Chen Dong

Orcid: 0000-0001-7546-3403

Affiliations:
  • Fuzhou University, College of Mathematics and Computer Science, China


According to our database1, Chen Dong authored at least 53 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A knowledge-augmented heterogeneous graph convolutional network for aspect-level multimodal sentiment analysis.
Comput. Speech Lang., April, 2024

ATAL: Active Learning Using Adversarial Training for Data Augmentation.
IEEE Internet Things J., February, 2024

Reactant and Waste Minimization during Sample Preparation on Micro-Electrode-Dot-Array Digital Microfluidic Biochips using Splitting Trees.
J. Electron. Test., February, 2024

PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices.
Sensors, January, 2024

Multi-view multi-behavior interest learning network and contrastive learning for multi-behavior recommendation.
Knowl. Based Syst., 2024

Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips.
J. King Saud Univ. Comput. Inf. Sci., 2024

malDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

2023
A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

A privilege-constrained sanitizable signature scheme for e-health systems.
J. Syst. Archit., September, 2023

A dynamic distributed edge-cloud manufacturing with improved ADMM algorithms for mass personalization production.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Improving BERT with local context comprehension for multi-turn response selection in retrieval-based dialogue systems.
Comput. Speech Lang., July, 2023

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection.
Sensors, 2023

A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare.
IEEE Access, 2023

A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

AntiMal: an Approach of Malware Detection Employing Swin Transformer.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Blockchain-based Searchable Encryption Scheme for Spatial Text Data.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Efficient and Reliable Federated Recommendation System in Temporal Scenarios.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Text Summarization Generation Based on Improved Transformer Model.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Novel Fast Video Fragment Matching Algorithm for Copyright Protection.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense.
ACM Trans. Design Autom. Electr. Syst., 2022

The structural weight design method based on the modified grasshopper optimization algorithm.
Multim. Tools Appl., 2022

Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
6G Mobile Communications for Multi-Robot Smart Factory.
J. ICT Stand., 2021

Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection.
Future Gener. Comput. Syst., 2021

BotDetector: An extreme learning machine-based Internet of Things botnet detection model.
Trans. Emerg. Telecommun. Technol., 2021

Overlapping Community Detection Based on Attribute Augmented Graph.
Entropy, 2021

A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

HTtext: A TextCNN-based pre-silicon detection for hardware Trojans.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

2020
Hardware Trojans in Chips: A Survey for Detection and Prevention.
Sensors, 2020

Multimedia access control with secure provenance in fog-cloud computing networks.
Multim. Tools Appl., 2020

Detection of Algorithmically Generated Domain Names Using the Recurrent Convolutional Neural Network with Spatial Pyramid Pooling.
Entropy, 2020

Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation.
Entropy, 2020

An Unsupervised Detection Approach for Hardware Trojans.
IEEE Access, 2020

A Survey of DMFBs Security: State-of-the-Art Attack and Defense.
Proceedings of the 21st International Symposium on Quality Electronic Design, 2020

HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things.
Int. J. Distributed Sens. Networks, 2019

A method for indoor Wi-Fi location based on improved back propagation neural network.
Turkish J. Electr. Eng. Comput. Sci., 2019

A Locating Method for Multi-Purposes HTs Based on the Boundary Network.
IEEE Access, 2019

The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT.
IEEE Access, 2019

Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization.
IEEE Access, 2019

A Multi-Layer Hardware Trojan Protection Framework for IoT Chips.
IEEE Access, 2019

QSSA: Quantum Evolutionary Salp Swarm Algorithm for Mechanical Design.
IEEE Access, 2019

2018
A Chaotic Artificial Bee Colony Algorithm Based on Lévy Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2008
A Method of Self-Adaptive Inertia Weight for PSO.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...