Lei Chen

Orcid: 0000-0002-3919-8056

Affiliations:
  • Georgia Southern University, Department of Information Technology, Statesboro, GA, USA
  • Sam Houston State University, Department of Computer Science, Huntsville, TX, USA (former)


According to our database1, Lei Chen authored at least 52 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Systematic Analysis on Raspberry Pi Prototyping: Uses, Challenges, Benefits, and Drawbacks.
IEEE Internet Things J., August, 2023

A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

2022
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022

2021
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021

Contour Stella Image and Deep Learning for Signal Recognition in the Physical Layer.
IEEE Trans. Cogn. Commun. Netw., 2021

Two-Level Multimodal Fusion for Sentiment Analysis in Public Security.
Secur. Commun. Networks, 2021

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT.
Secur. Commun. Networks, 2021

Intrusion Prediction using LSTM and GRU with UNSW-NB15.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021

Intrusion Prediction using Long Short-Term Memory Deep Learning with UNSW-NB15.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

2020
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT.
Wirel. Commun. Mob. Comput., 2020

A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2020

A data authentication scheme for UAV ad hoc network communication.
J. Supercomput., 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

A Hybrid Task Scheduling Algorithm Based on Task Clustering.
Mob. Networks Appl., 2020

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

Modulation Classification Method based on Deep Learning under Non-Gaussian Noise.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Key Technologies and Solutions of Remote Distributed Virtual Laboratory for E-Learning and E-Education.
Mob. Networks Appl., 2019

Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019

Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019

A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Minimum Latency Aggregation Scheduling in Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Time-Related Network Intrusion Detection Model: A Deep Learning Method.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Heat-Map Based Emotion and Face Recognition from Thermal Images.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018

Editorial: Multimedia Transmission and Process in Heterogeneous Network.
Mob. Networks Appl., 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018

D2D-Assisted VR Video Pre-Caching Strategy.
IEEE Access, 2018

Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones.
Proceedings of the 2018 International Conference on Computing, 2018

Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids.
Proceedings of the 2018 International Conference on Computing, 2018

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks.
Proceedings of the 2018 International Conference on Computing, 2018

Seam Carve Detection Using Convolutional Neural Networks.
Proceedings of the Advanced Hybrid Information Processing, 2018

2017
An Advanced Private Social Activity Invitation Framework with Friendship Protection.
Wirel. Commun. Mob. Comput., 2017

Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics.
Inf., 2017

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Enhancing the security of IoT enabled robotics: Protecting TurtleBot file system and communication.
Proceedings of the 2017 International Conference on Computing, 2017

2016
Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Adaptive threshold-based RF spectrum scanning through joint energy and bandwidth detection with USRPs in cognitive sensor networks for ROAR architecture.
Proceedings of the 2016 International Conference on Computing, 2016

Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console.
Proceedings of the 2016 International Conference on Computing, 2016

2015
A Method to Detect AAC Audio Forgery.
EAI Endorsed Trans. Security Safety, 2015

Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Exposing Image Tampering with the Same Quantization Matrix.
Proceedings of the Multimedia Data Mining and Analytics - Disruptive Innovation, 2015

2014
Compression/transmission power allocation in multimedia Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2013
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation.
Appl. Intell., 2013

2012
Identification of Smartphone-Image Source and Manipulation.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and Extensions.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Scalable Secure MJPEG Video Streaming.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2009
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy.
Int. J. Inf. Secur. Priv., 2009

Security and Privacy Issues in Secure E-Mail Standards and Services.
Int. J. Inf. Secur. Priv., 2009

Location security in geographic ad hoc routing for VANETs.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009


  Loading...