Yuxiang Chen

Orcid: 0000-0002-9963-9554

According to our database1, Yuxiang Chen authored at least 67 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management.
J. Inf. Sci. Eng., January, 2024

Jetfire: Efficient and Accurate Transformer Pretraining with INT8 Data Flow and Per-Block Quantization.
CoRR, 2024

SlimSLAM: An Adaptive Runtime for Visual-Inertial Simultaneous Localization and Mapping.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Post-Quantum Security: Opportunities and Challenges.
Sensors, October, 2023

EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems.
Sensors, October, 2023

An improved binary particle swarm optimization combing V-shaped and U-shaped transfer function.
Evol. Intell., October, 2023

Learning Background-Suppressed Dual-Regression Correlation Filters for Visual Tracking.
Sensors, July, 2023

Thermal failure of diamond tools indicated by diamond degradation: Damage evaluation and property prediction on small image datasets.
Eng. Appl. Artif. Intell., March, 2023

A Nonlinear-Model-Based High-Bandwidth Current Sensor Design for Switching Current Measurement of Wide Bandgap Devices.
Sensors, 2023

Krypton: Real-time Serving and Analytical SQL Engine at ByteDance.
Proc. VLDB Endow., 2023

Preserving Knowledge Invariance: Rethinking Robustness Evaluation of Open Information Extraction.
CoRR, 2023

Practical Teaching Reform of Cybersecurity Courses Incorporating Personalized Recommendations.
Proceedings of the Computer Science and Education. Teaching and Curriculum, 2023

Research on Improving Higher Education Exam Quality Based on Weighted k-Medoids Clustering.
Proceedings of the Computer Science and Education. Educational Digitalization, 2023

Incentive Aware Computation Resource Sharing and Partition in Pervasive Mobile Cloud.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Revolutionizing Network Performance: The Active and Passive Service Path Performance Monitoring Analysis Method.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

2022
Multiphysics Finite Element Method for Quasi-Static Thermo-Poroelasticity.
J. Sci. Comput., 2022

Solving the Unit Commitment Problem with Improving Binary Particle Swarm Optimization.
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022

Ciphertext storage scheme supporting data hierarchical management and control.
Proceedings of the International Conference on Networking and Network Applications, 2022

Syntactically Robust Training on Partially-Observed Data for Open Information Extraction.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Restructuring Particle Swarm Optimization algorithm based on linear system theory.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

2021
Performance Analysis of the IOTA DAG-Based Distributed Ledger.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2021

NetMF+: Network Embedding Based on Fast and Effective Single-Pass Randomized Matrix Factorization.
CoRR, 2021

Augmentation Pathways Network for Visual Recognition.
CoRR, 2021

Real-Time Video Super-Resolution on Smartphones with Deep Learning, Mobile AI 2021 Challenge: Report.
CoRR, 2021

Access Control Scheme Supporting Attribute Revocation in Cloud Computing.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Research on Data Security of Unmanned Aerial Vehicles.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Searchable Encryption System for Big Data Storage.
Proceedings of the Data Science, 2021

2020
Accurate and Fast Recovery of Network Monitoring Data With GPU-Accelerated Tensor Completion.
IEEE/ACM Trans. Netw., 2020

Accurate and Fast Recovery of Network Monitoring Data: A GPU Accelerated Matrix Completion.
IEEE/ACM Trans. Netw., 2020

Monitoring of Fine-Scale Warm Drain-Off Water from Nuclear Power Stations in the Daya Bay Based on Landsat 8 Data.
Remote. Sens., 2020

Products-10K: A Large-scale Product Recognition Dataset.
CoRR, 2020

Searchable encryption scheme with limited search scope for group users.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Unified Trust Service Scheme for Heterogeneous Identity Alliance.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep Convolutional Spiking Neural Networks for Keyword Spotting.
Proceedings of the Interspeech 2020, 2020

Blockchain-based Dynamic Group Management for Multiple Keywords Searchable Encryption Technology.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

2019
Accurate Recovery of Missing Network Measurement Data With Localized Tensor Completion.
IEEE/ACM Trans. Netw., 2019

区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application).
计算机科学, 2019

Public Auditing for Trusted Cloud Storage Services.
IEEE Secur. Priv., 2019

Towards A Scalable DAG-based Distributed Ledger for Smart Communities.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

An Open Identity Authentication Scheme Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Evaluation of Voltage-driven Electrical Resistance Tomography Using LCR Meter-based Measurement System.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

Trust Enhancement Scheme for Cross Domain Authentication of PKI System.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Anonymous cross-domain authentication scheme for medical PKI system.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
基于区块链的身份管理认证研究 (Research on Identity Management Authentication Based on Blockchain).
计算机科学, 2018

IoT-based smart homes: A review of system architecture, software, communications, privacy and security.
Internet Things, 2018

A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Local Tensor Completion Based on Locality Sensitive Hashing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Characteristics of Cultivation and Domestication of a Sort of SRB Isolated from Landfill Leachate under Sulfite Condition.
Proceedings of the 2018 8th International Conference on Biomedical Engineering and Technology, 2018

Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Development of electromagnetic tomography system using LCR meter.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017

Traffic Load Balancing Schemes for Devolved Controllers in Mega Data Centers.
IEEE Trans. Parallel Distributed Syst., 2017

云数据持有性审计研究与进展 (Research and Development of Auditing Techniques for Cloud Data Possession).
计算机科学, 2017

Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Robust Spatio-temporal Tensor Recovery for Internet Traffic Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
3D Image Processing for Structural Analysis of Macromolecules Using Cryo-Electron Tomography (3D Bildverarbeitung für die Strukturanalyse von Makromolekülen durch Kryoelektronentomographie)
PhD thesis, 2015

Spatio-temporal tensor completion for imputing missing internet traffic data.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

2014
Automatic particle picking and multi-class classification in cryo-electron tomograms.
Proceedings of the IEEE 11th International Symposium on Biomedical Imaging, 2014

Automated detection of polysomes in cryoelectron tomography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
A novel requirement analysis approach for periodic control systems.
Frontiers Comput. Sci., 2013

2012
An Approach to Requirement Analysis for Periodic Control Systems.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Personalized Friend Recommendation in Social Network Based on Clustering Method.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

Detection and identification of macromolecular complexes in cryo-electron tomograms using support vector machines.
Proceedings of the 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2012

2010
A Testbed for Adaptive Human-Robot Collaboration.
Proceedings of the KI 2010: Advances in Artificial Intelligence, 2010

2007
Perceived and Actual Grasp Forces on Cylindrical Handles.
Hum. Factors, 2007


  Loading...