متابعة
Lei Chen
Lei Chen
بريد إلكتروني تم التحقق منه على georgiasouthern.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Contour stella image and deep learning for signal recognition in the physical layer
Y Lin, Y Tu, Z Dou, L Chen, S Mao
IEEE transactions on Cognitive Communications and Networking 7 (1), 34-46, 2020
2132020
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT
J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu
IEEE Internet of Things Journal 6 (2), 1530-1540, 2019
2132019
A personalized privacy protection framework for mobile crowdsensing in IIoT
J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao
IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019
2072019
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT
J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian
IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019
1122019
Next Generation Firewall for Network Security: A Survey
K Neupane, R Haddad, L Chen
SoutheastCon 2018, 1-6, 2018
892018
A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing
J Xiong, X Chen, Q Yang, L Chen, Z Yao
IEEE Transactions on Network Science and Engineering 7 (4), 2347-2360, 2019
832019
A data authentication scheme for UAV ad hoc network communication
J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da, L Chen
The Journal of Supercomputing 76, 4041-4056, 2020
662020
Gene selection and classification for cancer microarray data based on machine learning and similarity measures
Q Liu, AH Sung, Z Chen, J Liu, L Chen, M Qiao, Z Wang, X Huang, ...
BMC genomics 12, 1-12, 2011
662011
A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM
Y Yan, L Qi, J Wang, Y Lin, L Chen
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
492020
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges
L Chen, L Xu, X Yuan, N Shashidhar
2015 International Conference on Computing, Networking and Communications …, 2015
432015
Time-Related Network Intrusion Detection Model: A Deep Learning Method
Y Lin, J Wang, Y Tu, L Chen, Z Dou
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
392019
Security, Privacy, and Digital Forensics in the Cloud
L Chen, H Takabi, NA Le-Khac
John Wiley & Sons, 2019
382019
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
J Xiong, L Chen, MZA Bhuiyan, C Cao, M Wang, E Luo, X Liu
Future Generation Computer Systems 111, 741-753, 2020
362020
ia-PNCC: Noise Processing Method for Underwater Target Recognition Convolutional Neural Network.
N Wang, M He, J Sun, H Wang, L Zhou, C Chu, L Chen
Computers, Materials & Continua 58 (1), 2019
352019
On the security of information dissemination in the Internet-of-Vehicles
DB Rawat, M Garuba, L Chen, Q Yang
Tsinghua Science and Technology 22 (4), 437-445, 2017
352017
Scalable secure MJPEG video streaming
L Chen, N Shashidhar, Q Liu
2012 26th International Conference on Advanced Information Networking and …, 2012
352012
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes
RJ McDown, C Varol, L Carvajal, L Chen
Journal of forensic sciences 61, S110-S116, 2016
312016
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
H Zhang, L Chen, Q Liu
2018 International Conference on Computing, Networking and Communications …, 2018
302018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services
J Xiong, R Ma, L Chen, Y Tian, L Lin, B Jin
Wireless Communications and Mobile Computing 2018, 2018
302018
Achieving graph clustering privacy preservation based on structure entropy in social IoT
Y Tian, Z Zhang, J Xiong, L Chen, J Ma, C Peng
IEEE Internet of Things Journal 9 (4), 2761-2777, 2021
282021
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20