Jinrong Chen

Orcid: 0000-0002-5572-6226

According to our database1, Jinrong Chen authored at least 19 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An improved lightweight object detection algorithm for YOLOv5.
PeerJ Comput. Sci., 2024

Fast communication technology for GOOSE pre-emptive transmission in large background traffic.
Int. J. Grid Util. Comput., 2024

Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024

Application and research of clothing fabric identification based on cloud, edge and end intellisense.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

Enhancing Path Planning in UAVs: an Improved Goal-Biased RRT Algorithm for Complex 3D Environments.
Proceedings of the 3rd International Conference on Artificial Intelligence, 2024

2023
Improved deep learning image classification algorithm based on Swin Transformer V2.
PeerJ Comput. Sci., 2023

2022
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System.
IEEE Trans. Dependable Secur. Comput., 2022

A Spatio-Temporal Data-Driven Automatic Control Method for Smart Home Services.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

2020
Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things.
Symmetry, 2020

Estimation of Heart Rate and Respiratory Rate from PPG Signal Using Complementary Ensemble Empirical Mode Decomposition with both Independent Component Analysis and Non-Negative Matrix Factorization.
Sensors, 2020

A Malware Classification Method Based on Basic Block and CNN.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

A Malware Detection Method Based on Rgb Image.
Proceedings of the ICCAI '20: 2020 6th International Conference on Computing and Artificial Intelligence, 2020

SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Singular spectral analysis-based denoising without computing singular values via augmented Lagrange multiplier algorithm.
IET Signal Process., 2019

Computer cryptography through performing chaotic modulation on intrinsic mode functions with non-dyadic number of encrypted signals.
IET Signal Process., 2019

Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2014
Granular neural networks.
Artif. Intell. Rev., 2014

2013
Research on using genetic algorithms to optimize Elman neural networks.
Neural Comput. Appl., 2013

2010
An Improved BP Neural Network Algorithm Based on Factor Analysis.
J. Convergence Inf. Technol., 2010


  Loading...