Contour stella image and deep learning for signal recognition in the physical layer Y Lin, Y Tu, Z Dou, L Chen, S Mao IEEE transactions on Cognitive Communications and Networking 7 (1), 34-46, 2020 | 212 | 2020 |
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu IEEE Internet of Things Journal 6 (2), 1530-1540, 2019 | 212 | 2019 |
A personalized privacy protection framework for mobile crowdsensing in IIoT J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019 | 205 | 2019 |
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019 | 110 | 2019 |
Next Generation Firewall for Network Security: A Survey K Neupane, R Haddad, L Chen SoutheastCon 2018, 1-6, 2018 | 87 | 2018 |
A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing J Xiong, X Chen, Q Yang, L Chen, Z Yao IEEE Transactions on Network Science and Engineering 7 (4), 2347-2360, 2019 | 83 | 2019 |
A data authentication scheme for UAV ad hoc network communication J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da, L Chen The Journal of Supercomputing 76, 4041-4056, 2020 | 66 | 2020 |
Gene selection and classification for cancer microarray data based on machine learning and similarity measures Q Liu, AH Sung, Z Chen, J Liu, L Chen, M Qiao, Z Wang, X Huang, ... BMC genomics 12, 1-12, 2011 | 66 | 2011 |
A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM Y Yan, L Qi, J Wang, Y Lin, L Chen ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 49 | 2020 |
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges L Chen, L Xu, X Yuan, N Shashidhar 2015 International Conference on Computing, Networking and Communications …, 2015 | 43 | 2015 |
Time-Related Network Intrusion Detection Model: A Deep Learning Method Y Lin, J Wang, Y Tu, L Chen, Z Dou 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 39 | 2019 |
Security, Privacy, and Digital Forensics in the Cloud L Chen, H Takabi, NA Le-Khac John Wiley & Sons, 2019 | 37 | 2019 |
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis J Xiong, L Chen, MZA Bhuiyan, C Cao, M Wang, E Luo, X Liu Future Generation Computer Systems 111, 741-753, 2020 | 36 | 2020 |
ia-PNCC: Noise Processing Method for Underwater Target Recognition Convolutional Neural Network. N Wang, M He, J Sun, H Wang, L Zhou, C Chu, L Chen Computers, Materials & Continua 58 (1), 2019 | 35 | 2019 |
On the security of information dissemination in the Internet-of-Vehicles DB Rawat, M Garuba, L Chen, Q Yang Tsinghua Science and Technology 22 (4), 437-445, 2017 | 34 | 2017 |
Scalable secure MJPEG video streaming L Chen, N Shashidhar, Q Liu 2012 26th International Conference on Advanced Information Networking and …, 2012 | 34 | 2012 |
In‐Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes RJ McDown, C Varol, L Carvajal, L Chen Journal of forensic sciences 61, S110-S116, 2016 | 31 | 2016 |
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones H Zhang, L Chen, Q Liu 2018 International Conference on Computing, Networking and Communications …, 2018 | 30 | 2018 |
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services J Xiong, R Ma, L Chen, Y Tian, L Lin, B Jin Wireless Communications and Mobile Computing 2018, 2018 | 29 | 2018 |
Identification of smartphone-image source and manipulation Q Liu, X Li, L Chen, H Cho, PA Cooper, Z Chen, M Qiao, AH Sung Advanced Research in Applied Artificial Intelligence: 25th International …, 2012 | 28 | 2012 |