Yonghong Chen

Orcid: 0009-0000-9030-0266

According to our database1, Yonghong Chen authored at least 122 papers between 1997 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Covert timing channel detection based on isolated binary trees.
Comput. Secur., 2025

2024
A generalized detection framework for covert timing channels based on perceptual hashing.
Trans. Emerg. Telecommun. Technol., May, 2024

Adaptive protocol-based control for reaction-diffusion memristive neural networks with semi-Markov switching parameters.
Inf. Sci., 2024

Adaptive fuzzy filtering for multi-area power systems subject to nonhomogeneous sojourn probabilities.
Inf. Sci., 2024

Market Implications of Alternative Operating Reserve Modeling in Wholesale Electricity Markets.
CoRR, 2024

2023
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023

The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process.
Future Internet, February, 2023

Optimization Formulations for Storage Devices with Disjoint Operating Modes.
Oper. Res., 2023

A Helium Speech Unscrambling Algorithm Based on Deep Learning.
Inf., 2023

Elastically-Constrained Meta-Learner for Federated Learning.
CoRR, 2023

A Computational Efficient Pumped Storage Hydro Optimization in the Look-ahead Unit Commitment and Real-time Market Dispatch Under Uncertainty.
CoRR, 2023

ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network.
Proceedings of the 2023 4th International Conference on Computing, 2023

Detection of Network Time Covert Channels Based on Image Processing.
Proceedings of the 2023 4th International Conference on Computing, 2023

2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022

An Overview of Knowledge Graph Reasoning: Key Technologies and Applications.
J. Sens. Actuator Networks, 2022

Towards Comprehensive Testing on the Robustness of Cooperative Multi-agent Reinforcement Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

2021
Detection of Covert Timing Channel Based on Time Series Symbolization.
IEEE Open J. Commun. Soc., 2021

Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network.
IEEE Open J. Comput. Soc., 2021

Helmet Detection Based on Deep Learning and Random Forest on UAV for Power Construction Safety.
J. Adv. Comput. Intell. Intell. Informatics, 2021

A Deep Learning Prediction Model for Structural Deformation Based on Temporal Convolutional Networks.
Comput. Intell. Neurosci., 2021

Research on Manipulation Strategy and Flight Test of the Quad Tilt Rotor in Conversion Process.
IEEE Access, 2021

2020
Energy Efficiency Analysis and Optimization of Multiantenna Heterogeneous Cellular Networks Modeled by Matérn Hard-core Point Process.
KSII Trans. Internet Inf. Syst., 2020

A Perceptual Hash-based Approach to Detect Covert Timing Channels.
Int. J. Netw. Secur., 2020

StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020

A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis.
Int. J. Netw. Secur., 2020

Data collection from WSNs to the cloud based on mobile Fog elements.
Future Gener. Comput. Syst., 2020

A network covert timing channel detection method based on threshold secret sharing.
Trans. Emerg. Telecommun. Technol., 2020

A Configuration Based Pumped Storage Hydro Model in MISO Day-Ahead Market.
CoRR, 2020

SDOD: Real-time Segmenting and Detecting 3D Objects by Depth.
CoRR, 2020

Symmetric Peaks-Based Spectrum Sensing Algorithm for Detecting Modulated Signals.
IEEE Access, 2020

Tilting Path Optimization of Tilt Quad Rotor in Conversion Process Based on Ant Colony Optimization Algorithm.
IEEE Access, 2020

Static Output Feedback Control for Fuzzy Systems With Stochastic Fading Channel and Actuator Faults.
IEEE Access, 2020

Helium Speech Correction Algorithm Based on Deep Neural Networks.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Spectrum Sensing Algorithm Based on Real-time Likelihood Ratio in Cognitive Networks.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2020

2019
Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019

Traffic Data Imputation Algorithm Based on Improved Low-Rank Matrix Decomposition.
J. Sensors, 2019

Three Kinds of Network Security Situation Awareness Model Based on Big Data.
Int. J. Netw. Secur., 2019

A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network.
Int. J. Netw. Secur., 2019

A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network.
Int. J. Netw. Secur., 2019

Network Security Situation Assessment Based on Text SimHash in Big Data Environment.
Int. J. Netw. Secur., 2019

A collusion-resistant public auditing scheme for shared cloud data.
Int. J. Inf. Technol. Manag., 2019

Public Auditing for Trusted Cloud Storage Services.
IEEE Secur. Priv., 2019

An Efficient Iterative Algorithm for Convex Hull Pricing Problems on MISO Case Studies.
CoRR, 2019

An Integral Formulation and Convex Hull Pricing for Unit Commitment.
CoRR, 2019

A Neighborhood-Assisted Framework for Differential Evolution.
IEEE Access, 2019

Performance Analysis of Two-Tier Heterogeneous Cellular Networks Based on Poisson Hard-Core Process.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018

An Enhanced Single-Pair Learning-Based Reflectance Fusion Algorithm with Spatiotemporally Extended Training Samples.
Remote. Sens., 2018

StegTab: Steganography in Guitar Tablatures.
J. Inf. Hiding Multim. Signal Process., 2018

Differential evolution with individual-dependent topology adaptation.
Inf. Sci., 2018

Social learning differential evolution.
Inf. Sci., 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018

Energy-efficient relay tracking with multiple mobile camera sensors.
Comput. Networks, 2018

Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017

Distributed steganalysis of compressed speech.
Soft Comput., 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Neighborhood guided differential evolution.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017

Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017

Cryptanalysis and improvement of a quantum private set intersection protocol.
Quantum Inf. Process., 2017

Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mob. Inf. Syst., 2017

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP.
KSII Trans. Internet Inf. Syst., 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System.
IEEE Commun. Lett., 2017

Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Commun. Lett., 2017

Interoperable localization for mobile group users.
Comput. Commun., 2017

Neighborhood-adaptive differential evolution for global numerical optimization.
Appl. Soft Comput., 2017

The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017

Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017

Secure Logging and Public Audit for Operation Behavior in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Rumor restraining based on propagation prediction with limited observations in large-scale social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Cellular direction information based differential evolution for numerical optimization: an empirical study.
Soft Comput., 2016

Adaptive direction information in differential evolution for numerical optimization.
Soft Comput., 2016

Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016

两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2016

一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol).
计算机科学, 2016

Energy Efficiency Analysis of Multi-Antenna Heterogeneous Relay-Assisted Cellular Network via Stochastic Geometry.
J. Commun., 2016

Neighbor-index-division steganography based on QIM method for G.723.1 speech streams.
J. Ambient Intell. Humaniz. Comput., 2016

Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Novel Connection Correlation Scheme Based on Threshold Secret Sharing.
IEEE Commun. Lett., 2016

Improving differential evolution with a new selection method of parents for mutation.
Frontiers Comput. Sci., 2016

Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

Operational-Behavior Auditing in Cloud Storage.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Optimal matrix embedding for Voice-over-IP steganography.
Signal Process., 2015

Opportunistic Spectrum Access in Imperfect Spectrum Sensing Cognitive Networks.
J. Commun., 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015

Improved adaptive partial-matching steganography for Voice over IP.
Comput. Commun., 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015

Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

2014
DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy.
IEEE Commun. Lett., 2014

Continuous tracking for mobile targets with mobility nodes in WSNs.
Proceedings of the International Conference on Smart Computing, 2014

A spectrum trading algorithm using an agent in cognitive radio networks.
Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2014

Improving Differential Evolution with Ring Topology-Based Mutation Operators.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Validation of Chaos Hypothesis in NADA and Improved DDoS Detection Algorithm.
IEEE Commun. Lett., 2013

DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory.
IEEE Commun. Lett., 2013

The Three-Dimensional Modeling of Femur.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A Novel Worm Drive for Rehabilitation Robot Joint.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
Digital Image Watermarking Based on Mixed Error Correcting Code.
J. Information Security, 2012

MISO Unlocks Billions in Savings Through the Application of Operations Research for Energy and Ancillary Services Markets.
Interfaces, 2012

Digital image watermarking based on Super-Resolution Image Reconstruction.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Web Platform API Design Principles and Service Contract.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2009
Dynamics on networks: assessing functional connectivity with Granger causality.
Comput. Math. Organ. Theory, 2009

2008
Estimating Granger causality after stimulus onset: A cautionary note.
NeuroImage, 2008

Prestimulus Cortical Activity is Correlated with Speed of Visuomotor Processing.
J. Cogn. Neurosci., 2008

Fast Algorithms for Detecting Circular VAR Flows in Large Power-Flow Models.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Detecting Effective Connectivity in Human Brain using Granger Causality.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Testing for Statistical Significance in Bispectra: A Surrogate Data Approach and Application to Neuroscience.
IEEE Trans. Biomed. Eng., 2007

Revealing the dynamic causal interdependence between neural and muscular signals in Parkinsonian tremor.
J. Frankl. Inst., 2007

Granger Causality between Multiple Interdependent Neurobiological Time Series: Blockwise versus Pairwise Methods.
Int. J. Neural Syst., 2007

2006
Top-Down Cortical Influences in Visual Expectation.
Proceedings of the International Joint Conference on Neural Networks, 2006

A New Secure Communication Scheme Based on Synchronization of Chaotic System.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

2005
Coping with trial-to-trial variability of event related signals: A Bayesian inference approach.
Proceedings of the 13th European Signal Processing Conference, 2005

2004
Is partial coherence a viable technique for identifying generators of neural oscillations?
Biol. Cybern., 2004

2003
Analyzing stability of equilibrium points in neural networks: a general approach.
Neural Networks, 2003

Dynamic properties and a new learning mechanism in higher order neural networks.
Neurocomputing, 2003

1997
They are Just Butterflies.
Proceedings of the Computing and Combinatorics, Third Annual International Conference, 1997


  Loading...