Yuancheng Li

Orcid: 0000-0002-7227-7362

According to our database1, Yuancheng Li authored at least 104 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vehicle-to-Vehicle Energy Sharing Scheme: A Privacy-Preserving Solution Based on Local Differential Privacy Method.
IEEE Netw., November, 2024

Detection and Mitigation of Label-Flipping Attacks in FL Systems With KL Divergence.
IEEE Internet Things J., October, 2024

Node-Smoothness-Based Adaptive Initial Residual Deep Graph Convolutional Network.
IEEE Internet Things J., July, 2024

Motion-Compensation Control of Supernumerary Robotic Arms Subject to Human-Induced Disturbances.
Adv. Intell. Syst., May, 2024

TSCW-GAN Based FDIAs Defense for State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks.
IEEE Trans. Ind. Informatics, April, 2024

Advancing multi-party quantum key agreement protocols: the power of a two-layer approach.
Quantum Inf. Process., March, 2024

Configuration Design and Analysis of Reconfigurable Supernumerary Robotic Legs for Multitask Adaptation: SuperLegs.
Adv. Intell. Syst., March, 2024

V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm.
IEEE Trans. Netw. Sci. Eng., 2024

Local Differential Privacy-Based Privacy-Preserving Data Range Query Scheme for Electric Vehicle Charging.
IEEE Trans. Netw. Sci. Eng., 2024

DDoS attack detection in smart grid network using reconstructive machine learning models.
PeerJ Comput. Sci., 2024

PharmGPT: Domain-Specific Large Language Models for Bio-Pharmaceutical and Chemistry.
CoRR, 2024

Sparse Generation: Making Pseudo Labels Sparse for weakly supervision with points.
CoRR, 2024

Deep learning-based method for recognizing violation behaviors of underground personnel.
Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning, 2024

Enhancing Non-Coal Object Recognition Using Deep Learning on Conveyor Belts.
Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning, 2024

DDoS Attack Detection in Smart Grid Networks Using Visual Features.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

2023
Edge Computing With Complementary Capsule Networks for Mental State Detection in Underground Mining Industry.
IEEE Trans. Ind. Informatics, July, 2023

TPCaps: a framework for code clone detection and localization based on improved CapsNet.
Appl. Intell., July, 2023

Multi-constraints in deep graph convolutional networks with initial residual.
Appl. Intell., June, 2023

Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System.
IEEE Trans. Smart Grid, May, 2023

Virtual network function deployment algorithm based on graph convolution deep reinforcement learning.
J. Supercomput., April, 2023

Real-Time Cost Optimization Approach Based on Deep Reinforcement Learning in Software-Defined Security Middle Platform.
Inf., April, 2023

Multilabel Recognition Algorithm With Multigraph Structure.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Vision mechanism model using brain-computer interface for light sensing.
Int. J. Mach. Learn. Cybern., 2023

Automatic Compilation of CNN on Reconfigurable Array Processor Based on Scalable Instruction Group Library.
IEEE Access, 2023

Dynamic Multi-bit Parallel Computing Method Based on Reconfigurable Structure.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Not All Resources are Visible: Exploiting Fragmented Shadow Resources in Shared-State Scheduler Architecture.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

2022
Edge Computing Offloading Strategy Based on Dynamic Non-cooperative Games in D-IoT.
Wirel. Pers. Commun., 2022

False Phasor Data Detection Under Time Synchronization Attacks: A Neural Network Approach.
IEEE Trans. Smart Grid, 2022

Alertness Estimation Using Connection Parameters of the Brain Network.
IEEE Trans. Intell. Transp. Syst., 2022

Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling.
IEEE Syst. J., 2022

CLSQL: Improved Q-Learning Algorithm Based on Continuous Local Search Policy for Mobile Robot Path Planning.
Sensors, 2022

SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks.
PeerJ Comput. Sci., 2022

Cost-aware real-time job scheduling for hybrid cloud using deep reinforcement learning.
Neural Comput. Appl., 2022

An Efficient Method of Tooth Segmentation Under Massive Medical Data.
J. Database Manag., 2022

An Improved PMU Data Manipulation Attack Model.
J. Circuits Syst. Comput., 2022

An edge computing method using a novel mode component for power transmission line fault diagnosis in distribution network.
J. Ambient Intell. Humaniz. Comput., 2022

Elliptical convolution kernel: More real visual field.
Neurocomputing, 2022

Identity authentication for edge devices based on zero-trust architecture.
Concurr. Comput. Pract. Exp., 2022

Attention-based fusion factor in FPN for object detection.
Appl. Intell., 2022

A software-defined security middle platform architecture.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

2021
A Consortium Blockchain-Enabled Secure and Privacy-Preserving Optimized Charging and Discharging Trading Scheme for Electric Vehicles.
IEEE Trans. Ind. Informatics, 2021

Quantum-based anonymity and secure veto.
Quantum Inf. Process., 2021

Quantum Bell states-based anonymous voting with anonymity trace.
Quantum Inf. Process., 2021

Differential privacy EV charging data release based on variable window.
PeerJ Comput. Sci., 2021

Poisonous Label Attack: Black-Box Data Poisoning Attack with Enhanced Conditional DCGAN.
Neural Process. Lett., 2021

CyclicNet: an alternately updated network for semantic segmentation.
Multim. Tools Appl., 2021

