


default search action
Yuling Chen 0002
Person information
- affiliation: Guizhou University, Guizhou, China
Other persons with the same name
- Yuling Chen — disambiguation page
- Yuling Chen 0001
— Technical Center of Beijing Customs, Beijing, China - Yuling Chen 0003
— Tsinghua University, Beijing, China - Yuling Chen 0004
— Mianyang, China Mianyang Teachers' College, Mianyang, China - Yuling Chen 0005
— Peking University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j72]Yibo Cao, Shiyuan Xu
, Gang Xu, Xiu-Bo Chen, Yuling Chen, Siu-Ming Yiu
:
Privacy-preserving in cloud networks: An efficient, revocable and authenticated encrypted search scheme. Comput. Networks 275: 111771 (2026)
[j71]Juan Ma, Xinyi Qing, Xiaohua Xu, Yuling Chen
:
GVFL: A group-verifiable federated learning with privacy. Inf. Fusion 126: 103403 (2026)
[j70]Jing Yang, Xiaoyong Li, Yuankai Wu, Yuling Chen, Xiaoli Ruan, Chengjiang Li, Qing Hou:
Self-attention and cross-modal attention for audio-visual zero-shot learning. Inf. Fusion 129: 103966 (2026)
[j69]Hongjie Luo
, Yuling Chen
, Dapeng Lan
, Hui Dou, Keshi Xiong, Celimuge Wu
:
FedCoguard: A Defense Framework for Federated Learning Against Untargeted Poisoning Attacks in Sustainable Agricultural IoT. IEEE Internet Things J. 13(1): 1475-1489 (2026)- 2025
[j68]Xiaoyong Li, Jing Yang, Yuling Chen, Wei Zhang
, Xiaoli Ruan, Chengjiang Li
, Zhidong Su:
Learning semantic consistency for audio-visual zero-shot learning. Artif. Intell. Rev. 58(7): 212 (2025)
[j67]Yuling Chen, Hongyan Yin, Yaocheng Zhang, Wei Ren, Yi Ren:
A privacy-aware and fair self-exchanging self-trading scheme for IoT data based on smart contract. Int. J. Grid Util. Comput. 16(3): 191-201 (2025)
[j66]Yangwen Zhang
, Yuling Chen, Hui Dou, Yan Meng
, Haojin Zhu:
AMF-VSN: Adaptive multi-process fusion video steganography based on invertible neural networks. Inf. Fusion 121: 103130 (2025)
[j65]Yuxiang Yang
, Yuling Chen
, Zhiquan Liu
, Chaoyue Tan, Yun Luo:
Verifiable and Redactable Blockchain for Internet of Vehicles Data Sharing. IEEE Internet Things J. 12(4): 4249-4261 (2025)
[j64]Chaoyang Li
, Bohao Jiang
, Mianxiong Dong
, Yuling Chen
, Min Huang, Xiangjun Xin
, Kaoru Ota
:
Cross-Chain Privacy Preserving for BIoMT With Designated Verifier Proxy Signature. IEEE Internet Things J. 12(12): 20042-20055 (2025)
[j63]Xiuzhang Yang, Yuling Chen
, Chaofan Chen
, Di Yao
, Chenguang Li, Yilin Zhou
, Chenyang Wang
, Zhi Ouyang
, Guojun Peng
:
XLM4Detector: Multistage Deobfuscation and Semantic-Driven Excel 4.0 Macro Malware Detection. IEEE Internet Things J. 12(16): 33271-33292 (2025)
[j62]Chunzhi Jia
, Weijie Tan
, Ao Shen, Zhen Li
, Yuling Chen
, Rui Zhao, Qixiang Niu
, Chunguo Li
:
A PUF-Enhanced Fog-Enabled Hierarchical Authentication Protocol for Internet of Vehicles. IEEE Internet Things J. 12(18): 37629-37644 (2025)
[j61]Ao Shen
, Weijie Tan
, Chunzhi Jia
, Yuling Chen
, Kun Niu, Chunguo Li
, Yangmei Zhang:
CUBE-PUF-Based Anonymous Mutual Authentication Protocol for Internet of Vehicles. IEEE Internet Things J. 12(18): 38697-38709 (2025)
[j60]Jianqi Wei, Yuling Chen, Xiuzhang Yang, Yun Luo, Xintao Pei:
A verifiable scheme for differential privacy based on zero-knowledge proofs. J. King Saud Univ. Comput. Inf. Sci. 37(3) (2025)
[j59]Huan Zhuang, Weijie Tan, Shangyu Lv, Yang Bi, Yuling Chen, Chunguo Li:
