Seguir
Lei Chen
Título
Citado por
Citado por
Año
Contour stella image and deep learning for signal recognition in the physical layer
Y Lin, Y Tu, Z Dou, L Chen, S Mao
IEEE transactions on Cognitive Communications and Networking 7 (1), 34-46, 2020
2952020
A personalized privacy protection framework for mobile crowdsensing in IIoT
J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao
IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019
2352019
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT
J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu
IEEE Internet of Things Journal 6 (2), 1530-1540, 2019
2172019
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT
J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian
IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019
1212019
Next Generation Firewall for Network Security: A Survey
K Neupane, R Haddad, L Chen
SoutheastCon 2018, 1-6, 2018
1142018
A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing
J Xiong, X Chen, Q Yang, L Chen, Z Yao
IEEE Transactions on Network Science and Engineering 7 (4), 2347-2360, 2019
902019
HMGB1-induced p62 overexpression promotes snail-mediated epithelial-mesenchymal transition in glioblastoma cells via the degradation of GSK-3β
H Li, J Li, G Zhang, Q Da, L Chen, S Yu, Q Zhou, Z Weng, Z Xin, L Shi, ...
Theranostics 9 (7), 1909, 2019
782019
A data authentication scheme for UAV ad hoc network communication
J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da, L Chen
The Journal of Supercomputing 76, 4041-4056, 2020
712020
Gene selection and classification for cancer microarray data based on machine learning and similarity measures
Q Liu, AH Sung, Z Chen, J Liu, L Chen, M Qiao, Z Wang, X Huang, ...
BMC genomics 12, 1-12, 2011
672011
A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM
Y Yan, L Qi, J Wang, Y Lin, L Chen
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
622020
Time-Related Network Intrusion Detection Model: A Deep Learning Method
Y Lin, J Wang, Y Tu, L Chen, Z Dou
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
442019
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
442015
Security, Privacy, and Digital Forensics in the Cloud
L Chen, H Takabi, NA Le-Khac
John Wiley & Sons, 2019
422019
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
J Xiong, L Chen, MZA Bhuiyan, C Cao, M Wang, E Luo, X Liu
Future Generation Computer Systems 111, 741-753, 2020
412020
On the security of information dissemination in the Internet-of-Vehicles
DB Rawat, M Garuba, L Chen, Q Yang
Tsinghua Science and Technology 22 (4), 437-445, 2017
392017
ia-PNCC: Noise Processing Method for Underwater Target Recognition Convolutional Neural Network.
N Wang, M He, J Sun, H Wang, L Zhou, C Chu, L Chen
Computers, Materials & Continua 58 (1), 2019
372019
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
362012
Achieving graph clustering privacy preservation based on structure entropy in social IoT
Y Tian, Z Zhang, J Xiong, L Chen, J Ma, C Peng
IEEE Internet of Things Journal 9 (4), 2761-2777, 2021
352021
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
H Zhang, L Chen, Q Liu
2018 International Conference on Computing, Networking and Communications …, 2018
332018
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes
RJ McDown, C Varol, L Carvajal, L Chen
Journal of forensic sciences 61, S110-S116, 2016
332016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20