Long Chen

Orcid: 0000-0002-0012-499X

Affiliations:
  • Chongqing University of Posts and Telecommunications, Institute of Computer Forensics, Chongqing, China


According to our database1, Long Chen authored at least 25 papers between 2004 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Multi-granularity spectral graph coarsening.
Inf. Sci., 2026

2025
A Lightweight Privacy-Preserving Scheme for Verifiable Multidimensional Data Aggregation in Vehicular Crowdsensing Networks.
IEEE Internet Things J., 2025

Attention learning with counterfactual intervention based on feature fusion for fine-grained feature learning.
Digit. Signal Process., 2025

Enhancing explainability via distinguishable feature learning based on causality in image classification.
Displays, 2025

2024
Tripartite evolutionary game in the process of network attack and defense.
Telecommun. Syst., June, 2024

An explainable deepfake of speech detection method with spectrograms and waveforms.
J. Inf. Secur. Appl., 2024

2023
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices.
Internet Things, April, 2023

An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant.
Neural Process. Lett., 2023

2022
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
J. Inf. Secur. Appl., 2022

ERGCN: Data enhancement-based robust graph convolutional network against adversarial attacks.
Inf. Sci., 2022

2020
Image interpolation model based on packet losing network.
Multim. Tools Appl., 2020

Adaptive image denoising for speckle noise images based on fuzzy logic.
Int. J. Imaging Syst. Technol., 2020

2019
Continuous Authentication Based on User Interaction Behavior.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

2018
Overlapping Community Discovery Algorithm Based on Hierarchical Agglomerative Clustering.
Int. J. Pattern Recognit. Artif. Intell., 2018

Effective Similarity Measures of Collaborative Filtering Recommendations Based on User Ratings Habits.
Proceedings of the 14th International Conference on Semantics, Knowledge and Grids, 2018

A Method of Docker Container Forensics Based on API.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2017
A Defense Method against Docker Escape Attack.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
Forensic Analysis of Email on Android Volatile Memory.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2012
An Efficient Data Integrity Verification Method Supporting Multi-granular Operation with Commutative Hash.
Proceedings of the Rough Sets and Current Trends in Computing, 2012

2011
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2010
An Availability-Aware Task Scheduling for Heterogeneous Systems Using Quantum-behaved Particle Swarm Optimization.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

2008
An Efficient Piecewise Hashing Method for Computer Forensics.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

2007
An Approach to Video Key-frame Extraction Based on Rough Set.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2004
Rough Set Based Solutions for Network Security.
Proceedings of the Monitoring, Security, and Rescue Techniques in Multiagent Systems, 2004


  Loading...