Yuancheng Li
Orcid: 0000-0002-7227-7362
According to our database1,
Yuancheng Li
authored at least 104 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Vehicle-to-Vehicle Energy Sharing Scheme: A Privacy-Preserving Solution Based on Local Differential Privacy Method.
IEEE Netw., November, 2024
IEEE Internet Things J., October, 2024
IEEE Internet Things J., July, 2024
Motion-Compensation Control of Supernumerary Robotic Arms Subject to Human-Induced Disturbances.
Adv. Intell. Syst., May, 2024
TSCW-GAN Based FDIAs Defense for State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks.
IEEE Trans. Ind. Informatics, April, 2024
Advancing multi-party quantum key agreement protocols: the power of a two-layer approach.
Quantum Inf. Process., March, 2024
Configuration Design and Analysis of Reconfigurable Supernumerary Robotic Legs for Multitask Adaptation: SuperLegs.
Adv. Intell. Syst., March, 2024
V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm.
IEEE Trans. Netw. Sci. Eng., 2024
Local Differential Privacy-Based Privacy-Preserving Data Range Query Scheme for Electric Vehicle Charging.
IEEE Trans. Netw. Sci. Eng., 2024
DDoS attack detection in smart grid network using reconstructive machine learning models.
PeerJ Comput. Sci., 2024
PharmGPT: Domain-Specific Large Language Models for Bio-Pharmaceutical and Chemistry.
CoRR, 2024
CoRR, 2024
Deep learning-based method for recognizing violation behaviors of underground personnel.
Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning, 2024
Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning, 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
2023
Edge Computing With Complementary Capsule Networks for Mental State Detection in Underground Mining Industry.
IEEE Trans. Ind. Informatics, July, 2023
TPCaps: a framework for code clone detection and localization based on improved CapsNet.
Appl. Intell., July, 2023
Appl. Intell., June, 2023
Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System.
IEEE Trans. Smart Grid, May, 2023
Virtual network function deployment algorithm based on graph convolution deep reinforcement learning.
J. Supercomput., April, 2023
Real-Time Cost Optimization Approach Based on Deep Reinforcement Learning in Software-Defined Security Middle Platform.
Inf., April, 2023
IEEE Trans. Circuits Syst. Video Technol., February, 2023
Int. J. Mach. Learn. Cybern., 2023
Automatic Compilation of CNN on Reconfigurable Array Processor Based on Scalable Instruction Group Library.
IEEE Access, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Not All Resources are Visible: Exploiting Fragmented Shadow Resources in Shared-State Scheduler Architecture.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
2022
Wirel. Pers. Commun., 2022
False Phasor Data Detection Under Time Synchronization Attacks: A Neural Network Approach.
IEEE Trans. Smart Grid, 2022
IEEE Trans. Intell. Transp. Syst., 2022
Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling.
IEEE Syst. J., 2022
CLSQL: Improved Q-Learning Algorithm Based on Continuous Local Search Policy for Mobile Robot Path Planning.
Sensors, 2022
SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks.
PeerJ Comput. Sci., 2022
Cost-aware real-time job scheduling for hybrid cloud using deep reinforcement learning.
Neural Comput. Appl., 2022
J. Database Manag., 2022
An edge computing method using a novel mode component for power transmission line fault diagnosis in distribution network.
J. Ambient Intell. Humaniz. Comput., 2022
Concurr. Comput. Pract. Exp., 2022
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022
2021
A Consortium Blockchain-Enabled Secure and Privacy-Preserving Optimized Charging and Discharging Trading Scheme for Electric Vehicles.
IEEE Trans. Ind. Informatics, 2021
Quantum Inf. Process., 2021
PeerJ Comput. Sci., 2021
Poisonous Label Attack: Black-Box Data Poisoning Attack with Enhanced Conditional DCGAN.
Neural Process. Lett., 2021
Multim. Tools Appl., 2021
Non-maximum suppression for object detection based on the chaotic whale optimization algorithm.
J. Vis. Commun. Image Represent., 2021
Confident sequence learning: A sequence class-label noise filtering technique to improve scene digit recognition.
J. Intell. Fuzzy Syst., 2021
Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Commun. Lett., 2021
Maximum weight multi-modal information fusion algorithm of electroencephalographs and face images for emotion recognition.
Comput. Electr. Eng., 2021
Comput. Electr. Eng., 2021
RetinexGAN: Unsupervised Low-Light Enhancement With Two-Layer Convolutional Decomposition Networks.
IEEE Access, 2021
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
Support Vector Machine of Particle Swarm Optimization For Motor Imagery Recognition using Feature Fusion.
Proceedings of the ICCPR '21: 10th International Conference on Computing and Pattern Recognition, Shanghai, China, October 15, 2021
2020
An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain.
IEEE Trans. Smart Grid, 2020
Online Generative Adversary Network Based Measurement Recovery in False Data Injection Attacks: A Cyber-Physical Approach.
IEEE Trans. Ind. Informatics, 2020
Quantum Inf. Process., 2020
Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system.
J. Syst. Archit., 2020
Inf. Secur. J. A Glob. Perspect., 2020
Inf. Softw. Technol., 2020
Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory.
IET Cyper-Phys. Syst.: Theory & Appl., 2020
2019
An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks.
J. Netw. Comput. Appl., 2019
J. Frankl. Inst., 2019
J. Electronic Imaging, 2019
Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network.
IEEE Access, 2019
IEEE Access, 2019
False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Network and Parallel Computing, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
A Deformation Method in a Wrapping Manner for Virtual Gingiva Based on Mass-Spring Model.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 30th IEEE International Conference on Application-specific Systems, 2019
2018
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks.
Secur. Commun. Networks, 2018
A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing.
J. Inf. Hiding Multim. Signal Process., 2018
Expert Syst. Appl., 2018
Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication.
Adv. Multim., 2018
An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2017
Face aging effect simulation model based on multilayer representation and shearlet transform.
J. Electronic Imaging, 2017
Exploring thread-level parallelism based on cost-driven model for irregular programs.
Proceedings of the 2017 IEEE International Conference on Signal Processing, 2017
2016
Algorithms, 2016
2012
A Data Structure Centric Method and Execution Model for Partitioning Sequential Programs into Multiple Speculative Threads.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
Expert Syst. Appl., 2010
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010
2009
Int. J. Intell. Inf. Database Syst., 2009
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009
2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
2007
J. Comput. Sci. Technol., 2007
Proceedings of the Rough Sets, 2007
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
2005
Proceedings of the Advances in Intelligent Computing, 2005
2003
Wavelet and Support Vector Machines for Short-Term Electrical Load Forecasting.
Proceedings of the Wavelet Analysis and Its Applications, 2003
Proceedings of the Rough Sets, 2003
Proceedings of the Rough Sets, 2003