Yongle Chen

Orcid: 0000-0002-1000-1109

According to our database1, Yongle Chen authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Blockchain-Based Authentication Scheme for Energy Trading in Electric Transportation.
IEEE Trans. Smart Grid, November, 2024

Label-Only Membership Inference Attack Based on Model Explanation.
Neural Process. Lett., October, 2024

An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.
Entropy, March, 2024

A secure fractal compression scheme based on irregular Latin square, Julia and 2D-FCICM.
Digit. Signal Process., 2024

AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale.
CoRR, 2024

Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Cross-Domain Industrial Intrusion Detection Deep Model Trained With Imbalanced Data.
IEEE Internet Things J., 2023

2022
Retransmission-Based TCP Fingerprints for Fine-Grain IoV Edge Device Identification.
IEEE Trans. Veh. Technol., 2022

Vulnerability association evaluation of Internet of thing devices based on attack graph.
Int. J. Distributed Sens. Networks, 2022

A series-connected asymmetrical PWM half-bridge three-level converter with reduced circulating current.
IEICE Electron. Express, 2022

An Asymmetrical PWM Full-bridge converter with Current-doubler Rectifier for Medium voltage applications.
Proceedings of the IEEE International Conference on Industrial Technology, 2022

Half-bridge integrated ZVS three-level DC-DC converter with Wide ZVS range and Reduced Circulting current.
Proceedings of the IEEE International Conference on Industrial Technology, 2022

2021
The Iot Malware Classification Method Based On Visual Local Features.
Proceedings of the ICNCC 2021: The 10th International Conference on Networks, Communication and Computing, Beijing, China, December 10, 2021

2020
A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification.
Sensors, 2020

Location-Aware Wi-Fi Authentication Scheme Using Smart Contract.
Sensors, 2020

Large-Scale IoT Devices Firmware Identification Based on Weak Password.
IEEE Access, 2020

Cross-Layer Protocol Fingerprint for Large-Scale Fine-Grain Devices Identification.
IEEE Access, 2020

Trusted Cloud Service Selection Algorithm Based on Lightweight Intuitionistic Fuzzy Numbers.
IEEE Access, 2020

Exploring Shodan From the Perspective of Industrial Control Systems.
IEEE Access, 2020

Towards Pattern-aware Privacy-preserving Real-time Data Collection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan.
IEEE Access, 2019

2018
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph).
计算机科学, 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

Localizing Access Point Through Simple Gesture.
IEEE Access, 2018

Malware Variants Detection Using Behavior Destructive Features.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

2017
Discovering Routers as Secondary Landmarks for Accurate IP Geolocation.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

An improved P2P file system scheme based on IPFS and Blockchain.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2015
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2015

2014
Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop.
Int. J. Distributed Sens. Networks, 2014

Optimization of Sampling Cell Size for Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2014

LARES: latency-reduced neighbour discovery for contagious diseases prevention.
Int. J. Ad Hoc Ubiquitous Comput., 2014

2013
Efficient Deterministic Anchor Deployment for Sensor Network Positioning.
Int. J. Distributed Sens. Networks, 2013

2011
Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011


  Loading...