Yuling Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Towards attribute-based conjunctive encrypted search over lattice for internet of medical things.
Peer Peer Netw. Appl., September, 2025

Learning semantic consistency for audio-visual zero-shot learning.
Artif. Intell. Rev., July, 2025

Spectral Correlation-Based Fusion Network for Hyperspectral Image Super-Resolution.
IEEE Trans. Geosci. Remote. Sens., 2025

A Road-Detail Preserving Framework for Urban Road Extraction From VHR Remote Sensing Imagery.
IEEE Trans. Geosci. Remote. Sens., 2025

A verifiable scheme for differential privacy based on zero-knowledge proofs.
J. King Saud Univ. Comput. Inf. Sci., 2025

PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems.
IACR Cryptol. ePrint Arch., 2025

Personalized Federated Learning with Adaptive Weight Clustering.
Proceedings of the Data Security and Privacy Protection - Third International Conference, 2025

FedVoD: A Robust Federated Learning Defense Strategy Against Hybrid Byzantine Attacks.
Proceedings of the Data Security and Privacy Protection - Third International Conference, 2025

Smart Contract Ponzi Detection via Contract Transaction Graph.
Proceedings of the Data Security and Privacy Protection - Third International Conference, 2025

DMD: Boosting Adversarial Transferability via Dynamic Momentum Decay.
Proceedings of the Data Security and Privacy Protection - Third International Conference, 2025

Attention-Guided Hierarchical Defense for Multimodal Attacks in Vision-Language Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2025

2024
Optimization model for vehicular network data queries in edge environments.
J. Cloud Comput., December, 2024

Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model.
J. Cloud Comput., December, 2024

Cross-chain asset trading scheme for notaries based on edge cloud storage.
J. Cloud Comput., December, 2024

Micro-grid source-load storage energy minimization method based on improved competitive depth Q - network algorithm and digital twinning.
Energy Inform., December, 2024

A high-capacity slicing PBFT protocol based on reputation evaluation model.
Wirel. Networks, November, 2024

MSGD: a manually curated database of genomic, transcriptomic, proteomic and drug information for multiple sclerosis.
Database J. Biol. Databases Curation, January, 2024

AI-Enabled Metaverse for Education: Challenges and Opportunities.
Proceedings of the Metaverse - METAVERSE 2024, 2024

Targeted Universal Adversarial Attack Based on Fourier Transform.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Cross-Chain Asset Trading Scheme Without Trusted Third-Party.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy.
Proceedings of the 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 2024

Lightweight IoT-Oriented Verifiable Computing Scheme in Cloud Computing Circumstance.
Proceedings of the 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 2024

Private Comparison Based on Digital Decomposition for IoT Cloud Environments.
Proceedings of the 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 2024

Slicing PBFT Consensus Algorithm Based on VRF.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation.
J. Cloud Comput., December, 2023

DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution.
Comput. Commun., May, 2023

Attention-based dual-path feature fusion network for automatic skin lesion segmentation.
BioData Min., January, 2023

A mobile energy trading scheme based on Lightning Network.
Concurr. Comput. Pract. Exp., 2023

A High Capacity Combined Carrier Steganography Without Embedding Image.
Proceedings of the IEEE Intl Conf on Dependable, 2023

CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Robust Object Detection Based on a Comparative Learning Perspective.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Adversarial Attack Method Based on Dual- frequency Domain Transformation.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Communication-Efficient Federated Learning with Sparsity and Quantization.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Blockchain of Blockchains Structure Based on Asset Trading Scheme.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Data Confirmation Scheme based on Auditable CP-ABE.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A K-anonymity Optimization Algorithm Under Attack Model.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Blockchain-based Scalable Electronic Contract Signing System.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Secure Comparison Protocol in the Malicious Model.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

The optimal attack-defense scheme for secret sharing.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

A Security Transaction Model Based on HTLC.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Lightweight and Efficient Image Dehazing Network Guided by Transmission Estimation from Real-World Hazy Scenes.
Sensors, 2021

Cross-Domain Scene Classification Based on a Spatial Generalized Neural Architecture Search for High Spatial Resolution Remote Sensing Images.
Remote. Sens., 2021

Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things.
Mob. Inf. Syst., 2021

DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
CoRR, 2021

Application of Wireless Communication in Intelligent Distribution Network Communication Technology.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

5G Mobile Communication System Based on Cloud Wireless Access Network.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Application of FPGA Array Structure Digital Signal Processing Platform in Communication Field.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel.
Int. J. Distributed Sens. Networks, 2020

A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Low Energy-Consuming Security Data Aggregation Protocol.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Certificateless Short Aggregate Signature Scheme for Mobile Devices.
IEEE Access, 2019

Anti-Synchronization and Robust Authentication for Noisy PUF-Based Smart Card.
IEEE Access, 2019

Blockchain Private Key Storage Algorithm Based on Image Information Hiding.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Certificateless short signature scheme from pairing in the standard model.
Int. J. Commun. Syst., 2018

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
KSII Trans. Internet Inf. Syst., 2017

2015
Realizing network function virtualization management and orchestration with model based open architecture.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2003
Design Recovery of a Two Level System.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003


  Loading...