Non-maximum suppression for object detection based on the chaotic whale optimization algorithm.
J. Vis. Commun. Image Represent., 2021

Confident sequence learning: A sequence class-label noise filtering technique to improve scene digit recognition.
J. Intell. Fuzzy Syst., 2021

Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack.
IEEE Internet Things J., 2021

False Data Injection Attack and Defense Method on Load Frequency Control.
IEEE Internet Things J., 2021

Authenticated Quantum Sortition and Application in "Picking at Random" Problems.
IEEE Commun. Lett., 2021

Maximum weight multi-modal information fusion algorithm of electroencephalographs and face images for emotion recognition.
Comput. Electr. Eng., 2021

A coloring and timing brain-computer interface for the nursing bed robot.
Comput. Electr. Eng., 2021

RetinexGAN: Unsupervised Low-Light Enhancement With Two-Layer Convolutional Decomposition Networks.
IEEE Access, 2021

Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Support Vector Machine of Particle Swarm Optimization For Motor Imagery Recognition using Feature Fusion.
Proceedings of the ICCPR '21: 10th International Conference on Computing and Pattern Recognition, Shanghai, China, October 15, 2021

2020
An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain.
IEEE Trans. Smart Grid, 2020

Online Generative Adversary Network Based Measurement Recovery in False Data Injection Attacks: A Cyber-Physical Approach.
IEEE Trans. Ind. Informatics, 2020

Quantum anonymous ranking and selection with verifiability.
Quantum Inf. Process., 2020

Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system.
J. Syst. Archit., 2020

A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing.
Inf. Secur. J. A Glob. Perspect., 2020

Semantically find similar binary codes with mixed key instruction sequence.
Inf. Softw. Technol., 2020

Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory.
IET Cyper-Phys. Syst.: Theory & Appl., 2020

2019
An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks.
J. Netw. Comput. Appl., 2019

Denial of service attack and defense method on load frequency control system.
J. Frankl. Inst., 2019

Intelligent terminal face spoofing detection algorithm based on deep belief network.
J. Electronic Imaging, 2019

Privacy-preserving lightweight face recognition.
Neurocomputing, 2019

Using Deep Neural Network for Android Malware Detection.
CoRR, 2019

Android Malware Detection Using Autoencoder.
CoRR, 2019

Parallel Fast Pencil Drawing Generation Algorithm Based on GPU.
IEEE Access, 2019

Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network.
IEEE Access, 2019

Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid.
IEEE Access, 2019

False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid.
IEEE Access, 2019

Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network.
IEEE Access, 2019

A Parallel Retinex Image Enhancement Algorithm Based on OpenMP.
Proceedings of the Network and Parallel Computing, 2019

An Improved Programming Model for Thread-Level Speculation.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

A Deformation Method in a Wrapping Manner for Virtual Gingiva Based on Mass-Spring Model.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2019

A Parallel BMH String Matching Algorithm Based on OpenMP.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

CRbS: A Code Reordering Based Speeding-up Method of Irregular Loops on CMP.
Proceedings of the 30th IEEE International Conference on Application-specific Systems, 2019

2018
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks.
Secur. Commun. Networks, 2018

A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing.
J. Inf. Hiding Multim. Signal Process., 2018

Web spam classification method based on deep belief networks.
Expert Syst. Appl., 2018

A Review on The Use of Deep Learning in Android Malware Detection.
CoRR, 2018

Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication.
Adv. Multim., 2018

An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Face aging effect simulation model based on multilayer representation and shearlet transform.
J. Electronic Imaging, 2017

Exploring thread-level parallelism based on cost-driven model for irregular programs.
Proceedings of the 2017 IEEE International Conference on Signal Processing, 2017

2016
Short-Term Load Forecasting Based on the Analysis of User Electricity Behavior.
Algorithms, 2016

2012
A Data Structure Centric Method and Execution Model for Partitioning Sequential Programs into Multiple Speculative Threads.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2011
Speculative Thread Partitioning Using Fuzzy C-means Clustering.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
Image compression scheme based on curvelet transform and support vector machine.
Expert Syst. Appl., 2010

A Cost Estimation Model for Speculative Thread Partitioning.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

Optimistic Parallelism Based on Speculative Asynchronous Messages Passing.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

2009
An approach for multi-agent coordination based on semantic approximation.
Int. J. Intell. Inf. Database Syst., 2009

A Novel Method to Extract Informative Blocks from Web Pages.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

2008
A Framework of User Model Based on Semi-Supervised Techniques.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Fast Adaptive Wavelet for Remote Sensing Image Compression.
J. Comput. Sci. Technol., 2007

Image Digital Watermarking Technique Based on Kernel Independent Component Analysis.
Proceedings of the Rough Sets, 2007

A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Image Compression Using Wavelet Support Vector Machines.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2005
SVM Regression and Its Application to Image Compression.
Proceedings of the Advances in Intelligent Computing, 2005

2003
Wavelet and Support Vector Machines for Short-Term Electrical Load Forecasting.
Proceedings of the Wavelet Analysis and Its Applications, 2003

Application of Fuzzy Support Vector Machines in Short-Term Load Forecasting.
Proceedings of the Rough Sets, 2003

Rough Set Methods for Constructing Support Vector Machines.
Proceedings of the Rough Sets, 2003


  Loading...