Yuling Chen
Orcid: 0000-0003-0628-1651
According to our database1,
Yuling Chen
authored at least 108 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Cloud Comput., December, 2024
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model.
J. Cloud Comput., December, 2024
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption.
J. Cloud Comput., December, 2024
J. Cloud Comput., December, 2024
BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment.
IEEE Internet Things J., December, 2024
Micro-grid source-load storage energy minimization method based on improved competitive depth Q - network algorithm and digital twinning.
Energy Inform., December, 2024
Wirel. Networks, November, 2024
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective.
ACM Comput. Surv., August, 2024
Efficient Designated Verifier Signature for Secure Cross-Chain Health Data Sharing in BIoMT.
IEEE Internet Things J., June, 2024
Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps.
IEEE Trans. Ind. Informatics, May, 2024
IEEE Trans. Consumer Electron., February, 2024
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems.
Entropy, January, 2024
MSGD: a manually curated database of genomic, transcriptomic, proteomic and drug information for multiple sclerosis.
Database J. Biol. Databases Curation, January, 2024
Blockchain-assisted full-session key agreement for secure data sharing in cloud computing.
J. Parallel Distributed Comput., 2024
Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption.
Inf. Process. Manag., 2024
A blockchain-empowered authentication scheme for worm detection in wireless sensor network.
Digit. Commun. Networks, 2024
Retinal Vascular Segmentation Network Based on Multi-Scale Adaptive Feature Fusion and Dual-Path Upsampling.
IEEE Access, 2024
IoU_MDA: An Occluded Object Detection Algorithm Based on Fuzzy Sample Anchor Box IoU Matching Degree Deviation Aware.
IEEE Access, 2024
Diffusion Model-based Metaverse Rendering in UAV-Enabled Edge Networks With Dual Connectivity.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Proceedings of the Metaverse - METAVERSE 2024, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation.
J. Cloud Comput., December, 2023
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
J. Cloud Comput., December, 2023
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution.
Comput. Commun., May, 2023
GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection.
Entropy, March, 2023
Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games.
Symmetry, February, 2023
Attention-based dual-path feature fusion network for automatic skin lesion segmentation.
BioData Min., January, 2023
Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023
Comput. Stand. Interfaces, 2023
Concurr. Comput. Pract. Exp., 2023
Comput. Secur., 2023
Proceedings of the 5th International Conference on Internet of Things, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
Int. J. Intell. Syst., December, 2022
High <i>VHL</i> Expression Reverses Warburg Phenotype and Enhances Immunogenicity in Kidney Tumor Cells.
Genom. Proteom. Bioinform., August, 2022
J. Organ. End User Comput., 2022
J. Cloud Comput., 2022
J. Ambient Intell. Humaniz. Comput., 2022
J. Ambient Intell. Humaniz. Comput., 2022
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022
DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
Int. J. Intell. Syst., 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Lightweight and Efficient Image Dehazing Network Guided by Transmission Estimation from Real-World Hazy Scenes.
Sensors, 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Cross-Domain Scene Classification Based on a Spatial Generalized Neural Architecture Search for High Spatial Resolution Remote Sensing Images.
Remote. Sens., 2021
Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things.
Mob. Inf. Syst., 2021
J. Cloud Comput., 2021
Int. J. Intell. Syst., 2021
Int. J. Intell. Syst., 2021
DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
CoRR, 2021
Application of Wireless Communication in Intelligent Distribution Network Communication Technology.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Application of FPGA Array Structure Digital Signal Processing Platform in Communication Field.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel.
Int. J. Distributed Sens. Networks, 2020
DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity.
IEEE Access, 2020
IEEE Access, 2020
A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Future Internet, 2019
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.
IEEE Access, 2019
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
Int. J. Commun. Syst., 2018
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018
Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform.
IEEE Access, 2018
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
KSII Trans. Internet Inf. Syst., 2017
2015
Realizing network function virtualization management and orchestration with model based open architecture.
Proceedings of the 11th International Conference on Network and Service Management, 2015
2003
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003