Linchen Yu
Orcid: 0000-0002-0620-101X
  According to our database1,
  Linchen Yu
  authored at least 29 papers
  between 2009 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    ACM Trans. Archit. Code Optim., March, 2025
    
  
    Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
    
  
SDBF: Steep-Decision-Boundary Fingerprinting for Hard-Label Tampering Detection of DNN Models.
    
  
    Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
    
  
ESF: Efficient Sensitive Fingerprinting for Black-Box Tamper Detection of Large Language Models.
    
  
    Proceedings of the Findings of the Association for Computational Linguistics, 2025
    
  
  2024
    IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., May, 2024
    
  
  2021
    Future Gener. Comput. Syst., 2021
    
  
CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
    
  
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
    
  
Fast Sparse Deep Neural Network Inference with Flexible SpMM Optimization Space Exploration.
    
  
    Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021
    
  
    Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021
    
  
  2020
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
    
  
    IEEE Internet Things J., 2020
    
  
    Concurr. Comput. Pract. Exp., 2020
    
  
An efficient iterative graph data processing framework based on bulk synchronous parallel model.
    
  
    Concurr. Comput. Pract. Exp., 2020
    
  
  2018
    Peer-to-Peer Netw. Appl., 2018
    
  
  2016
    Int. J. High Perform. Comput. Netw., 2016
    
  
    Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
    
  
  2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
    
  
    Int. J. Distributed Sens. Networks, 2013
    
  
    Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
    
  
    Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
    
  
    Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
    
  
  2012
    Future Gener. Comput. Syst., 2012
    
  
    Proceedings of the 11th IEEE International Conference on Trust, 2012
    
  
    Proceedings of the 11th IEEE International Conference on Trust, 2012
    
  
    Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
    
  
    Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
    
  
    Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
    
  
  2011
  2010
    Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
    
  
    Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
    
  
  2009
    Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009