
Yongle Chen
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j15]Dan Yu
, Lilong Zhang, Yongle Chen
, Yao Ma, Junjie Chen:
Large-Scale IoT Devices Firmware Identification Based on Weak Password. IEEE Access 8: 7981-7992 (2020) - [j14]Yongle Chen
, Xiaowei Lian, Dan Yu
, Shichao Lv
, Shaochen Hao, Yao Ma:
Exploring Shodan From the Perspective of Industrial Control Systems. IEEE Access 8: 75359-75369 (2020) - [j13]Yuli Yang
, Nanyue Yu, Yongle Chen
:
Trusted Cloud Service Selection Algorithm Based on Lightweight Intuitionistic Fuzzy Numbers. IEEE Access 8: 97748-97756 (2020) - [j12]Dan Yu
, Haoguang Xin, Yongle Chen
, Yao Ma, Junjie Chen:
Cross-Layer Protocol Fingerprint for Large-Scale Fine-Grain Devices Identification. IEEE Access 8: 176294-176303 (2020) - [j11]Yongle Chen, Xiaojian Wang, Yuli Yang, Hong Li:
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract. Sensors 20(4): 1062 (2020) - [j10]Dan Yu, Peiyang Li, Yongle Chen, Yao Ma, Junjie Chen:
A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification. Sensors 20(7): 1863 (2020) - [c6]Zhibo Wang, Wenxin Liu, Xiaoyi Pang, Ju Ren, Zhe Liu, Yongle Chen:
Towards Pattern-aware Privacy-preserving Real-time Data Collection. INFOCOM 2020: 109-118
2010 – 2019
- 2019
- [j9]Yongle Chen
, Qinghua Yao, Dan Yu, Yuli Yang:
WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan. IEEE Access 7: 79118-79126 (2019) - 2018
- [j8]Yuli Yang, Rui Liu, Yongle Chen, Tong Li
, Yi Tang
:
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection. IEEE Access 6: 37644-37652 (2018) - [j7]Yongle Chen, Xiaojian Wang, Dan Yu, Yuli Yang, Jian Chen:
Localizing Access Point Through Simple Gesture. IEEE Access 6: 38870-38880 (2018) - [j6]Jiali Li, Yongle Chen, Zhi Li, Limin Sun:
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph). 计算机科学 45(9): 171-176 (2018) - [c5]Yongle Chen, Bingchu Jin, Dan Yu, Junjie Chen:
Malware Variants Detection Using Behavior Destructive Features. PAC 2018: 121-122 - 2017
- [c4]Yongle Chen, Hui Li, Kejiao Li, Jiyang Zhang:
An improved P2P file system scheme based on IPFS and Blockchain. BigData 2017: 2652-2657 - [c3]Kejiao Li, Hui Li, Hanxu Hou, Kedan Li, Yongle Chen:
Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain. HPCC/SmartCity/DSS 2017: 466-473 - [c2]Zhihao Wang, Yongle Chen, Hui Wen, Lian Zhao, Limin Sun:
Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. VTC-Fall 2017: 1-5 - 2015
- [j5]Yongle Chen
, Wei Liu, Yongping Xiong, Jing Duan, Zhi Li, Hongsong Zhu:
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning. Int. J. Distributed Sens. Networks 11: 753191:1-753191:10 (2015) - 2014
- [j4]Wei Liu, Hong Li, Yongle Chen, Hongsong Zhu, Limin Sun:
LARES: latency-reduced neighbour discovery for contagious diseases prevention. Int. J. Ad Hoc Ubiquitous Comput. 16(1): 3-13 (2014) - [j3]Wei Liu, Yongle Chen, Yongping Xiong, Limin Sun, Hongsong Zhu:
Optimization of Sampling Cell Size for Fingerprint Positioning. Int. J. Distributed Sens. Networks 10 (2014) - [j2]Wei Liu
, Qiang Li
, Yongle Chen
, Yongping Xiong, Yubo Deng, Limin Sun:
Adaptive Heterogeneous Network Handoff of Smartphone Based on the Closed Control Loop. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j1]Yongle Chen, Ci Chen, Hongsong Zhu, Limin Sun:
Efficient Deterministic Anchor Deployment for Sensor Network Positioning. Int. J. Distributed Sens. Networks 9 (2013) - 2011
- [c1]Yongle Chen, Limin Sun, Feng Wang, Xinyun Zhou:
Congestion-Aware Indoor Emergency Navigation Algorithm for Wireless Sensor Networks. GLOBECOM 2011: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-10-21 23:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint