Yi Chen

Orcid: 0000-0003-4272-7956

Affiliations:
  • Guizhou University, College of Computer Science and Technology, China
  • Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China


According to our database1, Yi Chen authored at least 32 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Robust Image Watermarking Based on Hybrid Transform and Position-Adaptive Selection.
Circuits Syst. Signal Process., April, 2025

A multi-level additive distortion method for security improvement in palette image steganography.
J. Vis. Commun. Image Represent., 2025

CPSketch: A 'couple' sketch-based heavy flow detection method.
J. Netw. Comput. Appl., 2025

Towards saturation attack detection in SDN: a multi-edge representation learning-based method.
J. King Saud Univ. Comput. Inf. Sci., 2025

End-to-end robust and transparent image watermarking method for screen-shooting scenarios.
J. Electronic Imaging, 2025

A Clustering-Based Color Reordering Method for Reversible Data Hiding in Palette Images.
IET Image Process., 2025

2024
SNDMI: Spyware network traffic detection method based on inducement operations.
Comput. Secur., 2024

NFAERCOM: A Near-Far Area Experience Replay-based Computation Offloading Method.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

2022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022

A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images.
Int. J. Distributed Sens. Networks, 2022

Multiple Histograms Shifting-Based Video Data Hiding Using Compression Sensing.
IEEE Access, 2022

Robust Video Watermarking Using Normalized Zernike Moments.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
A blockchain-based computation offloading method for edge computing in 5G networks.
Softw. Pract. Exp., 2021

Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission.
IET Image Process., 2021

EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems.
World Wide Web, 2020

Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing.
Multim. Tools Appl., 2020

Reversible data hiding based on a modified difference expansion for H.264/AVC video streams.
Multim. Tools Appl., 2020

A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering.
Multim. Tools Appl., 2020

A novel two-dimensional reversible data hiding method with high embedding capacity in H.264/advanced video coding.
Int. J. Distributed Sens. Networks, 2020

2019
Reversible video data hiding using zero QDCT coefficient-pairs.
Multim. Tools Appl., 2019

A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

GRU-SVM Model for Synthetic Speech Detection.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
An efficient fingerprint identification algorithm based on minutiae and invariant moment.
Pers. Ubiquitous Comput., 2018

An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream.
Multim. Tools Appl., 2018

A Novel Reversible Data Hiding Employing All Quantized Nonzero AC Coefficients in JPEG Images.
CoRR, 2018

Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment.
CoRR, 2018

Energy-Efficient Computation Offloading for Multimedia Workflows in Mobile Cloud Computing.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2018

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017


  Loading...