关注
Yuling Chen
Yuling Chen
State Key Laboratory of Public Big Data,Guizhou University
在 gzu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Machine learning and deep learning methods for cybersecurity
Y Xin, L Kong, Z Liu, Y Chen, Y Li, H Zhu, M Gao, H Hou, C Wang
Ieee access 6, 35365-35381, 2018
11342018
A secure cryptocurrency scheme based on post-quantum blockchain
YL Gao, XB Chen, YL Chen, Y Sun, XX Niu, YX Yang
Ieee Access 6, 27205-27213, 2018
1942018
Semi‐selfish mining based on hidden Markov decision process
T Li, Z Wang, G Yang, Y Cui, Y Chen, X Yu
International Journal of Intelligent Systems 36 (7), 3596-3612, 2021
1022021
A secure and efficient data integrity verification scheme for cloud-IoT based on short signature
H Zhu, Y Yuan, Y Chen, Y Zha, W Xi, B Jia, Y Xin
IEEE Access 7, 90036-90044, 2019
972019
A new lattice-based signature scheme in post-quantum blockchain network
CY Li, XB Chen, YL Chen, YY Hou, J Li
Ieee Access 7, 2026-2033, 2018
952018
Is semi‐selfish mining available without being detected?
T Li, Z Wang, Y Chen, C Li, Y Jia, Y Yang
International Journal of Intelligent Systems 37 (12), 10576-10597, 2022
822022
PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs
Y Chen, J Sun, Y Yang, T Li, X Niu, H Zhou
International Journal of Intelligent Systems 37 (2), 1204-1221, 2022
802022
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and communication networks 2020 (1), 8839047, 2020
762020
A heterogeneous ensemble learning framework for spam detection in social networks with imbalanced data
C Zhao, Y Xin, X Li, Y Yang, Y Chen
Applied Sciences 10 (3), 936, 2020
682020
FaDe: a blockchain-based fair data exchange scheme for big data sharing
Y Chen, J Guo, C Li, W Ren
Future Internet 11 (11), 225, 2019
482019
Cryptanalysis of secret sharing with a single d-level quantum system
XB Chen, X Tang, G Xu, Z Dou, YL Chen, YX Yang
Quantum Information Processing 17, 1-11, 2018
482018
Dynamic multi-key FHE in asymmetric key setting from LWE
Y Chen, S Dong, T Li, Y Wang, H Zhou
IEEE Transactions on Information Forensics and Security 16, 5239-5249, 2021
452021
Depet: A decentralized privacy-preserving energy trading scheme for vehicular energy network via blockchain and k-anonymity
Y Long, Y Chen, W Ren, H Dou, NN Xiong
Ieee Access 8, 192587-192596, 2020
412020
Quantum K-nearest-neighbor image classification algorithm based on KL transform
NR Zhou, XX Liu, YL Chen, NS Du
International Journal of Theoretical Physics 60, 1209-1224, 2021
382021
Automated software vulnerability detection based on hybrid neural network
X Li, L Wang, Y Xin, Y Yang, Q Tang, Y Chen
Applied Sciences 11 (7), 3201, 2021
362021
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things.
C Li, G Xu, Y Chen, H Ahmad, J Li
Computers, Materials & Continua 61 (2), 2019
342019
Energy trading scheme based on consortium blockchain and game theory
Y Chen, Y Li, Q Chen, X Wang, T Li, C Tan
Computer Standards & Interfaces 84, 103699, 2023
282023
An attention-based graph neural network for spam bot detection in social networks
C Zhao, Y Xin, X Li, H Zhu, Y Yang, Y Chen
Applied Sciences 10 (22), 8160, 2020
262020
A privacy measurement framework for multiple online social networks against social identity linkage
X Li, Y Yang, Y Chen, X Niu
Applied Sciences 8 (10), 1790, 2018
212018
Impsuic: a quality updating rule in mixing coins with maximum utilities
X Yu, Z Wang, Y Wang, F Li, T Li, Y Chen, Y Tian, X Yu
International Journal of Intelligent Systems 36 (3), 1182-1198, 2021
202021
系统目前无法执行此操作,请稍后再试。
文章 1–20