Yulei Chen

Orcid: 0009-0007-0447-0682

According to our database1, Yulei Chen authored at least 22 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combinatorial Identities Concerning Binomial Quotients.
Symmetry, June, 2024

Exploring Explicit Definite Integral Formulae with Trigonometric and Hyperbolic Functions.
Axioms, April, 2024

A complementary ternary inverter based on the line tunneling field effect transistors.
Microelectron. J., 2024

A novel nanosheet reconfigurable field effect transistor with dual-doped source/drain.
Microelectron. J., 2024

A method of multidimensional software aging prediction based on ensemble learning: A case of Android OS.
Inf. Softw. Technol., 2024

Optimization model for fair judging of large-scale innovation contests based on experts' neutral weights.
Expert Syst. Appl., 2024

2023
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography.
Multim. Tools Appl., May, 2023

Targeted Probing of Compositions and Structures for Complex Sample Analyses by Singlet-Filtered Correlation NMR Technique.
IEEE Trans. Instrum. Meas., 2023

An Empirical Study to Identify Software Aging Indicators for Android OS.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system.
Peer-to-Peer Netw. Appl., 2022

CPP-CLAS: Efficient and Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETs.
IEEE Internet Things J., 2022

An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security.
Trans. Emerg. Telecommun. Technol., 2022

Multivariate Modeling Analysis Based on Partial Least Squares Regression and Principal Component Regression.
Proceedings of the BIC 2022: 2nd International Conference on Bioinformatics and Intelligent Computing, Harbin, China, January 21, 2022

2021
An efficient mutual authentication and key agreement scheme without password for wireless sensor networks.
J. Supercomput., 2021

A secure three-factor-based authentication with key agreement protocol for e-Health clouds.
J. Supercomput., 2021

Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks.
Multim. Tools Appl., 2021

An enhanced dynamic authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2021

2020
Robust three-factor authentication protocol for satellite communication systems.
Int. J. Commun. Syst., 2020

2018
A novel location-based encryption model using fuzzy vault scheme.
Soft Comput., 2018

2017
Interface Characteristics of Sapphire Direct Bonding for High-Temperature Applications.
Sensors, 2017

2016
ESF算法的不可能差分密码分析 (Impossible Differential Cryptanalysis of ESF).
计算机科学, 2016

A Novel Key Sharing Fuzzy Vault Scheme.
KSII Trans. Internet Inf. Syst., 2016


  Loading...