default search action
Yitao Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Berk Akgun, Deepak Singh Mahendar Singh, Samatha Kotla, Vikas Jain, Sakshi Namdeo, Rupesh Acharya, Muruganandam Jayabalan, Abhishek Kumar, Vinay Chande, Arumugam Kannan, Jalaj Swami, Yitao Chen, John Boyd, Xiaoxia Zhang:
Interference-Aware Intelligent Scheduling for Virtualized Private 5G Networks. IEEE Access 12: 7987-8003 (2024) - [j15]Yitao Chen, Yalin Wang, Qingkai Sui, Xiaofeng Yuan, Kai Wang, Chenliang Liu:
Residual-aware deep attention graph convolutional network via unveiling data latent interactions for product quality prediction in industrial processes. Expert Syst. Appl. 245: 123078 (2024) - [j14]Quanrun Li, Debiao He, Yitao Chen, Jiaming Wen, Zhichao Yang:
An efficient quantum-resistant undeniable signature protocol for the E-voting system. J. Inf. Secur. Appl. 81: 103714 (2024) - [j13]Jiabin Bao, Min Luo, Yitao Chen, Cong Peng, Zijian Bao:
A Certificateless Anonymous Authentication Scheme for VANETs Based on Ring Signature. J. Circuits Syst. Comput. 33(3) (2024) - 2023
- [j12]Chongyu Jin, Donghua Pan, Yitao Chen, Shengxin Lin, Yiding Wang, Liyi Li:
Research on the Design Method of Gradient Magnetic Field Coil Based on the Magnetic Shielding Room. IEEE Trans. Instrum. Meas. 72: 1-8 (2023) - [c21]Yitao Chen, Dawei Chen, Haoxin Wang, Kyungtae Han, Ming Zhao:
Confidence-Based Federated Distillation for Vision-Based Lane-Centering. ICASSP Workshops 2023: 1-5 - [c20]Kaiqi Zhao, Yitao Chen, Ming Zhao:
A Contrastive Knowledge Transfer Framework for Model Compression and Transfer Learning. ICASSP 2023: 1-5 - [c19]Tianci Zhou, Yong Zeng, Yitao Chen, Zhihong Liu, Jianfeng Ma:
Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model. ICC 2023: 3768-3773 - [c18]Yi Deng, Yitao Chen, Yuan Liu:
Case Study of Immersive Digital Learning in Public Space for Common Good Education. ICDEL 2023: 72-77 - [c17]Yitao Chen, Ruoyi Du, Kongming Liang, Zhanyu Ma:
Self-Enhanced Training Framework for Referring Expression Grounding. ICIP 2023: 3060-3064 - [c16]Yitao Chen, Ming Zhao, Dawei Chen, Kyungtae Han, John Kenney:
Poster: Efficient Video Instance Segmentation with Early Exit at the Edge. SEC 2023: 270-272 - [c15]Alexander Y. C. Huang, Yitao Chen, Dijiang Huang, Ming Zhao:
Semantic Privacy-Preserving for Video Surveillance Services on the Edge. SEC 2023: 300-305 - [i12]Kaiqi Zhao, Yitao Chen, Ming Zhao:
A Contrastive Knowledge Transfer Framework for Model Compression and Transfer Learning. CoRR abs/2303.07599 (2023) - [i11]Yitao Chen, Dawei Chen, Haoxin Wang, Kyungtae Han, Ming Zhao:
Confidence-based federated distillation for vision-based lane-centering. CoRR abs/2306.03222 (2023) - [i10]Yitao Chen, Krishna Gundu, Zohair Zaidi, Ming Zhao:
LiDAR-based Outdoor Crowd Management for Smart Campus on the Edge. CoRR abs/2311.18077 (2023) - 2022
- [j11]Wenjing Tang, Yitao Chen:
Variance and Semi-Variances of Regular Interval Type-2 Fuzzy Variables. Symmetry 14(2): 278 (2022) - [j10]Jun Huang, Debiao He, Yitao Chen, Muhammad Khurram Khan, Min Luo:
A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy. IEEE Trans. Netw. Sci. Eng. 9(5): 3808-3820 (2022) - [c14]Yitao Chen, Shibo Nie, Mandan Guan, Jie Wang, Ruoyi Du, Dongliang Chang, Kongming Liang, Zhanyu Ma:
Multi-modal Human-machine Conversation System for Real Physical World. MMSP 2022: 1 - [i9]Kaiqi Zhao, Yitao Chen, Ming Zhao:
Enabling Deep Learning on Edge Devices through Filter Pruning and Knowledge Transfer. CoRR abs/2201.10947 (2022) - 2021
- [j9]Yong Lü, Han Lin, Pingping Wu, Yitao Chen:
Feature compensation based on independent noise estimation for robust speech recognition. EURASIP J. Audio Speech Music. Process. 2021(1): 22 (2021) - [j8]Yitao Chen, Haijian Wang, Lei Wang, Jianyi Ding:
Consumer Identity and Loyalty in Electronic Product Offline Brand Operation: The Moderator Effect of Fanship. Inf. 12(7): 282 (2021) - [j7]Haijian Wang, Jianyi Ding, Umair Akram, Xialei Yue, Yitao Chen:
An Empirical Study on the Impact of E-Commerce Live Features on Consumers' Purchase Intention: From the Perspective of Flow Experience and Social Presence. Inf. 12(8): 324 (2021) - [j6]Yitao Chen, Linhua Wan:
