Yuling Chen

Orcid: 0000-0002-8674-8356

Affiliations:
  • Guizhou University, Guizhou, China


According to our database1, Yuling Chen authored at least 67 papers between 2018 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
GVFL: A group-verifiable federated learning with privacy.
Inf. Fusion, 2026

2025
CUBE-PUF-Based Anonymous Mutual Authentication Protocol for Internet of Vehicles.
IEEE Internet Things J., September, 2025

A PUF-Enhanced Fog-Enabled Hierarchical Authentication Protocol for Internet of Vehicles.
IEEE Internet Things J., September, 2025

A Redactable Blockchain-Based Anonymous Announcement Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., August, 2025

XLM4Detector: Multistage Deobfuscation and Semantic-Driven Excel 4.0 Macro Malware Detection.
IEEE Internet Things J., August, 2025

Cross-Chain Privacy Preserving for BIoMT With Designated Verifier Proxy Signature.
IEEE Internet Things J., June, 2025

Einocchio: Efficiently Outsourcing Polynomial Computation With Verifiable Computation and Optimized Newton Interpolation.
IEEE Trans. Inf. Forensics Secur., 2025

Privacy-Enhanced High-Fidelity Separable Lossless Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2025

Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi.
IEEE Trans. Inf. Forensics Secur., 2025

P-EVFL: Efficient verifiable federated learning with privacy.
Knowl. Based Syst., 2025

Quantum-safe identity-based designated verifier signature for BIoMT.
J. Syst. Archit., 2025

Verifiable and Redactable Blockchain for Internet of Vehicles Data Sharing.
IEEE Internet Things J., 2025

AMF-VSN: Adaptive multi-process fusion video steganography based on invertible neural networks.
Inf. Fusion, 2025

A privacy-aware and fair self-exchanging self-trading scheme for IoT data based on smart contract.
Int. J. Grid Util. Comput., 2025

2024
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption.
J. Cloud Comput., December, 2024

Mutual Authentication Protocols Based on PUF and Multitrusted Authority for Internet of Vehicles.
IEEE Internet Things J., December, 2024

BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment.
IEEE Internet Things J., December, 2024

VC-MAKA: Mutual Authentication and Key Agreement Protocol Based on Verifiable Commitment for Internet of Vehicles.
IEEE Internet Things J., December, 2024

Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024

Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective.
ACM Comput. Surv., August, 2024

Efficient Designated Verifier Signature for Secure Cross-Chain Health Data Sharing in BIoMT.
IEEE Internet Things J., June, 2024

Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps.
IEEE Trans. Ind. Informatics, May, 2024

FedSQ: Sparse-Quantized Federated Learning for Communication Efficiency.
IEEE Trans. Consumer Electron., February, 2024

Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems.
Entropy, January, 2024

Blockchain-assisted full-session key agreement for secure data sharing in cloud computing.
J. Parallel Distributed Comput., 2024

Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption.
Inf. Process. Manag., 2024

A blockchain-empowered authentication scheme for worm detection in wireless sensor network.
Digit. Commun. Networks, 2024

Diffusion Model-based Metaverse Rendering in UAV-Enabled Edge Networks With Dual Connectivity.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

2023
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
J. Cloud Comput., December, 2023

GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection.
Entropy, March, 2023

Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games.
Symmetry, February, 2023

Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach.
IEEE Internet Things J., 2023

Energy trading scheme based on consortium blockchain and game theory.
Comput. Stand. Interfaces, 2023

Cross-domain vulnerability detection using graph embedding and domain adaptation.
Comput. Secur., 2023

2022
Is semi-selfish mining available without being detected?
Int. J. Intell. Syst., December, 2022

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model.
J. Organ. End User Comput., 2022

A trusted de-swinging k-anonymity scheme for location privacy protection.
J. Cloud Comput., 2022

A designated verifier multi-signature scheme in multi-clouds.
J. Cloud Comput., 2022

PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022

DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
Int. J. Intell. Syst., 2022

A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE.
IEEE Trans. Inf. Forensics Secur., 2021

Cross-Platform Strong Privacy Protection Mechanism for Review Publication.
Secur. Commun. Networks, 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

A blockchain index structure based on subchain query.
J. Cloud Comput., 2021

A rational delegating computation protocol based on reputation and smart contract.
J. Cloud Comput., 2021

ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021

Semi-selfish mining based on hidden Markov decision process.
Int. J. Intell. Syst., 2021

A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

A De-swinging Scheme in Location Privacy Protection via Smart Contract.
Proceedings of the IEEE Intl Conf on Dependable, 2021

PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Using information entropy to analyze secure multi-party computation protocol.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A location data protection protocol based on differential privacy.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity.
IEEE Access, 2020

Using User Behavior to Measure Privacy on Online Social Networks.
IEEE Access, 2020

CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts.
IEEE Access, 2020

2019
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019

LMDGW: a novel matrix based dynamic graph watermark.
J. Ambient Intell. Humaniz. Comput., 2019

FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing.
Future Internet, 2019

A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.
IEEE Access, 2019

A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019

A Authentication and Access Authorization Mechanism on the PaaS Platform.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018

Machine Learning and Deep Learning Methods for Cybersecurity.
IEEE Access, 2018

Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform.
IEEE Access, 2018


  Loading...