Yange Chen

Orcid: 0000-0002-9703-2943

According to our database1, Yange Chen authored at least 17 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys.
IEEE Internet Things J., January, 2024

Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024

2023
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption.
J. Syst. Archit., November, 2023

PPeFL: Privacy-Preserving Edge Federated Learning With Local Differential Privacy.
IEEE Internet Things J., September, 2023

PLDP-FL: Federated Learning with Personalized Local Differential Privacy.
Entropy, March, 2023

2022
Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis.
IEEE J. Biomed. Health Informatics, 2022

Privacy-Preserving Classification Scheme Based on Support Vector Machine.
IEEE Syst. J., 2022

PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System.
IEEE Syst. J., 2022

Toward practical privacy-preserving linear regression.
Inf. Sci., 2022

Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Internet Things J., 2022

Privacy-preserving convolutional neural network prediction with low latency and lightweight users.
Int. J. Intell. Syst., 2022

Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud.
Expert Syst. Appl., 2022

2021
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021

Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT.
Neural Comput. Appl., 2021

A threshold hybrid encryption method for integrity audit without trusted center.
J. Cloud Comput., 2021

2019
Implementing Attacks on the Approximate Greatest Common Divisor Problem.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2013
Design of Three-dimensional Interchange Network Based on IPv4/IPv6 Network.
J. Networks, 2013


  Loading...