


default search action
Long Chen 0022
Person information
- affiliation: Chongqing University of Posts and Telecommunications, Institute of Computer Forensics, Chongqing, China
Other persons with the same name
- Long Chen — disambiguation page
- Long Chen 0001
— University of Macau, Department of Computer and Information Science, China (and 1 more) - Long Chen 0002
— University of California at Irvine, Department of Mathematics, CA, USA (and 1 more) - Long Chen 0003
— Jiangsu University, Automotive Engineering Research Institution, Zhenjiang, China - Long Chen 0004
— University of Texas at Austin, TX, USA - Long Chen 0005
— Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Multi-modal Artificial Intelligence, Beijing, China (and 2 more) - Long Chen 0006
— Guangdong University of Technology, School of Computer Science and Technology, Guangzhou, China - Long Chen 0007
— Xi'an University of Posts and Telecommunications, School of communications and information engineering, China (and 1 more) - Long Chen 0008
— University of Glasgow, School of Computing Science, UK (and 1 more) - Long Chen 0009 — Peking University, Institute of Microelectronics, Beijing, China
- Long Chen 0010 — City University of Hong Kong, Department of Electronic Engineering, Hong Kong
- Long Chen 0011
— University of Nebraska-Lincoln, Department of Biological Systems Engineering, NE, USA (and 1 more) - Long Chen 0012
— Dalian University of Technology, School of Control Science and Engineering, China - Long Chen 0013
— Acacia Communications, Holdmdel, NJ, USA - Long Chen 0014
— RWTH Aachen University, Institute of Imaging and Computer Vision, Aachen, Germany - Long Chen 0015
— Bournemouth University, Poole, UK - Long Chen 0016
— Hong Kong University of Science and Technology, Department of Computer Science and Engineering, Hong Kong (and 2 more) - Long Chen 0017
— Tianjin University, College of Precision Instruments and Optoelectronics Engineering, Tianjin, China - Long Chen 0018
— New Jersey Institute of Technology, Newark, NJ, USA (and 2 more) - Long Chen 0019
— University of Leicester, UK (and 1 more) - Long Chen 0020 — University of Delaware, Department of Electrical and Computer Engineering, Newark, DE, USA (and 1 more)
- Long Chen 0021
— Southeast University, School of Computer Science and Engineering, Nanjing, China - Long Chen 0023 — University of Paris-Sud, Orsay, France
- Long Chen 0024
— Tsinghua University, Computer Science and Technology Department, Beijing, China - Long Chen 0025
— Simon Fraser University, School of Computing Science, Burnaby, BC, Canada (and 1 more) - Long Chen 0026
— Huazhong University of Science and Technology, School of Artificial Intelligence and Automation, Wuhan, China - Long Chen 0027 — Amazon Alexa AI, Sunnyvale, CA, USA
- Long Chen 0028
— Hangzhou Dianzi University, School of Electronics and Information, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j14]Jinyuan Ni
, Long Chen
, Ning Yu:
Multi-granularity spectral graph coarsening. Inf. Sci. 726: 122748 (2026)- 2025
[j13]Jiacheng Huang, Long Chen, Xiaoyin Yi, Ning Yu:
Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense. Complex Intell. Syst. 11(1) (2025)
[j12]Ning Yu
, Long Chen, Xiaoyin Yi:
Enhancing explainability via distinguishable feature learning based on causality in image classification. Displays 87: 102933 (2025)
[j11]Ning Yu
, Long Chen
, Xiaoyin Yi, Jiacheng Huang
:
Attention learning with counterfactual intervention based on feature fusion for fine-grained feature learning. Digit. Signal Process. 163: 105215 (2025)
[j10]Xiangjian Zuo
, Qinyu Deng, Yousheng Zhou
, Long Chen
, Hua Zhong
, Haipeng Peng
, Lixiang Li
:
