cheng, Xinru Chen, Jinye Li, Wenze Shao:
On Potentials of the Gamma Densities to Blind Face Hallucination. CISP-BMEI 2023: 1-5 - [c24]Yufan Chen, Xinru Chen, Zihan Cheng, Wenze Shao:
Dual Discriminative Relative-of-Gaussians Prior for Blind Deblurring. ICDIP 2023: 74:1-74:5 - [c23]Yi Lin, Dong Zhang, Xiao Fang, Yufan Chen, Kwang-Ting Cheng, Hao Chen:
Rethinking Boundary Detection in Deep Learning Models for Medical Image Segmentation. IPMI 2023: 730-742 - [c22]Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang:
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts. ISSTA 2023: 1157-1168 - [c21]Yi Lin, Yufan Chen, Kwang-Ting Cheng, Hao Chen:
Few Shot Medical Image Segmentation with Cross Attention Transformer. MICCAI (2) 2023: 233-243 - [c20]Xinyu He, Mengyao Cui, Yufan Chen, Longfei Liu, Bangchao Wang:
Intelligent Question Answering System Based on Cognitive Graph: A Case Study of Textile Fabrics. QRS Companion 2023: 693-702 - [c19]Peng Ye, Xinyi Lan, Yufan Chen, Zhipeng Wang, Wei Ye:
Research on the Construction of a Multimodal Cognitive Graph of Textile and Clothing. QRS Companion 2023: 703-712 - [c18]Yufan Chen, Zihan Cheng, Wenze Shao:
A Regularized Neural Optimization Approach with Beta Densities for Blind Deconvolution. WCSP 2023: 62-67 - [i7]Yi Lin, Yufan Chen, Kwang-Ting Cheng, Hao Chen:
Few Shot Medical Image Segmentation with Cross Attention Transformer. CoRR abs/2303.13867 (2023) - [i6]Yi Lin, Dong Zhang, Xiao Fang, Yufan Chen, Kwang-Ting Cheng, Hao Chen:
Rethinking Boundary Detection in Deep Learning Models for Medical Image Segmentation. CoRR abs/2305.00678 (2023) - [i5]Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. CoRR abs/2310.02431 (2023) - [i4]Yufan Chen, Lizhen Wang, Qijing Li, Hongjiang Xiao, Shengping Zhang, Hongxun Yao, Yebin Liu:
MonoGaussianAvatar: Monocular Gaussian Point-based Head Avatar. CoRR abs/2312.04558 (2023) - 2022
- [j9]Tao Gong, Steve C. N. Hui, Helge J. Zöllner, Mark Britton, Yulu Song, Yufan Chen, Aaron T. Gudmundson, Kathleen E. Hupfeld, Christopher W. Jenkins, Saipavitra Murali-Manohar, Eric C. Porges, Georg Oeltzschner, Weibo Chen, Guangbin Wang, Richard A. E. Edden:
Neurometabolic timecourse of healthy aging. NeuroImage 264: 119740 (2022) - [c17]Sachini Herath, David Caruso, Chen Liu, Yufan Chen, Yasutaka Furukawa:
Neural Inertial Localization. CVPR 2022: 6594-6603 - [i3]Sachini Herath, David Caruso, Chen Liu, Yufan Chen, Yasutaka Furukawa:
Neural Inertial Localization. CoRR abs/2203.15851 (2022) - 2021
- [c16]Cong Dong, Yufan Chen, Yunjian Zhang, Yuling Liu, Zhigang Lu, Pu Dong, Baoxu Liu:
BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. HPCC/DSS/SmartCity/DependSys 2021: 391-398 - [c15]Yufan Chen, Hua Wang, Dewei Yang, Xinyue Xu:
Joint Sparse Channel Estimation and Tracking for SC-FDE Based V2X Communication Systems. ICCT 2021: 700-704 - [c14]Nianhong Sun, Yi Zhou, Yongbao Ma, Yufan Chen:
A New Lightweight Dual-Microphone RNN-VAD Assist Adaptive Blocking Matrix for Dual-Channel Speech Enhancement. ICSPCC 2021: 1-5 - [c13]Zixiong Gao, Yufan Chen, Wuping Mai, Yao Lu, Shuyu Wu, Hongmei Liu:
Multi-task learning of perceptive feature for thyroid malignant probability prediction. Computer-Aided Diagnosis 2021 - 2020
- [j8]Yufan Chen, Wei Shao, Jin Liu, Lu Yu, Zuping Qian:
Automatic Modulation Classification Scheme Based on LSTM With Random Erasing and Attention Mechanism. IEEE Access 8: 154290-154300 (2020) - [j7]Nan Feng, Yufan Chen, Haiyang Feng, Dahui Li, Minqiang Li:
To outsource or not: The impact of information leakage risk on information security strategy. Inf. Manag. 57(5): 103215 (2020) - [j6]Yi Zhou, Yufan Chen, Yongbao Ma, Hongqing Liu:
A Real-Time Dual-Microphone Speech Enhancement Algorithm Assisted by Bone Conduction Sensor. Sensors 20(18): 5050 (2020) - [i2]Cong Dong, Zhigang Lu, Yufan Chen, Zelin Cui, Baoxu Liu:
MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree. CoRR abs/2006.10196 (2020)
