Yulong Shen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on Vertical Dataset.
CoRR, July, 2025

2024
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction.
Ad Hoc Networks, January, 2024

Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles.
Veh. Commun., 2024

TRUST: A Toolkit for TEE-Assisted Secure Outsourced Computation over Integers.
CoRR, 2024

Extracting Spatiotemporal Data from Gradients with Large Language Models.
CoRR, 2024

Refining Pre-trained Language Models for Domain Adaptation with Entity-Aware Discriminative and Contrastive Learning.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024

Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofing.
Proceedings of the International Conference on Networking and Network Applications, 2024

A Simple and Effective Method for Anomaly Detection on Attributed Graphs via Feature Consistency.
Proceedings of the IEEE International Conference on Acoustics, 2024

Enhancing Privacy of Spatiotemporal Federated Learning Against Gradient Inversion Attacks.
Proceedings of the Database Systems for Advanced Applications, 2024

2023
Numerical variational studies of quantum phase transitions in the sub-Ohmic spin-boson model with multiple polaron ansatz.
Comput. Phys. Commun., December, 2023

Advancing Domain Adaptation of BERT by Learning Domain Term Semantics.
Proceedings of the Knowledge Science, Engineering and Management, 2023

2022
An Intelligent Indoor Localization System in the NLOS Environment Based on Deep Learning and CSI Images.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization.
Proceedings of the International Conference on Networking and Network Applications, 2022

An Encrypted Abnormal Stream Detection Method Based on Improved Skyline Computation.
Proceedings of the International Conference on Networking and Network Applications, 2022

Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2022

Towards Relational Multi-Agent Reinforcement Learning via Inductive Logic Programming.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
A Survey of Knowledge Enhanced Pre-trained Models.
CoRR, 2021

Research on the Security of Visual Reasoning CAPTCHA.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Similarities and Evolutionary Relationships of COVID-19 and Related Viruses.
CoRR, 2020

2019
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering.
Multim. Tools Appl., 2019

Profit optimization in service-oriented data market: A Stackelberg game approach.
Future Gener. Comput. Syst., 2019

Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm.
Proceedings of the 2018 International Conference on Computing, 2018

2017
A protocol-free detection against cloud oriented reflection DoS attacks.
Soft Comput., 2017

Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction.
CoRR, 2017

Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Commun. Inf. Networks, 2016

2014
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming.
Inf. Sci., 2014

2012
The multimedia service session handoff method in heterogeneous wireless networks.
Int. J. Grid Util. Comput., 2012

Security Information Flow Control Model and Method in MILS.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
Efficient security transmission protocol with identity-based encryption in wireless mesh networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2003
Registration and Fusion of Retinal Images - An Evaluation Study.
IEEE Trans. Medical Imaging, 2003


  Loading...