Long Chen
Orcid: 0000-0002-0012-499XAffiliations:
- Chongqing University of Posts and Telecommunications, Institute of Computer Forensics, Chongqing, China
According to our database1,
Long Chen
authored at least 25 papers
between 2004 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
2025
A Lightweight Privacy-Preserving Scheme for Verifiable Multidimensional Data Aggregation in Vehicular Crowdsensing Networks.
IEEE Internet Things J., 2025
Attention learning with counterfactual intervention based on feature fusion for fine-grained feature learning.
Digit. Signal Process., 2025
Enhancing explainability via distinguishable feature learning based on causality in image classification.
Displays, 2025
2024
Telecommun. Syst., June, 2024
J. Inf. Secur. Appl., 2024
2023
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices.
Internet Things, April, 2023
An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant.
Neural Process. Lett., 2023
2022
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
J. Inf. Secur. Appl., 2022
ERGCN: Data enhancement-based robust graph convolutional network against adversarial attacks.
Inf. Sci., 2022
2020
Int. J. Imaging Syst. Technol., 2020
2019
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019
Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment.
Proceedings of the 4th International Conference on Big Data and Computing, 2019
2018
Overlapping Community Discovery Algorithm Based on Hierarchical Agglomerative Clustering.
Int. J. Pattern Recognit. Artif. Intell., 2018
Effective Similarity Measures of Collaborative Filtering Recommendations Based on User Ratings Habits.
Proceedings of the 14th International Conference on Semantics, Knowledge and Grids, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
2017
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2012
An Efficient Data Integrity Verification Method Supporting Multi-granular Operation with Commutative Hash.
Proceedings of the Rough Sets and Current Trends in Computing, 2012
2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
2010
An Availability-Aware Task Scheduling for Heterogeneous Systems Using Quantum-behaved Particle Swarm Optimization.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
2004
Proceedings of the Monitoring, Security, and Rescue Techniques in Multiagent Systems, 2004