Остановите войну!
for scientists:
default search action
Lei Chen 0029
- > Home > Persons > Lei Chen 0029
Publications
- 2023
- [j26]S. Karthik, R. Aakash Raj, Meenalosini Vimal Cruz, Lei Chen, J. L. Ajay Vishal, V. S. Rohith:
A Systematic Analysis on Raspberry Pi Prototyping: Uses, Challenges, Benefits, and Drawbacks. IEEE Internet Things J. 10(16): 14397-14417 (2023) - [c25]Seongsoo Kim, Lei Chen, Jongyeop Kim, Yiming Ji, Rami J. Haddad:
A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15. SERA 2023: 218-228 - 2022
- [j25]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Lei Chen, Jianfeng Ma, Changgen Peng:
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT. IEEE Internet Things J. 9(4): 2761-2777 (2022) - 2021
- [j24]Tianpeng Deng, Xuan Li, Biao Jin, Lei Chen, Jie Lin:
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT. Secur. Commun. Networks 2021: 5519558:1-5519558:13 (2021) - [j23]Jianguo Sun, Hanqi Yin, Ye Tian, Junpeng Wu, Linshan Shen, Lei Chen:
Two-Level Multimodal Fusion for Sentiment Analysis in Public Security. Secur. Commun. Networks 2021: 6662337:1-6662337:10 (2021) - [j22]Yun Lin, Ya Tu, Zheng Dou, Lei Chen, Shiwen Mao:
Contour Stella Image and Deep Learning for Signal Recognition in the Physical Layer. IEEE Trans. Cogn. Commun. Netw. 7(1): 34-46 (2021) - [j21]Jinbo Xiong, Mingfeng Zhao, Md. Zakirul Alam Bhuiyan, Lei Chen, Youliang Tian:
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT. IEEE Trans. Ind. Informatics 17(2): 922-933 (2021) - [c24]Seongsoo Kim, Lei Chen, Jongyeop Kim:
Intrusion Prediction using Long Short-Term Memory Deep Learning with UNSW-NB15. BCD 2021: 53-59 - [c23]Seongsoo Kim, Lei Chen, Jongyeop Kim:
Intrusion Prediction using LSTM and GRU with UNSW-NB15. ComComAP 2021: 101-106 - 2020
- [j20]Jinbo Xiong, Lei Chen, Md. Zakirul Alam Bhuiyan, Chunjie Cao, Minshen Wang, Entao Luo, Ximeng Liu:
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener. Comput. Syst. 111: 741-753 (2020) - [j19]Qiao Tian, Jingmei Li, Di Xue, Weifei Wu, Jiaxiang Wang, Lei Chen, Juzhen Wang:
A Hybrid Task Scheduling Algorithm Based on Task Clustering. Mob. Networks Appl. 25(4): 1518-1527 (2020) - [j18]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Qi Li, Ximeng Liu, Zhiqiang Yao:
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT. IEEE Trans. Ind. Informatics 16(6): 4231-4241 (2020) - [j17]Jianguo Sun, Wenshan Wang, Liang Kou, Yun Lin, Liguo Zhang, Qingan Da, Lei Chen:
A data authentication scheme for UAV ad hoc network communication. J. Supercomput. 76(6): 4041-4056 (2020) - [j16]Jinbo Xiong, Xiuhua Chen, Qing Yang, Lei Chen, Zhiqiang Yao:
A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing. IEEE Trans. Netw. Sci. Eng. 7(4): 2347-2360 (2020) - [j15]Renwan Bi, Qianxin Chen, Lei Chen, Jinbo Xiong, Dapeng Wu:
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT. Wirel. Commun. Mob. Comput. 2020: 8891889:1-8891889:13 (2020) - [c22]Yu Yan, Lin Qi, Jie Wang, Yun Lin, Lei Chen:
A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM. ICC 2020: 1-6 - [c21]Minghuan Ma, Zhigang Li, Yun Lin, Lei Chen, Sen Wang:
Modulation Classification Method based on Deep Learning under Non-Gaussian Noise. VTC Spring 2020: 1-5 - 2019
- [j14]Lei Chen, Guofei Gu, Wenjia Li, Rami J. Haddad:
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud". Digit. Commun. Networks 5(4): 203-204 (2019) - [j13]Jinbo Xiong, Jun Ren, Lei Chen, Zhiqiang Yao, Mingwei Lin, Dapeng Wu, Ben Niu:
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT. IEEE Internet Things J. 6(2): 1530-1540 (2019) - [j12]Yun Lin, Sen Wang, Qidi Wu, Lei Chen:
Key Technologies and Solutions of Remote Distributed Virtual Laboratory for E-Learning and E-Education. Mob. Networks Appl. 24(1): 18-24 (2019) - [c20]Burak Ilikci, Lei Chen, Hyuk Cho, Qingzhong Liu:
Heat-Map Based Emotion and Face Recognition from Thermal Images. ComComAP 2019: 449-453 - [c19]Yun Lin, Jie Wang, Ya Tu, Lei Chen, Zheng Dou:
Time-Related Network Intrusion Detection Model: A Deep Learning Method. GLOBECOM 2019: 1-6 - [c18]Min Kyung An, Hyuk Cho, Bing Zhou, Lei Chen:
Minimum Latency Aggregation Scheduling in Internet of Things. ICNC 2019: 395-401 - [c17]Rong Ma, Lei Chen, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing. ICII 2019: 227-232 - 2018
- [j11]Biao Jin, Dongshuo Jiang, Jinbo Xiong, Lei Chen, Qi Li:
