Yi Chen

Orcid: 0000-0003-4272-7956

Affiliations:
  • Guizhou University, College of Computer Science and Technology, China
  • Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China


According to our database1, Yi Chen authored at least 25 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SNDMI: Spyware network traffic detection method based on inducement operations.
Comput. Secur., 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

2022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022

A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images.
Int. J. Distributed Sens. Networks, 2022

Multiple Histograms Shifting-Based Video Data Hiding Using Compression Sensing.
IEEE Access, 2022

Robust Video Watermarking Using Normalized Zernike Moments.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
A blockchain-based computation offloading method for edge computing in 5G networks.
Softw. Pract. Exp., 2021

Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission.
IET Image Process., 2021

EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems.
World Wide Web, 2020

Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing.
Multim. Tools Appl., 2020

Reversible data hiding based on a modified difference expansion for H.264/AVC video streams.
Multim. Tools Appl., 2020

A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering.
Multim. Tools Appl., 2020

A novel two-dimensional reversible data hiding method with high embedding capacity in H.264/advanced video coding.
Int. J. Distributed Sens. Networks, 2020

2019
Reversible video data hiding using zero QDCT coefficient-pairs.
Multim. Tools Appl., 2019

A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

GRU-SVM Model for Synthetic Speech Detection.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
An efficient fingerprint identification algorithm based on minutiae and invariant moment.
Pers. Ubiquitous Comput., 2018

An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream.
Multim. Tools Appl., 2018

A Novel Reversible Data Hiding Employing All Quantized Nonzero AC Coefficients in JPEG Images.
CoRR, 2018

Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment.
CoRR, 2018

Energy-Efficient Computation Offloading for Multimedia Workflows in Mobile Cloud Computing.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2018

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017


  Loading...