2010 – 2019
- 2019
- [c12]Cong Dong, Yufan Chen, YunJian Zhang, Bo Jiang, Dongxu Han, Baoxu Liu:
An Approach for Scale Suspicious Network Events Detection. IEEE BigData 2019: 5854-5863 - [i1]Julian Straub, Thomas Whelan, Lingni Ma, Yufan Chen, Erik Wijmans, Simon Green, Jakob J. Engel, Raul Mur-Artal, Carl Yuheng Ren, Shobhit Verma, Anton Clarkson, Mingfei Yan, Brian Budge, Yajie Yan, Xiaqing Pan, June Yon, Yuyang Zou, Kimberly Leon, Nigel Carter, Jesus Briales, Tyler Gillingham, Elias Mueggler, Luis Pesqueira, Manolis Savva, Dhruv Batra, Hauke M. Strasdat, Renzo De Nardi, Michael Goesele, Steven Lovegrove, Richard A. Newcombe:
The Replica Dataset: A Digital Replica of Indoor Spaces. CoRR abs/1906.05797 (2019) - 2018
- [c11]Mingxuan Ju, Zhengkai Jiang, Yufan Chen, Soumya Ray:
A Multi-Representation Ensemble Approach to Classifying Vocal Diseases. IEEE BigData 2018: 5258-5262 - [c10]Nan Feng, Haiyang Feng, Jie Zhang, Yufan Chen, Minqiang Li:
Outsourcing Information Security: The Role of Information Leakage in Outsourcing Decisions. CONF-IRM 2018: 26 - 2014
- [j5]Dian-Sheng Chen, Po-Fan Yeh, Yu-Fan Chen, Chun-Wei Tsai, Chun-Yi Yin, Ren-Jie Lai, Jui-Che Tsai:
An Electrothermal Actuator With Two Degrees of Freedom Serving as the Arm of a MEMS Gripper. IEEE Trans. Ind. Electron. 61(10): 5465-5471 (2014) - [j4]Yu-Fan Chen, Wern-Ho Sheen, Li-Chun Wang:
Optimization of Cyclic-Delay Diversity Aided Frequency-Selective Scheduling in OFDMA Downlink Systems. IEEE Trans. Veh. Technol. 63(4): 1645-1659 (2014) - [c9]Yu-Fan Chen, Wei-Shiou Ding, Li-Chun Wang:
Hybrid Protected Subframes Resource Allocation and Throughput Estimation in LTE-A HetNet. iThings/GreenCom/CPSCom 2014: 567-571 - [c8]Yu-Fan Chen, Li-Chun Wang, Wern-Ho Sheen:
Joint user scheduling and interference alignment beamforming in heterogeneous wireless networks. PIMRC 2014: 1083-1087 - 2012
- [c7]Hui-Huang Hsu, Yu-Fan Chen, Chi-Yi Lin, Cheng-Wei Hsieh, Timothy K. Shih:
Emotion Care Services with Facebook Wall Messages. AINA Workshops 2012: 875-880 - [c6]Yu-Fan Chen, Wern-Ho Sheen, Li-Chun Wang:
A Low-Complexity CDD-Based Frequency Selective Scheduling with Efficient Feedback for Downlink OFDMA Systems. VTC Spring 2012: 1-5 - [c5]Yu-Fan Chen, Wern-Ho Sheen:
A GA-based optimization for frequency-selective scheduling in downlink OFDMA systems with cyclic-delay diversity. WCNC 2012: 1257-1262 - 2011
- [c4]Hui-Huang Hsu, Cheng-Ning Lee, Yu-Fan Chen:
An RFID-Based Reminder System for Smart Home. AINA 2011: 264-269 - [c3]Chih-Yang Tsai, Yu-Fan Chen, Hsu-Cheng Lu, Chi-Hung Lin, Jyh-Cherng Shieh, Chung-Wei Yen, Jeng-Lung Huang, Yung-Shun Lin, Ching-Lu Hsieh, Joe-Air Jiang:
An Application of the Wireless Sensor Network Technology for Foehn Monitoring in Real Time. UIC 2011: 12-24 - 2010
- [c2]Chia-Hsin Cheng, Ling-Cheng Hsu, Yu-Fan Chen, Yung-Fa Huang:
Joint channel estimation and fuzzy adaptive filter techniques in DS-UWB systems. SMC 2010: 4190-4196
2000 – 2009
- 2008
- [j3]Chia-Hsin Cheng, Jyh-Horng Wen, Yu-Fan Chen, Jen-Yung Lin:
Wireless Systems A robust interference cancellation technique for DS-UWB systems using fuzzy step size LMS algorithm. Eur. Trans. Telecommun. 19(2): 207-217 (2008) - [c1]Chia-Hsin Cheng, Yu-Fan Chen, Kai-Jie Chen, Yung-Fa Huang:
A robust fuzzy step size LMS algorithm for DS-UWB systems. SMC 2008: 1205-1210 - 2006
- [j2]Chia-Chang Hu, Hsuan-Yu Lin, Yu-Fan Chen, Jyh-Horng Wen:
Space-Time Joint Interference Cancellation Using Fuzzy-Inference-Based Adaptive Filtering Techniques in Frequency-Selective Multipath Channels. EURASIP J. Adv. Signal Process. 2006 (2006) - 2005
- [j1]Hsuan-Yu Lin, Chia-Chang Hu, Yu-Fan Chen, Jyh-Horng Wen:
An adaptive robust LMS employing fuzzy step size and partial update. IEEE Signal Process. Lett. 12(8): 545-548 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-16 23:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint