Yuling Chen

Orcid: 0000-0003-0628-1651

According to our database1, Yuling Chen authored at least 108 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimization model for vehicular network data queries in edge environments.
J. Cloud Comput., December, 2024

Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model.
J. Cloud Comput., December, 2024

Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption.
J. Cloud Comput., December, 2024

Cross-chain asset trading scheme for notaries based on edge cloud storage.
J. Cloud Comput., December, 2024

BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment.
IEEE Internet Things J., December, 2024

Micro-grid source-load storage energy minimization method based on improved competitive depth Q - network algorithm and digital twinning.
Energy Inform., December, 2024

A high-capacity slicing PBFT protocol based on reputation evaluation model.
Wirel. Networks, November, 2024

Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024

Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective.
ACM Comput. Surv., August, 2024

Efficient Designated Verifier Signature for Secure Cross-Chain Health Data Sharing in BIoMT.
IEEE Internet Things J., June, 2024

Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps.
IEEE Trans. Ind. Informatics, May, 2024

FedSQ: Sparse-Quantized Federated Learning for Communication Efficiency.
IEEE Trans. Consumer Electron., February, 2024

Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems.
Entropy, January, 2024

MSGD: a manually curated database of genomic, transcriptomic, proteomic and drug information for multiple sclerosis.
Database J. Biol. Databases Curation, January, 2024

Blockchain-assisted full-session key agreement for secure data sharing in cloud computing.
J. Parallel Distributed Comput., 2024

Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption.
Inf. Process. Manag., 2024

A blockchain-empowered authentication scheme for worm detection in wireless sensor network.
Digit. Commun. Networks, 2024

Retinal Vascular Segmentation Network Based on Multi-Scale Adaptive Feature Fusion and Dual-Path Upsampling.
IEEE Access, 2024

IoU_MDA: An Occluded Object Detection Algorithm Based on Fuzzy Sample Anchor Box IoU Matching Degree Deviation Aware.
IEEE Access, 2024

Diffusion Model-based Metaverse Rendering in UAV-Enabled Edge Networks With Dual Connectivity.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

AI-Enabled Metaverse for Education: Challenges and Opportunities.
Proceedings of the Metaverse - METAVERSE 2024, 2024

Targeted Universal Adversarial Attack Based on Fourier Transform.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Cross-Chain Asset Trading Scheme Without Trusted Third-Party.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

ACBA: Object detection algorithm based on Adaptive Class Blurry Aware.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024

Slicing PBFT Consensus Algorithm Based on VRF.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation.
J. Cloud Comput., December, 2023

ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
J. Cloud Comput., December, 2023

DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution.
Comput. Commun., May, 2023

GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection.
Entropy, March, 2023

Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games.
Symmetry, February, 2023

Attention-based dual-path feature fusion network for automatic skin lesion segmentation.
BioData Min., January, 2023

Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023

Energy trading scheme based on consortium blockchain and game theory.
Comput. Stand. Interfaces, 2023

A mobile energy trading scheme based on Lightning Network.
Concurr. Comput. Pract. Exp., 2023

Cross-domain vulnerability detection using graph embedding and domain adaptation.
Comput. Secur., 2023

Adaptive Fusion of Global Pooling Feature Attention for Object Detection.
Proceedings of the 5th International Conference on Internet of Things, 2023

A High Capacity Combined Carrier Steganography Without Embedding Image.
Proceedings of the IEEE Intl Conf on Dependable, 2023

CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Robust Object Detection Based on a Comparative Learning Perspective.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Adversarial Attack Method Based on Dual- frequency Domain Transformation.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Communication-Efficient Federated Learning with Sparsity and Quantization.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Blockchain of Blockchains Structure Based on Asset Trading Scheme.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Is semi-selfish mining available without being detected?
Int. J. Intell. Syst., December, 2022

High <i>VHL</i> Expression Reverses Warburg Phenotype and Enhances Immunogenicity in Kidney Tumor Cells.
Genom. Proteom. Bioinform., August, 2022

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model.
J. Organ. End User Comput., 2022

A trusted de-swinging k-anonymity scheme for location privacy protection.
J. Cloud Comput., 2022

A designated verifier multi-signature scheme in multi-clouds.
J. Cloud Comput., 2022

A new entropic criterion model in rational secure two-party computation.
J. Ambient Intell. Humaniz. Comput., 2022

A secure and efficient privacy-preserving data aggregation algorithm.
J. Ambient Intell. Humaniz. Comput., 2022

PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022

DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
Int. J. Intell. Syst., 2022

Data Confirmation Scheme based on Auditable CP-ABE.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A K-anonymity Optimization Algorithm Under Attack Model.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Blockchain-based Scalable Electronic Contract Signing System.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Secure Comparison Protocol in the Malicious Model.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

The optimal attack-defense scheme for secret sharing.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Security Transaction Model Based on HTLC.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE.
IEEE Trans. Inf. Forensics Secur., 2021

Lightweight and Efficient Image Dehazing Network Guided by Transmission Estimation from Real-World Hazy Scenes.
Sensors, 2021

Cross-Platform Strong Privacy Protection Mechanism for Review Publication.
Secur. Commun. Networks, 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

Cross-Domain Scene Classification Based on a Spatial Generalized Neural Architecture Search for High Spatial Resolution Remote Sensing Images.
Remote. Sens., 2021

Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things.
Mob. Inf. Syst., 2021

A blockchain index structure based on subchain query.
J. Cloud Comput., 2021

A rational delegating computation protocol based on reputation and smart contract.
J. Cloud Comput., 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

Semi-selfish mining based on hidden Markov decision process.
Int. J. Intell. Syst., 2021

DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
CoRR, 2021

Application of Wireless Communication in Intelligent Distribution Network Communication Technology.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

5G Mobile Communication System Based on Cloud Wireless Access Network.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Application of FPGA Array Structure Digital Signal Processing Platform in Communication Field.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

A De-swinging Scheme in Location Privacy Protection via Smart Contract.
Proceedings of the IEEE Intl Conf on Dependable, 2021

PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Using information entropy to analyze secure multi-party computation protocol.
Proceedings of the IEEE Intl Conf on Dependable, 2021

ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A location data protection protocol based on differential privacy.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel.
Int. J. Distributed Sens. Networks, 2020

DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity.
IEEE Access, 2020

Using User Behavior to Measure Privacy on Online Social Networks.
IEEE Access, 2020

CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts.
IEEE Access, 2020

A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Low Energy-Consuming Security Data Aggregation Protocol.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019

LMDGW: a novel matrix based dynamic graph watermark.
J. Ambient Intell. Humaniz. Comput., 2019

FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing.
Future Internet, 2019

A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.
IEEE Access, 2019

A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019

Certificateless Short Aggregate Signature Scheme for Mobile Devices.
IEEE Access, 2019

Anti-Synchronization and Robust Authentication for Noisy PUF-Based Smart Card.
IEEE Access, 2019

A Authentication and Access Authorization Mechanism on the PaaS Platform.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Blockchain Private Key Storage Algorithm Based on Image Information Hiding.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Certificateless short signature scheme from pairing in the standard model.
Int. J. Commun. Syst., 2018

RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018

Machine Learning and Deep Learning Methods for Cybersecurity.
IEEE Access, 2018

Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform.
IEEE Access, 2018

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
KSII Trans. Internet Inf. Syst., 2017

2015
Realizing network function virtualization management and orchestration with model based open architecture.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2003
Design Recovery of a Two Level System.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003


  Loading...