Hongyuan Chen

Orcid: 0000-0003-4273-7185

According to our database1, Hongyuan Chen authored at least 26 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center.
IEEE Internet Things J., April, 2024

Fry Counting Method in High-Density Culture Based on Image Enhancement Algorithm and Attention Mechanism.
IEEE Access, 2024

2023
An Indoor Fingerprint Positioning Algorithm Based on WKNN and Improved XGBoost.
Sensors, 2023

Shrimpseed_Net: Counting of Shrimp Seed Using Deep Learning on Smartphones for Aquaculture.
IEEE Access, 2023

2022
Super-resolution guided knowledge distillation for low-resolution image classification.
Pattern Recognit. Lett., 2022

2019
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

2018
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

2016
Compressive sampling-based CFO-estimation with exploited features.
EURASIP J. Wirel. Commun. Netw., 2016

Aggregation based Cell Selection Methods for multi-RAT HetNet.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Delay analysis of completely irrepressible sequences for mobile ad hoc networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

A new protocol sequences based broadcast scheme for wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

2014
A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique.
Multim. Tools Appl., 2014

2011
A Controllable Error-Drift Elimination Scheme for Watermarking Algorithm in H.264/AVC Stream.
IEEE Signal Process. Lett., 2011

Revisit of the Markov Model of IEEE 802.11 DCF for an Error-Prone Channel.
IEEE Commun. Lett., 2011

2006
Performance analysis of delayed acknowledgment scheme in UWB-based high-rate WPAN.
IEEE Trans. Veh. Technol., 2006

2005
Impact of topology on Bluetooth Scatternet.
Int. J. Pervasive Comput. Commun., 2005

Controlling Network Topology in Forming Bluetooth Scatternet.
IEICE Trans. Commun., 2005

Improved Performance with Adaptive Dly-ACK for IEEE 802.15.3 WPAN over UWB PHY.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Access control for future mobile devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

2004
Performance model of IEEE 802.11 DCF with variable packet length.
IEEE Commun. Lett., 2004

Cross-layer Optimized Routing for Bluetooth Personal Area Network.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Adaptive Dly-ACK for TCP over 802.15.3 WPAN.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Impact of Topology on Multi-hop Bluetooth Personal Area Network.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2001
Joint error detection and VF arithmetic coding.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Evaluations of Burst Error Recovery for VF Arithmetic Coding.
Proceedings of the 15th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2000), 2000


  Loading...