Yuancheng Li

Orcid: 0000-0001-8074-7259

Affiliations:
  • North China Electric Power University, Beijing, China


According to our database1, Yuancheng Li authored at least 58 papers between 2003 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Clean-label attack based on negative afterimage on neural networks.
Int. J. Mach. Learn. Cybern., January, 2025

Transferable Attention-Distracting Adversarial Attack on Data-Driven Models for Power Systems.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Vehicle-to-Vehicle Energy Sharing Scheme: A Privacy-Preserving Solution Based on Local Differential Privacy Method.
IEEE Netw., November, 2024

TSCW-GAN Based FDIAs Defense for State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks.
IEEE Trans. Ind. Informatics, April, 2024

Advancing multi-party quantum key agreement protocols: the power of a two-layer approach.
Quantum Inf. Process., March, 2024

V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm.
IEEE Trans. Netw. Sci. Eng., 2024

Local Differential Privacy-Based Privacy-Preserving Data Range Query Scheme for Electric Vehicle Charging.
IEEE Trans. Netw. Sci. Eng., 2024

DDoS attack detection in smart grid network using reconstructive machine learning models.
PeerJ Comput. Sci., 2024

DDoS Attack Detection in Smart Grid Networks Using Visual Features.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

2023
TPCaps: a framework for code clone detection and localization based on improved CapsNet.
Appl. Intell., July, 2023

Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System.
IEEE Trans. Smart Grid, May, 2023

Multilabel Recognition Algorithm With Multigraph Structure.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

2022
Edge Computing Offloading Strategy Based on Dynamic Non-cooperative Games in D-IoT.
Wirel. Pers. Commun., 2022

False Phasor Data Detection Under Time Synchronization Attacks: A Neural Network Approach.
IEEE Trans. Smart Grid, 2022

Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling.
IEEE Syst. J., 2022

SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks.
PeerJ Comput. Sci., 2022

Cost-aware real-time job scheduling for hybrid cloud using deep reinforcement learning.
Neural Comput. Appl., 2022

Elliptical convolution kernel: More real visual field.
Neurocomputing, 2022

Identity authentication for edge devices based on zero-trust architecture.
Concurr. Comput. Pract. Exp., 2022

Attention-based fusion factor in FPN for object detection.
Appl. Intell., 2022

2021
A Consortium Blockchain-Enabled Secure and Privacy-Preserving Optimized Charging and Discharging Trading Scheme for Electric Vehicles.
IEEE Trans. Ind. Informatics, 2021

Quantum-based anonymity and secure veto.
Quantum Inf. Process., 2021

Quantum Bell states-based anonymous voting with anonymity trace.
Quantum Inf. Process., 2021

Differential privacy EV charging data release based on variable window.
PeerJ Comput. Sci., 2021

Poisonous Label Attack: Black-Box Data Poisoning Attack with Enhanced Conditional DCGAN.
Neural Process. Lett., 2021

CyclicNet: an alternately updated network for semantic segmentation.
Multim. Tools Appl., 2021

Non-maximum suppression for object detection based on the chaotic whale optimization algorithm.
J. Vis. Commun. Image Represent., 2021

Confident sequence learning: A sequence class-label noise filtering technique to improve scene digit recognition.
J. Intell. Fuzzy Syst., 2021

Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack.
IEEE Internet Things J., 2021

False Data Injection Attack and Defense Method on Load Frequency Control.
IEEE Internet Things J., 2021

Authenticated Quantum Sortition and Application in "Picking at Random" Problems.
IEEE Commun. Lett., 2021

Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain.
IEEE Trans. Smart Grid, 2020

Quantum anonymous ranking and selection with verifiability.
Quantum Inf. Process., 2020

A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing.
Inf. Secur. J. A Glob. Perspect., 2020

Semantically find similar binary codes with mixed key instruction sequence.
Inf. Softw. Technol., 2020

Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory.
IET Cyper-Phys. Syst.: Theory & Appl., 2020

2019
Denial of service attack and defense method on load frequency control system.
J. Frankl. Inst., 2019

Intelligent terminal face spoofing detection algorithm based on deep belief network.
J. Electronic Imaging, 2019

Privacy-preserving lightweight face recognition.
Neurocomputing, 2019

Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network.
IEEE Access, 2019

Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid.
IEEE Access, 2019

False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid.
IEEE Access, 2019

Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network.
IEEE Access, 2019

An Improved Programming Model for Thread-Level Speculation.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

2018
Web spam classification method based on deep belief networks.
Expert Syst. Appl., 2018

2017
Face aging effect simulation model based on multilayer representation and shearlet transform.
J. Electronic Imaging, 2017

2016
Short-Term Load Forecasting Based on the Analysis of User Electricity Behavior.
Algorithms, 2016

2010
Image compression scheme based on curvelet transform and support vector machine.
Expert Syst. Appl., 2010

2009
An approach for multi-agent coordination based on semantic approximation.
Int. J. Intell. Inf. Database Syst., 2009

A Novel Method to Extract Informative Blocks from Web Pages.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

2007
Fast Adaptive Wavelet for Remote Sensing Image Compression.
J. Comput. Sci. Technol., 2007

Image Digital Watermarking Technique Based on Kernel Independent Component Analysis.
Proceedings of the Rough Sets, 2007

A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Image Compression Using Wavelet Support Vector Machines.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2005
SVM Regression and Its Application to Image Compression.
Proceedings of the Advances in Intelligent Computing, 2005

2003
Application of Fuzzy Support Vector Machines in Short-Term Load Forecasting.
Proceedings of the Rough Sets, 2003

Rough Set Methods for Constructing Support Vector Machines.
Proceedings of the Rough Sets, 2003


  Loading...