Lirong Chen

Orcid: 0000-0002-7302-5458

According to our database1, Lirong Chen authored at least 29 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Discrete Extended-Phase-Shift Control for Dual-Active-Bridge DC-DC Converter With Fast Dynamic Response.
IEEE Trans. Ind. Electron., June, 2023

Fake Review Detection Using Deep Neural Networks with Multimodal Feature Fusion Method.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Particle Filter Localization Algorithm Based on LOS Possibility for Smart Vehicle Digital Key.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

The Effectiveness of Online Reputation Score under Silence Bias.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Urban Air Quality Assessment by Fusing Spatial and Temporal Data from Multiple Study Sources Using Refined Estimation Methods.
ISPRS Int. J. Geo Inf., 2022

Research and Application of Intelligent Vehicle Cybersecurity Threat Model.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Capability-based Component Security Mechanism for Microkernel OS.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

How Does fake review Influence E-Commerce Platform Revenue?
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue.
J. Enterp. Inf. Manag., 2021

A spatial-compositional feature fusion convolutional autoencoder for multivariate geochemical anomaly recognition.
Comput. Geosci., 2021

2020
Fast Interprocess Communication Algorithm in Microkernel.
Int. J. Perform. Eng., 2020

A Security Model and Implementation of Embedded Software Based on Code Obfuscation.
Proceedings of the 19th IEEE International Conference on Trust, 2020

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
安全虚拟机监视器的形式化验证研究 (Study on Formal Verification of Secure Virtual Machine Monitor).
计算机科学, 2019

Detecting clusters over intercity transportation networks using K-shortest paths and hierarchical clustering: a case study of mainland China.
Int. J. Geogr. Inf. Sci., 2019

A Spatially Constrained Multi-Autoencoder approach for multivariate geochemical anomaly recognition.
Comput. Geosci., 2019

2017
Design for the pricing strategy of return-freight insurance based on online product reviews.
Electron. Commer. Res. Appl., 2017

Who should pay for online reviews? Design of an online user feedback mechanism.
Electron. Commer. Res. Appl., 2017

2015
嵌入式操作系统的形式化验证研究 (Research on Formal Verification of Embedded Operating System).
计算机科学, 2015

Quantitative modeling of dose-response and drug combination based on pathway network.
J. Cheminformatics, 2015

2013
Software Test Case Automated Generation Algorithm with Extended EDPN Model.
J. Networks, 2013

CVDHD: a cardiovascular disease herbal database for drug discovery and network pharmacology.
J. Cheminformatics, 2013

2011
Drug-target network and polypharmacology studies of a Traditional Chinese Medicine for type II diabetes mellitus.
Comput. Biol. Chem., 2011

2008
Evaluation on DSM power-saving implementation based on DEA model.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2003
Mapping the Binding Site of a Large Set of Quinazoline Type EGF-R Inhibitors Using Molecular Field Analyses and Molecular Docking Studies.
J. Chem. Inf. Comput. Sci., 2003

2001
3D QSAR Analyses of Novel Tyrosine Kinase Inhibitors Based on Pharmacophore Alignment.
J. Chem. Inf. Comput. Sci., 2001


  Loading...