Three factors identity authentication and key agreement protocol for UAVs-Assisted terrain exploration. J. King Saud Univ. Comput. Inf. Sci. 37(10) (2025)
[j58]Chaoyang Li
, Yuling Chen, Mianxiong Dong, Jian Li, Min Huang, Xiangjun Xin, Kaoru Ota:
Quantum-safe identity-based designated verifier signature for BIoMT. J. Syst. Archit. 160: 103362 (2025)
[j57]Juan Ma, Xiangshen Ma, Yuling Chen
:
P-EVFL: Efficient verifiable federated learning with privacy. Knowl. Based Syst. 330: 114480 (2025)
[j56]Rou Zhou
, Yuling Chen
, Hui Dou:
KApFL: Kolmogorov-Arnold Networks for Personalized Federated Learning. IEEE Trans. Consumer Electron. 71(4): 9234-9245 (2025)
[j55]Xintao Pei
, Yuling Chen
, Yangyang Long
, Haiwei Sang, Yun Luo:
Einocchio: Efficiently Outsourcing Polynomial Computation With Verifiable Computation and Optimized Newton Interpolation. IEEE Trans. Inf. Forensics Secur. 20: 1981-1992 (2025)
[j54]Jiachun Li
, Yan Meng
, Fazhong Liu, Tian Dong
, Suguo Du
, Guoxing Chen
, Yuling Chen
, Haojin Zhu
:
Synergistic Multi-Modal Keystroke Eavesdropping in Virtual Reality With Vision and Wi-Fi. IEEE Trans. Inf. Forensics Secur. 20: 8387-8401 (2025)
[j53]Yun Luo
, Yuling Chen
, Zhi Ouyang
, Weijie Tan
, Xiuzhang Yang:
Privacy-Enhanced High-Fidelity Separable Lossless Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 20: 9180-9194 (2025)
[j52]Yuxiang Yang
, Yuling Chen
, Zhiquan Liu
, Yan Meng
, Haiwei Sang:
A Redactable Blockchain-Based Anonymous Announcement Scheme for VANETs. IEEE Trans. Intell. Transp. Syst. 26(8): 12417-12431 (2025)
[c33]Long Chen, Yuling Chen, Yun Luo, Hui Dou, Xinyang Zhong:
Attention-Guided Hierarchical Defense for Multimodal Attacks in Vision-Language Models. CVPR Workshops 2025: 1607-1617
[c32]Haolang Feng, Yuling Chen, Hui Dou, Rou Zhou, Long Chen:
DMD: Boosting Adversarial Transferability via Dynamic Momentum Decay. DSPP (1) 2025: 24-37
[c31]Rou Zhou, Yuling Chen, Hui Dou, Haolang Feng, Long Chen:
Personalized Federated Learning with Adaptive Weight Clustering. DSPP (1) 2025: 443-458
[c30]Hongjie Luo, Yuling Chen, Hui Dou, Junyu Zhu, Haonan Zhan:
FedVoD: A Robust Federated Learning Defense Strategy Against Hybrid Byzantine Attacks. DSPP (1) 2025: 459-473- 2024
[j51]Bing Zhang
, Xuyang Zhao
, Jiangtian Nie
, Jianhang Tang
, Yuling Chen
, Yang Zhang
, Dusit Niyato
:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. ACM Comput. Surv. 56(8): 203:1-203:39 (2024)
[j50]Yuling Chen
, Xiong Yang
, Tao Li
, Yi Ren
, Yangyang Long
:
A blockchain-empowered authentication scheme for worm detection in wireless sensor network. Digit. Commun. Networks 10(2): 265-272 (2024)
[j49]Zhongxiang He
, Yuling Chen
, Yun Luo, Lingyun Zhang
, Yingying Tang:
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems. Entropy 26(1): 45 (2024)
[j48]Chaoyang Li
, Bohao Jiang
, Mianxiong Dong
, Yuling Chen
, Zhifeng Zhang, Xiangjun Xin
, Kaoru Ota
:
Efficient Designated Verifier Signature for Secure Cross-Chain Health Data Sharing in BIoMT. IEEE Internet Things J. 11(11): 19838-19851 (2024)
[j47]Yangyang Long
, Changgen Peng
, Yuling Chen
, Weijie Tan
, Jing Sun:
BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment. IEEE Internet Things J. 11(23): 38508-38520 (2024)
[j46]Yuting Yang
, Weijie Tan
, Zhen Li
, Yuling Chen
, Chunguo Li
:
Mutual Authentication Protocols Based on PUF and Multitrusted Authority for Internet of Vehicles. IEEE Internet Things J. 11(24): 40086-40099 (2024)
[j45]Zhimin He
, Weijie Tan
, Yangyang Long
, Yuling Chen
, Kun Niu, Chunguo Li
, Weiqiang Tan
:
VC-MAKA: Mutual Authentication and Key Agreement Protocol Based on Verifiable Commitment for Internet of Vehicles. IEEE Internet Things J. 11(24): 41166-41181 (2024)
[j44]Yun Luo
, Yuling Chen, Hui Dou, Chaoyue Tan, Huiyu Zhou:
Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption. Inf. Process. Manag. 61(5): 103789 (2024)
[j43]Chang Shu, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou:
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model. J. Cloud Comput. 13(1): 4 (2024)
[j42]Yun Luo
, Yuling Chen, Tao Li, Chaoyue Tan, Hui Dou:
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption. J. Cloud Comput. 13(1): 22 (2024)
[j41]Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang:
Cross-chain asset trading scheme for notaries based on edge cloud storage. J. Cloud Comput. 13(1): 90 (2024)
[j40]Yan Zheng, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Chang Shu, Lang Chen:
Optimization model for vehicular network data queries in edge environments. J. Cloud Comput. 13(1): 145 (2024)
[j39]Yangyang Long
, Changgen Peng, Weijie Tan
, Yuling Chen:
Blockchain-assisted full-session key agreement for secure data sharing in cloud computing. J. Parallel Distributed Comput. 193: 104943 (2024)
[j38]Zhong Long, Yuling Chen
, Hui Dou, Yangwen Zhang, Yao Chen:
FedSQ: Sparse-Quantized Federated Learning for Communication Efficiency. IEEE Trans. Consumer Electron. 70(1): 4050-4061 (2024)
[j37]Yangyang Long
, Changgen Peng
, Weijie Tan
, Yuling Chen
:
Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps. IEEE Trans. Ind. Informatics 20(5): 7883-7893 (2024)
[j36]Le Yu
, Shufan Zhang
, Yan Meng
, Suguo Du
, Yuling Chen
, Yanli Ren
, Haojin Zhu
:
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability. IEEE Trans. Mob. Comput. 23(8): 8256-8273 (2024)
[j35]Pengyu Chen, Yuling Chen, Xuewei Wang
, Linlin Yuan, Chaoyue Tan, Yuxiang Yang:
A high-capacity slicing PBFT protocol based on reputation evaluation model. Wirel. Networks 30(8): 7469-7482 (2024)
[c29]Pengyu Chen, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Bo Li, Jiachen Huang:
Slicing PBFT Consensus Algorithm Based on VRF. Blockchain 2024: 569-574
[c28]Xintao Pei, Yuling Chen, Yun Luo, Zaidong Li, Jianqi Wei:
Lightweight IoT-Oriented Verifiable Computing Scheme in Cloud Computing Circumstance. CyberSciTech 2024: 39-44
[c27]Zaidong Li, Yuling Chen, Yun Luo, Xintao Pei, Yingqi Qin:
Private Comparison Based on Digital Decomposition for IoT Cloud Environments. CyberSciTech 2024: 88-93
[c26]Jianqi Wei, Yuling Chen, Yun Luo, Zaidong Li:
Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy. CyberSciTech 2024: 94-99
[c25]Yancheng Sun, Yuling Chen, Ziyang Liu, Hui Dou, Chaoyue Tan:
Targeted Universal Adversarial Attack Based on Fourier Transform. DSPP (1) 2024: 244-259
[c24]Guoquan Wu, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Luchao Han, Zehui Xiong
:
Diffusion Model-based Metaverse Rendering in UAV-Enabled Edge Networks With Dual Connectivity. WCNC 2024: 1-6- 2023
[j34]Xin Li
, Yang Xin, Hongliang Zhu, Yixian Yang, Yuling Chen:
Cross-domain vulnerability detection using graph embedding and domain adaptation. Comput. Secur. 125: 103017 (2023)
[j33]Chaoyue Tan
, Yuling Chen, Xiaojun Ren, Changgen Peng:
A mobile energy trading scheme based on Lightning Network. Concurr. Comput. Pract. Exp. 35(20) (2023)
[j32]Yuling Chen, Yufeng Li
, Qi Chen, Xianmin Wang
, Tao Li
, Chaoyue Tan:
Energy trading scheme based on consortium blockchain and game theory. Comput. Stand. Interfaces 84: 103699 (2023)
[j31]Yuling Chen, Hao Yang
, Xuewei Wang
, Qi Wang, Huiyu Zhou:
GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection. Entropy 25(3): 461 (2023)
[j30]Yuling Chen
, Hui Zhou
, Tao Li
, Jin Li
, Huiyu Zhou
:
Multifactor Incentive Mechanism for Federated Learning in IoT: A Stackelberg Game Approach. IEEE Internet Things J. 10(24): 21595-21606 (2023)
[j29]Ruonan Shi, Yuling Chen, Chaoyue Tan, Yun Luo, Tao Li:
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism. J. Cloud Comput. 12(1): 117 (2023)
[j28]Hao Yang, Xuewei Wang
, Yuling Chen, Hui Dou, Yangwen Zhang:
RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation. J. Cloud Comput. 12(1): 169 (2023)
[j27]Tiantian Zhang
, Yongtang Wu, Yuling Chen, Tao Li, Xiaojun Ren:
Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games. Symmetry 15(2): 443 (2023)
[c23]Yangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Maolin Xiong:
A High Capacity Combined Carrier Steganography Without Embedding Image. DASC/PiCom/CBDCom/CyberSciTech 2023: 95-100
[c22]Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo, Yuling Chen:
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain. DASC/PiCom/CBDCom/CyberSciTech 2023: 389-394
[c21]Zhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yancheng Sun:
Communication-Efficient Federated Learning with Sparsity and Quantization. DASC/PiCom/CBDCom/CyberSciTech 2023: 415-421
[c20]Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Pengyu Chen:
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism. DASC/PiCom/CBDCom/CyberSciTech 2023: 492-498
[c19]Maolin Xiong, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Adversarial Attack Method Based on Dual- frequency Domain Transformation. DASC/PiCom/CBDCom/CyberSciTech 2023: 543-548
[c18]Hao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Robust Object Detection Based on a Comparative Learning Perspective. DASC/PiCom/CBDCom/CyberSciTech 2023: 557-563
[c17]Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Yuxiang Yang:
A Blockchain of Blockchains Structure Based on Asset Trading Scheme. DASC/PiCom/CBDCom/CyberSciTech 2023: 582-588
[i2]Bing Zhang, Xuyang Zhao, Jiangtian Nie
, Jianhang Tang, Yuling Chen, Yang Zhang, Dusit Niyato:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. CoRR abs/2303.12588 (2023)- 2022
[j26]Yuling Chen
, Jing Sun
, Yixian Yang
, Tao Li
, Xinxin Niu
, Huiyu Zhou
:
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 37(2): 1204-1221 (2022)
[j25]Yuling Chen
, Juan Ma
, Xianmin Wang
, Xinyu Zhang, Huiyu Zhou:
DE-RSTC: A rational secure two-party computation protocol based on direction entropy. Int. J. Intell. Syst. 37(11): 8947-8967 (2022)
[j24]Tao Li
, Zhaojie Wang
, Yuling Chen
, Chunmei Li
, Yanling Jia
, Yixian Yang
:
Is semi-selfish mining available without being detected? Int. J. Intell. Syst. 37(12): 10576-10597 (2022)
[j23]Manxiang Yang, Baopeng Ye, Yuling Chen
, Tao Li, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
A trusted de-swinging k-anonymity scheme for location privacy protection. J. Cloud Comput. 11: 2 (2022)
[j22]Chaoyue Tan, Yuling Chen, Yongtang Wu, Xiaochuan He, Tao Li:
A designated verifier multi-signature scheme in multi-clouds. J. Cloud Comput. 11: 61 (2022)
[j21]Yun Luo
, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, Xiaomei Yu:
An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model. J. Organ. End User Comput. 34(10): 1-17 (2022)
[c16]Jing Sun, Yuling Chen, Xiao Lv, Xiaobin Qian:
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 280-286
[c15]Xiaochuan He, Chaoyue Tan, Yongtang Wu, Yuling Chen:
A Security Transaction Model Based on HTLC. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 328-331
[c14]Junhong Tao, Yongtang Wu, Yuling Chen:
A Secure Comparison Protocol in the Malicious Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 332-337
[c13]Yun Luo
, Yuling Chen, Tao Li, Yilei Wang:
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 338-342
[c12]Kaicheng Yang, Yongtang Wu, Yuling Chen:
A Blockchain-based Scalable Electronic Contract Signing System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 343-348
[c11]Manxiang Yang, Yongtang Wu, Yuling Chen:
A K-anonymity Optimization Algorithm Under Attack Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 357-362
[c10]Juan Ma
, Yuling Chen, Xiao Lv, Xiaobin Qian:
The optimal attack-defense scheme for secret sharing. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 363-367
[c9]Lingyun Zhang, Yuling Chen, Xiaobin Qian:
Data Confirmation Scheme based on Auditable CP-ABE. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 439-443- 2021
[j20]Xinying Yu
, Zhaojie Wang
, Yilei Wang
, Fengyin Li
, Tao Li
, Yuling Chen
, Youliang Tian
, Xiaomei Yu
:
ImpSuic: A quality updating rule in mixing coins with maximum utilities. Int. J. Intell. Syst. 36(3): 1182-1198 (2021)
[j19]Tao Li
, Zhaojie Wang
, Guoyu Yang
, Yang Cui
, Yuling Chen
, Xiaomei Yu
:
Semi-selfish mining based on hidden Markov decision process. Int. J. Intell. Syst. 36(7): 3596-3612 (2021)
[j18]Juan Ma
, Yuling Chen
, Ziping Wang, Guoxu Liu, Hongliang Zhu:
A rational delegating computation protocol based on reputation and smart contract. J. Cloud Comput. 10(1): 51 (2021)
[j17]Xiaogang Xing, Yuling Chen
, Tao Li, Yang Xin, Hongwei Sun:
A blockchain index structure based on subchain query. J. Cloud Comput. 10(1): 52 (2021)
[j16]Mingzhen Li
, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen
, Yixian Yang, Guangcan Yang:
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. Secur. Commun. Networks 2021: 5556155:1-5556155:22 (2021)
[j15]Tao Li
, Yuling Chen
, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu
, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". Secur. Commun. Networks 2021: 9856969:1-9856969:2 (2021)
[j14]Yuling Chen
, Sen Dong
, Tao Li, Yilei Wang, Huiyu Zhou
:
Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE. IEEE Trans. Inf. Forensics Secur. 16: 5239-5249 (2021)
[c8]Ping Guo
, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A location data protection protocol based on differential privacy. DASC/PiCom/CBDCom/CyberSciTech 2021: 306-311
[c7]Yun Luo
, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang:
Using information entropy to analyze secure multi-party computation protocol. DASC/PiCom/CBDCom/CyberSciTech 2021: 312-318
[c6]Jianwen Hu
, Yuling Chen, Xiaoiun Ren, Yixian Yang, Xiaobin Qian:
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things. DASC/PiCom/CBDCom/CyberSciTech 2021: 319-325
[c5]Manxiang Yang
, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A De-swinging Scheme in Location Privacy Protection via Smart Contract. DASC/PiCom/CBDCom/CyberSciTech 2021: 326-333
[c4]Jing Sun
, Yuling Chen, Tao Li, Jia Liu, Yixian Yang:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. DASC/PiCom/CBDCom/CyberSciTech 2021: 334-340
[c3]Dongdong Yang
, Baopeng Ye, Yuling Chen, Huiyu Zhou, Xiaobin Qian:
A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance. ISPEC 2021: 283-295
[i1]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. CoRR abs/2109.13774 (2021)- 2020
[j13]Xuefeng Li
, Yang Xin
, Chensu Zhao
, Yixian Yang
, Shoushan Luo
, Yuling Chen
:
Using User Behavior to Measure Privacy on Online Social Networks. IEEE Access 8: 108387-108401 (2020)
[j12]Yangyang Long
, Yuling Chen
, Wei Ren
, Hui Dou, Neal Naixue Xiong
:
DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity. IEEE Access 8: 192587-192596 (2020)
[j11]Yuling Chen
, Hongyan Yin, Yuexin Xiang
, Wei Ren
, Yi Ren
, Neal Naixue Xiong
:
CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts. IEEE Access 8: 220672-220681 (2020)
[j10]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. Secur. Commun. Networks 2020: 8839047:1-8839047:11 (2020)
[c2]Hui Dou, Yuling Chen, Yangyang Long, Yuanchao Tu:
A Low Energy-Consuming Security Data Aggregation Protocol. ML4CS (1) 2020: 547-557
2010 – 2019
- 2019
[j9]Hongliang Zhu
, Ying Yuan
, Yuling Chen, Yaxing Zha
, Wanying Xi, Bin Jia, Yang Xin:
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7: 90036-90044 (2019)
[j8]Guangcan Yang
, Shoushan Luo, Hongliang Zhu
, Yang Xin, Ke Xiao
, Yuling Chen
, Mingzhen Li
, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019)
[j7]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin
, Hongliang Zhu
, Yuling Chen
, Guangcan Yang
, Yixian Yang
:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019)
[j6]Yuling Chen, Jinyi Guo, Changlou Li, Wei Ren
:
FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing. Future Internet 11(11): 225 (2019)
[j5]Lingling Zeng, Wei Ren
, Yuling Chen, Min Lei:
LMDGW: a novel matrix based dynamic graph watermark. J. Ambient Intell. Humaniz. Comput. 10(1): 295-304 (2019)
[j4]Yuling Chen, Xiaohan Hao
, Wei Ren
, Yi Ren
:
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications. Mob. Inf. Syst. 2019: 5627497:1-5627497:10 (2019)
[c1]Shuangshuang Xu, Yang Xin, Hongliang Zhu, Shoushan Luo, Yuling Chen:
A Authentication and Access Authorization Mechanism on the PaaS Platform. SSCI 2019: 893-900- 2018
[j3]Yang Xin, Lingshuang Kong, Zhi Liu
, Yuling Chen, Yan-Miao Li, Hongliang Zhu, Mingcheng Gao, Haixia Hou, Chunhua Wang:
Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 6: 35365-35381 (2018)
[j2]Yang Xin, Yankun Cao, Zhi Liu
, Yuling Chen, Lizhen Cui, Yaowen Zhu, Haixia Hou, Guangzhe Zhao
, Mingyu Wang:
Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform. IEEE Access 6: 43885-43891 (2018)
[j1]Yuling Chen, Min Lei, Wei Ren
, Yi Ren, Zhiguo Qu:
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring. Fundam. Informaticae 157(1-2): 167-184 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-30 00:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







