Yufan Chen
Orcid: 0009-0006-5348-4282
According to our database1,
Yufan Chen
authored at least 41 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Cogn. Commun. Netw., April, 2024
IEEE Commun. Lett., March, 2024
Comput. Secur., March, 2024
CoRR, 2024
CoRR, 2024
2023
UArch: A Super-Resolution Processor With Heterogeneous Triple-Core Architecture for Workloads of U-Net Networks.
IEEE Trans. Biomed. Circuits Syst., June, 2023
TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption.
Sensors, February, 2023
A novel end-to-end deep separation network based on attention mechanism for single channel blind separation in wireless communication.
IET Signal Process., February, 2023
Global Context-Based Threshold Strategy for Drone Identification Under the Low SNR Condition.
IEEE Internet Things J., January, 2023
Unveiling the Hidden Realm: Self-supervised Skeleton-based Action Recognition in Occluded Environments.
CoRR, 2023
Elevating Skeleton-Based Action Recognition with Efficient Multi-Modality Self-Supervision.
CoRR, 2023
A Regularized Neural Optimization Approach with Beta Densities for Blind Deconvolution.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
Research on the Construction of a Multimodal Cognitive Graph of Textile and Clothing.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Intelligent Question Answering System Based on Cognitive Graph: A Case Study of Textile Fabrics.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Rethinking Boundary Detection in Deep Learning Models for Medical Image Segmentation.
Proceedings of the Information Processing in Medical Imaging, 2023
Proceedings of the 15th International Conference on Digital Image Processing, 2023
Open Scene Understanding: Grounded Situation Recognition Meets Segment Anything for Helping People with Visual Impairments.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 16th International Congress on Image and Signal Processing, 2023
Proceedings of the 15th IEEE International Conference on ASIC, 2023
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Multi-task learning of perceptive feature for thyroid malignant probability prediction.
Proceedings of the Medical Imaging 2021: Computer-Aided Diagnosis, 2021
A New Lightweight Dual-Microphone RNN-VAD Assist Adaptive Blocking Matrix for Dual-Channel Speech Enhancement.
Proceedings of the IEEE International Conference on Signal Processing, 2021
Joint Sparse Channel Estimation and Tracking for SC-FDE Based V2X Communication Systems.
Proceedings of the 21st International Conference on Communication Technology, 2021
BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
2020
A Real-Time Dual-Microphone Speech Enhancement Algorithm Assisted by Bone Conduction Sensor.
Sensors, 2020
To outsource or not: The impact of information leakage risk on information security strategy.
Inf. Manag., 2020
CoRR, 2020
Automatic Modulation Classification Scheme Based on LSTM With Random Erasing and Attention Mechanism.
IEEE Access, 2020
2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Outsourcing Information Security: The Role of Information Leakage in Outsourcing Decisions.
Proceedings of the 2018 International Conference on Information Resources Management, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018