A Lightweight Privacy-Preserving Scheme for Verifiable Multidimensional Data Aggregation in Vehicular Crowdsensing Networks. IEEE Internet Things J. 12(23): 49402-49416 (2025)- 2024
[j9]Ning Yu
, Long Chen, Tao Leng, Zigang Chen
, Xiaoyin Yi:
An explainable deepfake of speech detection method with spectrograms and waveforms. J. Inf. Secur. Appl. 81: 103720 (2024)
[j8]Zigang Chen, Chaochao Fan, Tao Leng, Long Chen, Yuhong Liu, Xiaoyong Li, Dongfeng Yuan:
Tripartite evolutionary game in the process of network attack and defense. Telecommun. Syst. 86(2): 351-361 (2024)- 2023
[j7]Zigang Chen
, Zhiquan Cheng, Wenjun Luo, Jin Ao, Yuhong Liu, Kai Sheng, Long Chen:
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices. Internet Things 21: 100685 (2023)
[j6]Zigang Chen
, Renjie Dai, Zhenghao Liu, Long Chen, Yuhong Liu, Kai Sheng:
An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant. Neural Process. Lett. 55(4): 4623-4639 (2023)- 2022
[j5]Tao Wu, Nan Yang, Long Chen, Xiaokui Xiao, Xingping Xian, Jun Liu
, Shaojie Qiao, Canyixing Cui
:
ERGCN: Data enhancement-based robust graph convolutional network against adversarial attacks. Inf. Sci. 617: 234-253 (2022)
[j4]Zigang Chen
, Jin Ao, Wenjun Luo, Zhiquan Cheng, Yuhong Liu, Kai Sheng, Long Chen:
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection. J. Inf. Secur. Appl. 68: 103247 (2022)- 2020
[j3]Jimin Yu, Long Chen, Shangbo Zhou
, Limin Wang, Hantao Li, Saiao Huang:
Adaptive image denoising for speckle noise images based on fuzzy logic. Int. J. Imaging Syst. Technol. 30(4): 1132-1142 (2020)
[j2]Changjiang Jiang, Hantao Li, Shangbo Zhou, Zihan Zhang, Jim Yu, Long Chen, Xianzhong Xie:
Image interpolation model based on packet losing network. Multim. Tools Appl. 79(35-36): 25785-25800 (2020)
2010 – 2019
- 2019
[c12]Jianjiang Jin, Long Chen:
Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment. ICBDC 2019: 77-82
[c11]Long Chen, Yi Zhong, Weidong Ai, Difang Zhang:
Continuous Authentication Based on User Interaction Behavior. ISDFS 2019: 1-6- 2018
[j1]Hongtao Liu, Linghu Fen, Jie Jian, Long Chen:
Overlapping Community Discovery Algorithm Based on Hierarchical Agglomerative Clustering. Int. J. Pattern Recognit. Artif. Intell. 32(3): 1850008:1-1850008:14 (2018)
[c10]Jie Xiang, Long Chen:
A Method of Docker Container Forensics Based on API. ICCSP 2018: 159-164
[c9]Hongtao Liu, Lulu Guo, Long Chen, Xueyan Liu, Zhenjia Zhu:
Effective Similarity Measures of Collaborative Filtering Recommendations Based on User Ratings Habits. SKG 2018: 136-143- 2017
[c8]Zhiqiang Jian, Long Chen:
A Defense Method against Docker Escape Attack. ICCSP 2017: 142-146- 2016
[c7]Long Chen, Yue Mao:
Forensic Analysis of Email on Android Volatile Memory. Trustcom/BigDataSE/ISPA 2016: 945-951- 2012
[c6]Long Chen, Banglan Liu, Wei Song:
An Efficient Data Integrity Verification Method Supporting Multi-granular Operation with Commutative Hash. RSCTC 2012: 132-141- 2011
[c5]Jun-bin Fang
, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7- 2010
[c4]Hao Yuan, Yong Wang, Long Chen:
An Availability-Aware Task Scheduling for Heterogeneous Systems Using Quantum-behaved Particle Swarm Optimization. ICSI (1) 2010: 120-127
2000 – 2009
- 2008
[c3]Long Chen, Guoyin Wang
:
An Efficient Piecewise Hashing Method for Computer Forensics. WKDD 2008: 635-638- 2007
[c2]Ting Wang, Yu Wu, Long Chen:
An Approach to Video Key-frame Extraction Based on Rough Set. MUE 2007: 590-596- 2004
[c1]Guoyin Wang, Long Chen, Yu Wu:
Rough Set Based Solutions for Network Security. MSRAS 2004: 455-465
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-22 01:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







