default search action
Yongle Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Jie Yang, Xiufang Feng, Yongle Chen, Pengfei Yan, Hao Zhang:
A secure fractal compression scheme based on irregular Latin square, Julia and 2D-FCICM. Digit. Signal Process. 155: 104725 (2024) - [j22]Yuli Yang, Rui-Yun Chang, Xiufang Feng, Peizhen Li, Yongle Chen, Hao Zhang:
An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images. Entropy 26(3): 254 (2024) - [j21]Yao Ma, Xurong Zhai, Dan Yu, Yuli Yang, Xingyu Wei, Yongle Chen:
Label-Only Membership Inference Attack Based on Model Explanation. Neural Process. Lett. 56(5): 236 (2024) - [j20]Xin Huang, Ran Cheng, Jiaxing Wu, Qingyu Guo, Shijia Chen, Chaojie Liu, Zhao Wang, Yongle Chen, Shufeng Hao, Jie Zhang:
A Blockchain-Based Authentication Scheme for Energy Trading in Electric Transportation. IEEE Trans. Smart Grid 15(6): 6048-6062 (2024) - [c10]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. INFOCOM 2024: 151-160 - [i2]Yongle Chen, Feng Ma, Ying Zhang, YongZhong He, Haining Wang, Qiang Li:
AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale. CoRR abs/2406.12947 (2024) - [i1]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. CoRR abs/2406.15731 (2024) - 2023
- [j19]Yongle Chen, Sida Su, Dan Yu, Hao He, Xiaojian Wang, Yao Ma, Hao Guo:
Cross-Domain Industrial Intrusion Detection Deep Model Trained With Imbalanced Data. IEEE Internet Things J. 10(1): 584-596 (2023) - 2022
- [j18]Jianhua Zhang, Yongle Chen, Lei Zhao, Jiahui Cai:
A series-connected asymmetrical PWM half-bridge three-level converter with reduced circulating current. IEICE Electron. Express 19(1): 20210433 (2022) - [j17]Yao Ma, Yuting Wu, Dan Yu, Lv Ding, Yongle Chen:
Vulnerability association evaluation of Internet of thing devices based on attack graph. Int. J. Distributed Sens. Networks 18(5): 155013292210978 (2022) - [j16]Yongle Chen, Jun Pan, Dan Yu, Yao Ma, Yuli Yang:
Retransmission-Based TCP Fingerprints for Fine-Grain IoV Edge Device Identification. IEEE Trans. Veh. Technol. 71(7): 7835-7847 (2022) - [c9]Yongle Chen, Lei Zhao, Jianhua Zhang:
Half-bridge integrated ZVS three-level DC-DC converter with Wide ZVS range and Reduced Circulting current. ICIT 2022: 1-6 - [c8]Jianhua Zhang, Lei Zhao, Yongle Chen:
An Asymmetrical PWM Full-bridge converter with Current-doubler Rectifier for Medium voltage applications. ICIT 2022: 1-6 - 2021
- [c7]Bingchu Jin, Zesheng Hu, Yongle Chen, Jianhua Wang, Mingrui Quan, Yawei Zhao, Jia Zhang:
The Iot Malware Classification Method Based On Visual Local Features. ICNCC 2021: 47-53 - 2020
- [j15]Dan Yu, Lilong Zhang, Yongle Chen, Yao Ma, Junjie Chen:
Large-Scale IoT Devices Firmware Identification Based on Weak Password. IEEE Access 8: 7981-7992 (2020) - [j14]Yongle Chen, Xiaowei Lian, Dan Yu, Shichao Lv, Shaochen Hao, Yao Ma:
Exploring Shodan From the Perspective of Industrial Control Systems. IEEE Access 8: 75359-75369 (2020) - [j13]Yuli Yang, Nanyue Yu, Yongle Chen:
Trusted Cloud Service Selection Algorithm Based on Lightweight Intuitionistic Fuzzy Numbers. IEEE Access 8: 97748-97756 (2020) - [j12]Dan Yu, Haoguang Xin, Yongle Chen, Yao Ma, Junjie Chen:
Cross-Layer Protocol Fingerprint for Large-Scale Fine-Grain Devices Identification. IEEE Access 8: 176294-176303 (2020) - [j11]Yongle Chen, Xiaojian Wang, Yuli Yang, Hong Li:
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract. Sensors 20(4): 1062 (2020) - [j10]Dan Yu, Peiyang Li, Yongle Chen, Yao Ma, Junjie Chen:
A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification. Sensors 20(7): 1863 (2020) - [c6]Zhibo Wang, Wenxin Liu, Xiaoyi Pang, Ju Ren, Zhe Liu, Yongle Chen:
Towards Pattern-aware Privacy-preserving Real-time Data Collection. INFOCOM 2020: 109-118
2010 – 2019
- 2019
- [j9]Yongle Chen, Qinghua Yao, Dan Yu, Yuli Yang:
WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan. IEEE Access 7: 79118-79126 (2019) - 2018
- [j8]Yuli Yang, Rui Liu, Yongle Chen, Tong Li, Yi Tang:
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection. IEEE Access 6: 37644-37652 (2018) - [j7]Yongle Chen, Xiaojian Wang, Dan Yu, Yuli Yang, Jian Chen:
Localizing Access Point Through Simple Gesture. IEEE Access 6: 38870-38880 (2018) - [j6]Jiali Li, Yongle Chen, Zhi Li, Limin Sun:
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph). 计算机科学 45(9): 171-176 (2018) - [c5]Yongle Chen, Bingchu Jin, Dan Yu, Junjie Chen:
Malware Variants Detection Using Behavior Destructive Features. PAC 2018: 121-122 - 2017
- [c4]Yongle Chen, Hui Li, Kejiao Li, Jiyang Zhang:
An improved P2P file system scheme based on IPFS and Blockchain. IEEE BigData 2017: 2652-2657 - [c3]Kejiao Li, Hui Li, Hanxu Hou, Kedan Li, Yongle Chen:
Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain. HPCC/SmartCity/DSS 2017: 466-473 - [c2]Zhihao Wang, Yongle Chen, Hui Wen, Lian Zhao, Limin Sun:
Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. VTC Fall 2017: 1-5 - 2015
- [j5]Yongle Chen, Wei Liu, Yongping Xiong, Jing Duan, Zhi Li, Hongsong Zhu:
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning. Int. J. Distributed Sens. Networks 11: 753191:1-753191:10 (2015) - 2014
- [j4]Wei Liu, Hong Li, Yongle Chen, Hongsong Zhu, Limin Sun:
LARES: latency-reduced neighbour discovery for contagious diseases prevention. Int. J. Ad Hoc Ubiquitous Comput. 16(1): 3-13 (2014) - [j3]Wei Liu, Yongle Chen, Yongping Xiong, Limin Sun, Hongsong Zhu:
Optimization of Sampling Cell Size for Fingerprint Positioning. Int. J. Distributed Sens. Networks 10 (2014) - [j2]Wei Liu, Qiang Li, Yongle Chen, Yongping Xiong, Yubo Deng, Limin Sun:
Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j1]Yongle Chen, Ci Chen, Hongsong Zhu, Limin Sun:
Efficient Deterministic Anchor Deployment for Sensor Network Positioning. Int. J. Distributed Sens. Networks 9 (2013) - 2011
- [c1]Yongle Chen, Limin Sun, Feng Wang, Xinyun Zhou:
Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks. GLOBECOM 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint