


default search action
Yuling Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yuling Chen 0001
— Technical Center of Beijing Customs, Beijing, China - Yuling Chen 0002
— Guizhou University, Guizhou, China - Yuling Chen 0003
— Tsinghua University, Beijing, China - Yuling Chen 0004
— Mianyang, China Mianyang Teachers' College, Mianyang, China - Yuling Chen 0005
— Peking University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j23]Xiaoyong Li, Jing Yang, Yuling Chen, Wei Zhang
, Xiaoli Ruan, Chengjiang Li
, Zhidong Su:
Learning semantic consistency for audio-visual zero-shot learning. Artif. Intell. Rev. 58(7): 212 (2025)
[j22]Jianqi Wei, Yuling Chen, Xiuzhang Yang, Yun Luo, Xintao Pei:
A verifiable scheme for differential privacy based on zero-knowledge proofs. J. King Saud Univ. Comput. Inf. Sci. 37(3) (2025)
[j21]Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Yuling Chen, Zongpeng Li:
Towards attribute-based conjunctive encrypted search over lattice for internet of medical things. Peer Peer Netw. Appl. 18(5): 266 (2025)
[j20]Ziye Wang, Zheng Luo, Qiqi Zhu
, Sisi Peng, Longli Ran, Yanan Zhang, Lizeng Wang
, Yuling Chen, Zhe Hu, Jiancheng Luo:
A Road-Detail Preserving Framework for Urban Road Extraction From VHR Remote Sensing Imagery. IEEE Trans. Geosci. Remote. Sens. 63: 1-13 (2025)
[j19]Qiqi Zhu
, Meilin Zhang
, Yuling Chen, Guizhou Zheng
, Jiancheng Luo:
Spectral Correlation-Based Fusion Network for Hyperspectral Image Super-Resolution. IEEE Trans. Geosci. Remote. Sens. 63: 1-14 (2025)
[c39]Long Chen, Yuling Chen, Yun Luo, Hui Dou, Xinyang Zhong:
Attention-Guided Hierarchical Defense for Multimodal Attacks in Vision-Language Models. CVPR Workshops 2025: 1607-1617
[c38]Haolang Feng, Yuling Chen, Hui Dou, Rou Zhou, Long Chen:
DMD: Boosting Adversarial Transferability via Dynamic Momentum Decay. DSPP (1) 2025: 24-37
[c37]Yafei Liu, Yuling Chen, Bo Li, Yuxiang Yang, Taiyan Chen:
Smart Contract Ponzi Detection via Contract Transaction Graph. DSPP (1) 2025: 123-139
[c36]Rou Zhou, Yuling Chen, Hui Dou, Haolang Feng, Long Chen:
Personalized Federated Learning with Adaptive Weight Clustering. DSPP (1) 2025: 443-458
[c35]Hongjie Luo, Yuling Chen, Hui Dou, Junyu Zhu, Haonan Zhan:
FedVoD: A Robust Federated Learning Defense Strategy Against Hybrid Byzantine Attacks. DSPP (1) 2025: 459-473
[i2]Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Tao Shang, Yuling Chen, Zongpeng Li:
PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems. IACR Cryptol. ePrint Arch. 2025: 63 (2025)- 2024
[j18]Tao Wu, Yaopan Hou, Guanghao Xin, Jingyan Niu, Shanshan Peng, Fanfan Xu, Ying Li, Yuling Chen, Yifangfei Yu, Huixue Zhang, Xiaotong Kong, Yuze Cao, Shangwei Ning
, Lihua Wang, Junwei Hao:
MSGD: a manually curated database of genomic, transcriptomic, proteomic and drug information for multiple sclerosis. Database J. Biol. Databases Curation 2024 (2024)
[j17]Yibo Lai, Weiyan Zheng, Zhiqing Sun, Yan Zhou, Yuling Chen:
Micro-grid source-load storage energy minimization method based on improved competitive depth Q - network algorithm and digital twinning. Energy Inform. 7(1): 126 (2024)
[j16]Chang Shu, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou:
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model. J. Cloud Comput. 13(1): 4 (2024)
[j15]Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang:
Cross-chain asset trading scheme for notaries based on edge cloud storage. J. Cloud Comput. 13(1): 90 (2024)
[j14]Yan Zheng, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Chang Shu, Lang Chen:
Optimization model for vehicular network data queries in edge environments. J. Cloud Comput. 13(1): 145 (2024)
[j13]Pengyu Chen, Yuling Chen, Xuewei Wang
, Linlin Yuan, Chaoyue Tan, Yuxiang Yang:
A high-capacity slicing PBFT protocol based on reputation evaluation model. Wirel. Networks 30(8): 7469-7482 (2024)
[c34]Pengyu Chen, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Bo Li, Jiachen Huang:
Slicing PBFT Consensus Algorithm Based on VRF. Blockchain 2024: 569-574
[c33]Xintao Pei, Yuling Chen, Yun Luo, Zaidong Li, Jianqi Wei:
Lightweight IoT-Oriented Verifiable Computing Scheme in Cloud Computing Circumstance. CyberSciTech 2024: 39-44
[c32]Zaidong Li, Yuling Chen, Yun Luo, Xintao Pei, Yingqi Qin:
Private Comparison Based on Digital Decomposition for IoT Cloud Environments. CyberSciTech 2024: 88-93
[c31]Jianqi Wei, Yuling Chen, Yun Luo, Zaidong Li:
Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy. CyberSciTech 2024: 94-99
[c30]Bo Li, Yuling Chen, Siyuan Huang, Yuxiang Yang:
Cross-Chain Asset Trading Scheme Without Trusted Third-Party. DSPP (1) 2024: 39-51
[c29]Yancheng Sun, Yuling Chen, Ziyang Liu, Hui Dou, Chaoyue Tan:
Targeted Universal Adversarial Attack Based on Fourier Transform. DSPP (1) 2024: 244-259
[c28]Yuling Chen, Ningyu Fan, Hongyang Wu:
AI-Enabled Metaverse for Education: Challenges and Opportunities. METAVERSE 2024: 103-113- 2023
[j12]Zhenxiang He, Xiaoxia Li, Yuling Chen, Nianzu Lv, Yong Cai
:
Attention-based dual-path feature fusion network for automatic skin lesion segmentation. BioData Min. 16(1) (2023)
[j11]Yancheng Sun, Yuling Chen, Peng Wu, Xuewei Wang
, Qi Wang:
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution. Comput. Commun. 205: 14-23 (2023)
[j10]Chaoyue Tan
, Yuling Chen, Xiaojun Ren, Changgen Peng:
A mobile energy trading scheme based on Lightning Network. Concurr. Comput. Pract. Exp. 35(20) (2023)
[j9]Hao Yang, Xuewei Wang
, Yuling Chen, Hui Dou, Yangwen Zhang:
RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation. J. Cloud Comput. 12(1): 169 (2023)
[c27]Yangwen Zhang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Maolin Xiong:
A High Capacity Combined Carrier Steganography Without Embedding Image. DASC/PiCom/CBDCom/CyberSciTech 2023: 95-100
[c26]Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo, Yuling Chen:
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain. DASC/PiCom/CBDCom/CyberSciTech 2023: 389-394
[c25]Zhong Long, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yancheng Sun:
Communication-Efficient Federated Learning with Sparsity and Quantization. DASC/PiCom/CBDCom/CyberSciTech 2023: 415-421
[c24]Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Pengyu Chen:
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism. DASC/PiCom/CBDCom/CyberSciTech 2023: 492-498
[c23]Maolin Xiong, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Adversarial Attack Method Based on Dual- frequency Domain Transformation. DASC/PiCom/CBDCom/CyberSciTech 2023: 543-548
[c22]Hao Yang, Yuling Chen, Hui Dou, Yun Luo, Chaoyue Tan, Yangwen Zhang:
Robust Object Detection Based on a Comparative Learning Perspective. DASC/PiCom/CBDCom/CyberSciTech 2023: 557-563
[c21]Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Yuxiang Yang:
A Blockchain of Blockchains Structure Based on Asset Trading Scheme. DASC/PiCom/CBDCom/CyberSciTech 2023: 582-588- 2022
[c20]Jing Sun, Yuling Chen, Xiao Lv, Xiaobin Qian:
A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 280-286
[c19]Xiaochuan He, Chaoyue Tan, Yongtang Wu, Yuling Chen:
A Security Transaction Model Based on HTLC. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 328-331
[c18]Junhong Tao, Yongtang Wu, Yuling Chen:
A Secure Comparison Protocol in the Malicious Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 332-337
[c17]Kaicheng Yang, Yongtang Wu, Yuling Chen:
A Blockchain-based Scalable Electronic Contract Signing System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 343-348
[c16]Manxiang Yang, Yongtang Wu, Yuling Chen:
A K-anonymity Optimization Algorithm Under Attack Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 357-362
[c15]Juan Ma
, Yuling Chen, Xiao Lv, Xiaobin Qian:
The optimal attack-defense scheme for secret sharing. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 363-367
[c14]Lingyun Zhang, Yuling Chen, Xiaobin Qian:
Data Confirmation Scheme based on Auditable CP-ABE. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2022: 439-443- 2021
[j8]Jianwen Hu
, Yuling Chen, Xiaojun Ren, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things. Mob. Inf. Syst. 2021: 7397926:1-7397926:13 (2021)
[j7]Yuling Chen, Wentao Teng, Zhen Li, Qiqi Zhu, Qingfeng Guan
:
Cross-Domain Scene Classification Based on a Spatial Generalized Neural Architecture Search for High Spatial Resolution Remote Sensing Images. Remote. Sens. 13(17): 3460 (2021)
[j6]Zhan Li
, Jianhang Zhang, Ruibin Zhong, Bir Bhanu, Yuling Chen, Qingfeng Zhang
, Haoqing Tang:
Lightweight and Efficient Image Dehazing Network Guided by Transmission Estimation from Real-World Hazy Scenes. Sensors 21(3): 960 (2021)
[c13]Jianwen Hu
, Yuling Chen, Xiaoiun Ren, Yixian Yang, Xiaobin Qian:
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things. DASC/PiCom/CBDCom/CyberSciTech 2021: 319-325
[c12]Yuling Chen, Lei Li, Fei Zhang, XianLong Ren:
5G Mobile Communication System Based on Cloud Wireless Access Network. IWCMC 2021: 632-636
[c11]Yuling Chen, Lei Li, Ying Liu:
Application of FPGA Array Structure Digital Signal Processing Platform in Communication Field. IWCMC 2021: 637-641
[c10]Zi Li, Xiguo Yang, Yuling Chen, Jiarong Zhang:
Application of Wireless Communication in Intelligent Distribution Network Communication Technology. IWCMC 2021: 1879-1883
[i1]Juan Ma, Yuling Chen:
DE-RSTC: A rational secure two-party computation protocol based on direction entropy. CoRR abs/2110.09160 (2021)- 2020
[j5]Zhujun Jin
, Yu Yang, Yuling Chen, Yuwei Chen:
IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel. Int. J. Distributed Sens. Networks 16(3) (2020)
[c9]Hui Dou, Yuling Chen, Yangyang Long, Yuanchao Tu:
A Low Energy-Consuming Security Data Aggregation Protocol. ML4CS (1) 2020: 547-557
[c8]Xinyu Zhang, YuJun Liu, Yuling Chen, Zhan Wang:
A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy. ML4CS (1) 2020: 566-577
2010 – 2019
- 2019
[j4]Lunzhi Deng
, Yixian Yang, Yuling Chen:
Certificateless Short Aggregate Signature Scheme for Mobile Devices. IEEE Access 7: 87162-87168 (2019)
[j3]Yuling Chen, Wei Kong
, Xinzhao Jiang:
Anti-Synchronization and Robust Authentication for Noisy PUF-Based Smart Card. IEEE Access 7: 142214-142223 (2019)
[c7]Chenyang Li, Yuling Chen, Yu Yang, Chaochao Li, Yang Zeng:
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid. ICAIS (4) 2019: 529-541
[c6]Ning Wang, Yuling Chen, Yu Yang, Zigang Fang, Yizhe Sun:
Blockchain Private Key Storage Algorithm Based on Image Information Hiding. ICAIS (4) 2019: 542-552
[c5]Xi Chen, Jingjie Chen, Yuling Chen, Jinglan Yang, Deyin Li:
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning. ICAIS (4) 2019: 553-565
[c4]Lin Gan, Jingjie Chen, Yuling Chen, Zhujun Jin, Wenxi Han:
JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network. ICAIS (4) 2019: 566-577- 2018
[j2]Lunzhi Deng
, Yixian Yang, Ronghai Gao, Yuling Chen:
Certificateless short signature scheme from pairing in the standard model. Int. J. Commun. Syst. 31(17) (2018)
[c3]Dengzhi Liu, Jian Shen
, Yuling Chen, Chen Wang, Tianqi Zhou, Anxi Wang:
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. Inscrypt 2018: 223-239- 2017
[j1]Lunzhi Deng, Yixian Yang, Yuling Chen:
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. KSII Trans. Internet Inf. Syst. 11(11): 5625-5641 (2017)- 2015
[c2]Yuling Chen, Yinghua Qin, Mark Lambe, Wenjing Chu:
Realizing network function virtualization management and orchestration with model based open architecture. CNSM 2015: 410-418
2000 – 2009
- 2003
[c1]Thomas R. Dean, Yuling Chen:
Design Recovery of a Two Level System. IWPC 2003: 23-32
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-09 00:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







