Min-Rong Chen

Orcid: 0000-0001-9817-0267

According to our database1, Min-Rong Chen authored at least 52 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace.
IEEE Internet Things J., April, 2024

Enabling Secure and Flexible Streaming Media With Blockchain Incentive.
IEEE Internet Things J., January, 2024

DoFA: Adversarial examples detection for SAR images by dual-objective feature attribution.
Expert Syst. Appl., 2024

Enabling Privacy-Preserving and Publicly Auditable Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024

2023
TransMCGC: a recast vision transformer for small-scale image classification tasks.
Neural Comput. Appl., April, 2023

IFA-EO: An improved firefly algorithm hybridized with extremal optimization for continuous unconstrained optimization problems.
Soft Comput., March, 2023

An improved Harris Hawks optimizer combined with extremal optimization.
Int. J. Mach. Learn. Cybern., March, 2023

2022
GID: Global information distillation for medical semantic segmentation.
Neurocomputing, 2022

2021
BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle.
IEEE Trans. Veh. Technol., 2021

An improved bat algorithm hybridized with extremal optimization and Boltzmann selection.
Expert Syst. Appl., 2021

2020
An adaptive fractional-order BP neural network based on extremal optimization for handwritten digits recognition.
Neurocomputing, 2020

2019
Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems.
Swarm Evol. Comput., 2019

An improved artificial bee colony algorithm combined with extremal optimization and Boltzmann Selection probability.
Swarm Evol. Comput., 2019

A hybrid universal blind quantum computation.
Inf. Sci., 2019

A many-objective population extremal optimization algorithm with an adaptive hybrid mutation operation.
Inf. Sci., 2019

A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM.
IEEE Internet Things J., 2019

2018
A decomposition-based multi-objective evolutionary algorithm with quality indicator.
Swarm Evol. Comput., 2018

Population extremal optimization-based extended distributed model predictive load frequency control of multi-area interconnected power systems.
J. Frankl. Inst., 2018

A new hybrid memetic multi-objective optimization algorithm for multi-objective optimization.
Inf. Sci., 2018

Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model.
Int. J. Netw. Secur., 2018

2017
An artificial bee colony algorithm for multi-objective optimisation.
Appl. Soft Comput., 2017

An Efficient Algorithm for Constructing Underwater Sensor Barrier.
Proceedings of the Communications and Networking, 2017

2016
An improved multi-objective population-based extremal optimization algorithm with polynomial mutation.
Inf. Sci., 2016

A novel real-coded population-based extremal optimization algorithm with polynomial mutation: A non-parametric statistical study on continuous optimization problems.
Neurocomputing, 2016

Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense.
Intell. Autom. Soft Comput., 2016

Fully secure fuzzy identity-based encryption for secure IoT communications.
Comput. Stand. Interfaces, 2016

2015
A novel hybrid shuffled frog leaping algorithm for vehicle routing problem with time windows.
Inf. Sci., 2015

Design of fractional order PID controller for automatic regulator voltage system based on multi-objective extremal optimization.
Neurocomputing, 2015

Design of multivariable PID controllers using real-coded population-based extremal optimization.
Neurocomputing, 2015

2014
Efficient hierarchical identity-based encryption for Mobile Ad hoc Networks.
Mob. Inf. Syst., 2014

Binary-coded extremal optimization for the design of PID controllers.
Neurocomputing, 2014

Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014

Hybrid shuffled frog leaping algorithm for energy-efficient dynamic consolidation of virtual machines in cloud data centers.
Expert Syst. Appl., 2014

Improved Shuffled Frog Leaping Algorithm and its multi-phase model for multi-depot vehicle routing problem.
Expert Syst. Appl., 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014

Multi-phase modified shuffled frog leaping algorithm with extremal optimization for the MDVRP and the MDVRPTW.
Comput. Ind. Eng., 2014

A novel Artificial Bee Colony algorithm with integration of extremal optimization for numerical optimization problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Cryptanalysis of a Certificateless Proxy Re-encryption Scheme.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Constant Size Hierarchical Identity-Based Encryption Tightly Secure in the Full Model without Random Oracles.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
An improved shuffled frog-leaping algorithm with extremal optimisation for continuous optimisation.
Inf. Sci., 2012

A Novel Meta-heuristic for the Multi-depot Vehicle Routing Problem.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009.
J. Inf. Sci. Eng., 2011

Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

An Improved Shuffled Frog-Leaping Algorithm for Job-Shop Scheduling Problem.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

2010
Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010

A novel particle swarm optimizer hybridized with extremal optimization.
Appl. Soft Comput., 2010

2009
On the Security of a Conditional Proxy Re-Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Multiobjective optimization using population-based extremal optimization.
Neural Comput. Appl., 2008

A novel elitist multiobjective optimization algorithm: Multiobjective extremal optimization.
Eur. J. Oper. Res., 2008

2007
Studies on Extremal Optimization and Its Applications in Solving RealWorld Optimization Problems.
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007

2006
Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained Optimization.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...