Towards Designing Personal Health Information Management System Based on Java. Mob. Inf. Syst. 2021: 6269031:1-6269031:10 (2021) - [c13]Eugene N. Kuznetsov, Yitao Chen, Ming Zhao:
SecureFL: Privacy Preserving Federated Learning with SGX and TrustZone. SEC 2021: 55-67 - [c12]Jianguo Sun, Yuqing Qiao, Zechao Liu, Yitao Chen, Yang Yang:
Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE. ISPA/BDCloud/SocialCom/SustainCom 2021: 1435-1443 - [i8]Yitao Chen, Deepanshu Vasal:
Convergence of Generalized Belief Propagation Algorithm on Graphs with Motifs. CoRR abs/2112.06087 (2021) - 2020
- [c11]Yitao Chen, Rajesh K. Mishra, Dan Schwartz, Sriram Vishwanath:
MIMO Full Duplex Radios with Deep Learning. ICC Workshops 2020: 1-6 - [c10]Rajesh K. Mishra, Yitao Chen, Ian P. Roberts:
Collision Detection in Dense Wi-Fi Networks using Self-Interference Cancellation. ICC Workshops 2020: 1-6 - [i7]Yitao Chen, Deepanshu Vasal:
Multi-Agent Decentralized Belief Propagation on Graphs. CoRR abs/2011.04501 (2020)
2010 – 2019
- 2019
- [j5]Mingping Qi, Jianhua Chen, Yitao Chen:
A secure authentication with key agreement scheme using ECC for satellite communication systems. Int. J. Satell. Commun. Netw. 37(3): 234-244 (2019) - [c9]Yitao Chen, Saman Biookaghazadeh, Ming Zhao:
Exploring the capabilities of mobile devices in supporting deep learning. SEC 2019: 127-138 - [c8]Yitao Chen, Kaiqi Zhao, Baoxin Li, Ming Zhao:
Exploring the Use of Synthetic Gradients for Distributed Deep Learning across Cloud and Edge Resources. HotEdge 2019 - [c7]Saman Biookaghazadeh, Yitao Chen, Kaiqi Zhao, Ming Zhao:
KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks. OpML 2019: 47-49 - 2018
- [j4]Mingping Qi, Jianhua Chen, Yitao Chen:
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Comput. Methods Programs Biomed. 164: 101-109 (2018) - [c6]Yitao Chen, Saman Biookaghazadeh, Ming Zhao:
Exploring the Capabilities of Mobile Devices Supporting Deep Learning. HPDC (Posters/Doctoral Consortium) 2018: 17-18 - [i6]Yitao Chen, Muryong Kim, Sriram Vishwanath:
On the Key Generation Rate of Physically Unclonable Functions. CoRR abs/1801.07733 (2018) - [i5]Yitao Chen, Karthikeyan Shanmugam, Alexandros G. Dimakis:
From Centralized to Decentralized Coded Caching. CoRR abs/1801.07734 (2018) - 2017
- [c5]Muryong Kim, Yitao Chen, Sriram Vishwanath:
Approximate capacity of a class of partially connected interference channels. ISIT 2017: 654-658 - [c4]Soumya Basu, Ger Yang, Thanasis Lianeas, Evdokia Nikolova, Yitao Chen:
Reconciling Selfish Routing with Social Good. SAGT 2017: 147-159 - [i4]Muryong Kim, Yitao Chen, Sriram Vishwanath:
Approximate Capacity of a Class of Partially Connected Interference Channels. CoRR abs/1701.07576 (2017) - [i3]Soumya Basu, Ger Yang, Thanasis Lianeas, Evdokia Nikolova, Yitao Chen:
Reconciling Selfish Routing with Social Good. CoRR abs/1707.00208 (2017) - 2016
- [c3]Muryong Kim, Yitao Chen, Michael Borokhovich, Sriram Vishwanath:
Index-Coded Retransmission for OFDMA Downlink. GLOBECOM 2016: 1-6 - 2014
- [c2]Yitao Chen, Jinbei Zhang, Xinbing Wang, Xiaohua Tian, Weijie Wu, Fan Wu, Chee Wei Tan:
Secrecy capacity scaling of large-scale cognitive networks. MobiHoc 2014: 125-134 - 2013
- [j3]Debiao He, Yitao Chen, Jianhua Chen:
An efficient certificateless proxy signature scheme without pairing. Math. Comput. Model. 57(9-10): 2510-2518 (2013) - 2012
- [j2]Debiao He, Jianhua Chen, Yitao Chen:
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Networks 5(12): 1423-1429 (2012) - 2011
- [j1]Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang, Weiwei Han:
A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11-12): 3143-3152 (2011) - [i2]Debiao He, Yitao Chen:
An efficient certificateless authenticated key agreement protocol without bilinear pairings. CoRR abs/1106.3898 (2011) - [i1]Yitao Chen:
Comments of an efficient and secure multi-server authentication scheme with key agreement. IACR Cryptol. ePrint Arch. 2011: 702 (2011)
2000 – 2009
- 2003
- [c1]Jiang Guo, Zhaohui Li, Yitao Chen:
Visualization of a hydro-electric generating unit and its applications. SMC 2003: 2354-2359
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint