Lei Chen

  • Georgia Southern University, Department of Information Technology, Statesboro, GA, USA
  • Sam Houston State University, Department of Computer Science, Huntsville, TX, USA (former)

According to our database1, Lei Chen authored at least 49 papers between 2009 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021

Contour Stella Image and Deep Learning for Signal Recognition in the Physical Layer.
IEEE Trans. Cogn. Commun. Netw., 2021

Two-Level Multimodal Fusion for Sentiment Analysis in Public Security.
Secur. Commun. Networks, 2021

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT.
Secur. Commun. Networks, 2021

Intrusion Prediction using Long Short-Term Memory Deep Learning with UNSW-NB15.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT.
Wirel. Commun. Mob. Comput., 2020

A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2020

A data authentication scheme for UAV ad hoc network communication.
J. Supercomput., 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

A Hybrid Task Scheduling Algorithm Based on Task Clustering.
Mob. Networks Appl., 2020

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

Modulation Classification Method based on Deep Learning under Non-Gaussian Noise.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Key Technologies and Solutions of Remote Distributed Virtual Laboratory for E-Learning and E-Education.
Mob. Networks Appl., 2019

Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019

Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019

A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Minimum Latency Aggregation Scheduling in Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Time-Related Network Intrusion Detection Model: A Deep Learning Method.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Heat-Map Based Emotion and Face Recognition from Thermal Images.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018

Editorial: Multimedia Transmission and Process in Heterogeneous Network.
Mob. Networks Appl., 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018

D2D-Assisted VR Video Pre-Caching Strategy.
IEEE Access, 2018

Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones.
Proceedings of the 2018 International Conference on Computing, 2018

Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids.
Proceedings of the 2018 International Conference on Computing, 2018

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks.
Proceedings of the 2018 International Conference on Computing, 2018

Seam Carve Detection Using Convolutional Neural Networks.
Proceedings of the Advanced Hybrid Information Processing, 2018

An Advanced Private Social Activity Invitation Framework with Friendship Protection.
Wirel. Commun. Mob. Comput., 2017

Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics.
Inf., 2017

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Enhancing the security of IoT enabled robotics: Protecting TurtleBot file system and communication.
Proceedings of the 2017 International Conference on Computing, 2017

Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Adaptive threshold-based RF spectrum scanning through joint energy and bandwidth detection with USRPs in cognitive sensor networks for ROAR architecture.
Proceedings of the 2016 International Conference on Computing, 2016

Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console.
Proceedings of the 2016 International Conference on Computing, 2016

A Method to Detect AAC Audio Forgery.
EAI Endorsed Trans. Security Safety, 2015

Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Exposing Image Tampering with the Same Quantization Matrix.
Proceedings of the Multimedia Data Mining and Analytics - Disruptive Innovation, 2015

Compression/transmission power allocation in multimedia Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation.
Appl. Intell., 2013

Identification of Smartphone-Image Source and Manipulation.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and Extensions.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Scalable Secure MJPEG Video Streaming.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy.
Int. J. Inf. Secur. Priv., 2009

Security and Privacy Issues in Secure E-Mail Standards and Services.
Int. J. Inf. Secur. Priv., 2009

Location security in geographic ad hoc routing for VANETs.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009