Fulong Chen

Orcid: 0000-0003-0557-5084

Affiliations:
  • Anhui Normal University, Department of Computer Science and Technology, Wuhu, China
  • Northwestern Polytechnical University, School of Computer, Xi'an, China (PhD 2011)


According to our database1, Fulong Chen authored at least 65 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding.
Multim. Tools Appl., March, 2024

LD-Recognition: Classroom Action Recognition Based on Passive RFID.
IEEE Trans. Comput. Soc. Syst., February, 2024

Which standard classification algorithm has more stable performance for imbalanced network traffic data?
Soft Comput., January, 2024

An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme.
IEEE Trans. Inf. Forensics Secur., 2024

Compressed sensing based visually secure multi-secret image encryption-sharing scheme.
Multim. Tools Appl., 2024

2023
ESTPE: An efficient and stable thumbnail-preserving encryption scheme.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

A compressed sensing-based progressive secret image sharing scheme and security analysis.
Digit. Signal Process., November, 2023

A low-overhead compressed sensing-driven multi-party secret image sharing scheme.
Multim. Syst., June, 2023

A hybrid blockchain-based identity authentication scheme for Mobile Crowd Sensing.
Future Gener. Comput. Syst., June, 2023

JointContrast: Skeleton-Based Interaction Recognition with New Representation and Contrastive Learning.
Algorithms, April, 2023

Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks.
Peer Peer Netw. Appl., March, 2023

An Improved Identity-Based Anonymous Authentication Scheme Resistant to Semi-Trusted Server Attacks.
IEEE Internet Things J., 2023

Wear-free indoor fall detection based on RFID and deep residual networks.
Int. J. Commun. Syst., 2023

2022
SM2-based low-cost and efficient parallel modular multiplication.
Microprocess. Microsystems, October, 2022

Medical Cyber-Physical Systems: A Solution to Smart Health and the State of the Art.
IEEE Trans. Comput. Soc. Syst., 2022

Progressive and multi-level secret image sharing scheme with hierarchical shadows.
Multim. Tools Appl., 2022

Wear-free gesture recognition based on residual features of RFID signals.
Intell. Data Anal., 2022

A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing.
Digit. Signal Process., 2022

PHISS: Progressive and hierarchical image segmentation-sharing scheme.
Digit. Signal Process., 2022

JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

Contactless Elevator Button Action Recognition Based on Passive RFID.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention.
Proceedings of the Database and Expert Systems Applications, 2022

2021
A Secure and Verifiable Continuous Data Collection Algorithm in Wireless Sensor Networks.
Wirel. Pers. Commun., 2021

Quantum-inspired ant lion-optimized hybrid fuzzy c-means method for fuzzy clustering and image segmentation.
Soft Comput., 2021

A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing.
Secur. Commun. Networks, 2021

Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems.
Secur. Commun. Networks, 2021

ESPPTD: An efficient slicing-based privacy-preserving truth discovery in mobile crowd sensing.
Knowl. Based Syst., 2021

Slice-based Motion Trajectory Privacy Protection Method in Crowd Sensing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

An Effective Algorithm for Classification of Text with Weak Sequential Relationships.
Proceedings of the Database and Expert Systems Applications, 2021

2020
An Efficient Certificateless Aggregate Signature Scheme for Blockchain-Based Medical Cyber Physical Systems.
Sensors, 2020

Quantum-inspired ant lion optimized hybrid k-means for cluster analysis and intrusion detection.
Knowl. Based Syst., 2020

Design of a Secure Medical Data Sharing Scheme Based on Blockchain.
J. Medical Syst., 2020

The Novel Efficient Dual-field FIPS Modular Multiplication.
KSII Trans. Internet Inf. Syst., 2020

Spatiotemporal charging scheduling in wireless rechargeable sensor networks.
Comput. Commun., 2020

Fine-grained Device and Data Access Control of Community Medical Internet of Things.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Effective Tuple-based Anonymization for Massive Streaming Categorical Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.
Sensors, 2019

One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing.
Digit. Signal Process., 2019

Quantum-inspired cuckoo co-search algorithm for no-wait flow shop scheduling.
Appl. Intell., 2019

Secure Identity Authentication of Community Medical Internet of Things.
IEEE Access, 2019

SLIND<sup>+</sup>: Stable LINk Detection.
Proceedings of the Web Information Systems Engineering, 2019

Blockchain-Based Secure Authentication Scheme for Medical Data Sharing.
Proceedings of the Data Science, 2019

Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control.
World Wide Web, 2018

A tourism destination recommender system using users' sentiment and temporal dynamics.
J. Intell. Inf. Syst., 2018

Accelerated Sampling Optimization for RF Energy Harvesting Wireless Sensor Network.
IEEE Access, 2018

IPv6-Based Architecture of Community Medical Internet of Things.
IEEE Access, 2018

Towards IPv6-based Architecture for Big Data Processing of Community Medical Internet of Things.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Novel Differential Privacy Recommendation Method Based on a Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

A Recommender System with Advanced Time Series Medical Data Analysis for Diabetes Patients in a Telehealth Environment.
Proceedings of the Database and Expert Systems Applications, 2018

The Model Experimental Evaluation of the Cardiovascular Interventional Surgery Robot System.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information.
IEEE Trans. Dependable Secur. Comput., 2017

大数据环境下基于贝叶斯推理的中文地名地址匹配方法 (Chinese Place-name Address Matching Method Based on Large Data Analysis and Bayesian Decision).
计算机科学, 2017

Data Transmission and Access Protection of Community Medical Internet of Things.
J. Sensors, 2017

FPGA-based elastic in-circuit debugging for complex digital logic design.
Int. J. Auton. Adapt. Commun. Syst., 2017

Coupling a Fast Fourier Transformation With a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment.
IEEE Access, 2017

A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

2016
An intelligent recommender system based on predictive analysis in telehealthcare environment.
Web Intell., 2016

基于两层社区混合计算的个性化推荐方法 (Personalized Recommendation Method Based on Hybrid Computing in Two Layers of Community).
计算机科学, 2016

Data Storage Protection of Community Medical Internet of Things.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

GO-PEAS: A Scalable Yet Accurate Grid-Based Outlier Detection Method Using Novel Pruning Searching Techniques.
Proceedings of the Artificial Life and Computational Intelligence, 2016

2015
A standardized design methodology for complex digital logic components of cyber-physical systems.
Microprocess. Microsystems, 2015

2007
DAC Circuit with Multi-threshold Voltage for TFT-LCD Driver IC.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

Embedded System's Performance Analysis with RTC and QT.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007


  Loading...