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption. IEEE Access 6: 51140-51150 (2018) - [j9]Jinbo Xiong, Xiuhua Chen, Youliang Tian, Rong Ma, Lei Chen, Zhiqiang Yao:
MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing. IEEE Access 6: 65384-65396 (2018) - [j8]Dapeng Wu, Honggang Wang, Lei Chen, Dalei Wu:
Editorial: Multimedia Transmission and Process in Heterogeneous Network. Mob. Networks Appl. 23(3): 597-598 (2018) - [j7]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Li Lin, Biao Jin:
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. Wirel. Commun. Mob. Comput. 2018: 8959635:1-8959635:12 (2018) - [c16]Mehtab Iqbal, Lei Chen, Hengfeng Fu, Yun Lin:
Seam Carve Detection Using Convolutional Neural Networks. ADHIP 2018: 392-407 - [c15]Brycent Chatfield, Rami J. Haddad, Lei Chen:
Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart Grids. ICNC 2018: 367-371 - [c14]Hao Zhang, Lei Chen, Qingzhong Liu:
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones. ICNC 2018: 647-651 - [c13]Min Kyung An, Hyuk Cho, Lei Chen:
Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks. ICNC 2018: 899-904 - [e1]Guojun Wang, Qi Han, Md. Zakirul Alam Bhuiyan, Xiaoxing Ma, Frédéric Loulergue, Peng Li, Manuel Roveri, Lei Chen:
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018. IEEE 2018, ISBN 978-1-5386-9380-3 [contents] - 2017
- [j6]Lei Chen, Wenjia Li, Rami J. Haddad:
Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics. Inf. 8(3): 99 (2017) - [j5]Weitian Tong, Lei Chen, Scott Buglass, Weinan Gao, Jeffrey Li:
An Advanced Private Social Activity Invitation Framework with Friendship Protection. Wirel. Commun. Mob. Comput. 2017 (2017) - [c11]Isaac J. Cushman, Md. Baitul Al Sadi, Lei Chen, Rami J. Haddad:
A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing. MobileCloud 2017: 205-210 - 2016
- [c10]Lei Chen, Narasimha K. Shashidhar, Danda B. Rawat, Ming Yang, Christopher Kadlec:
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console. ICNC 2016: 1-5 - [c9]Isaac Cushman, Ashraf Younis, Danda B. Rawat, Lei Chen:
Adaptive threshold-based RF spectrum scanning through joint energy and bandwidth detection with USRPs in cognitive sensor networks for ROAR architecture. ICNC 2016: 1-5 - [c8]Isaac Cushman, Lei Chen, Danda B. Rawat, Nhien-An Le-Khac:
Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy. MobiMedia 2016: 184-189 - [c7]Isaac Cushman, Danda B. Rawat, Lei Chen, Qing Yang:
Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery. WASA 2016: 571-579 - 2015
- [j4]Qingzhong Liu, Andrew H. Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang:
A Method to Detect AAC Audio Forgery. EAI Endorsed Trans. Security Safety 2(6): e1 (2015) - [c6]Lei Chen, Lanchuan Xu, Xiaohui Yuan, Narasimha K. Shashidhar:
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges. ICNC 2015: 1132-1136 - [p1]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Lei Chen:
Exposing Image Tampering with the Same Quantization Matrix. Multimedia Data Mining and Analytics 2015: 327-343 - 2014
- [c5]Ming Yang, Lei Chen, Weiqiang Xiong:
Compression/transmission power allocation in multimedia Wireless Sensor Networks. ICNC 2014: 1103-1107 - 2013
- [j3]Qingzhong Liu, Peter A. Cooper, Lei Chen, Hyuk Cho, Zhongxue Chen, Mengyu Qiao, Yuting Su, Mingzhen Wei, Andrew H. Sung:
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation. Appl. Intell. 39(4): 705-726 (2013) - 2012
- [c4]Lei Chen, Narasimha K. Shashidhar, Qingzhong Liu:
Scalable Secure MJPEG Video Streaming. AINA Workshops 2012: 111-115 - [c3]Qingzhong Liu, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, Andrew H. Sung:
Identification of Smartphone-Image Source and Manipulation. IEA/AIE 2012: 262-271 - [c2]Hyuk Cho, Deepthi Mandava, Qingzhong Liu, Lei Chen, Sangoh Jeong, Doreen Cheng:
Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and Extensions. IEA/AIE 2012: 272-282 - 2009
- [j2]Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang:
Security and Privacy Issues in Secure E-Mail Standards and Services. Int. J. Inf. Secur. Priv. 3(3): 1-13 (2009) - [j1]Ming Yang, Monica A. Trifas, Guillermo A. Francia III, Lei Chen:
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy. Int. J. Inf. Secur. Priv. 3(3): 37-54 (2009) - [c1]Ziwei Ren, Wenfan Li, Shaoen Wu, Qing Yang, Lei Chen:
Location security in geographic ad hoc routing for VANETs. ICUMT 2009: 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint