default search action
Yonghong Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j85]Yuwei Lin, Yonghong Chen, Hui Tian, Xiaolong Zhuang:
Covert timing channel detection based on isolated binary trees. Comput. Secur. 150: 104200 (2025) - 2024
- [j84]Xiaolong Zhuang, Yonghong Chen, Hui Tian:
A generalized detection framework for covert timing channels based on perceptual hashing. Trans. Emerg. Telecommun. Technol. 35(5) (2024) - [j83]Lidan Liang, Jun Cheng, Yonghong Chen, Huaicheng Yan, Dan Zhang:
Adaptive fuzzy filtering for multi-area power systems subject to nonhomogeneous sojourn probabilities. Inf. Sci. 669: 120613 (2024) - [j82]Na Liu, Jun Cheng, Yonghong Chen, Huaicheng Yan, Dan Zhang, Wenhai Qi:
Adaptive protocol-based control for reaction-diffusion memristive neural networks with semi-Markov switching parameters. Inf. Sci. 677: 120947 (2024) - [i8]Hamid Davoudi, Fengyu Wang, Yonghong Chen, Di Shi, Álinson S. Xavier, Feng Qiu:
Market Implications of Alternative Operating Reserve Modeling in Wholesale Electricity Markets. CoRR abs/2409.09220 (2024) - 2023
- [j81]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Hanyu Quan, Yonghong Chen:
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning. Comput. Electr. Eng. 111(Part A): 108909 (2023) - [j80]Yonghong Chen, Lei Xun, Shibing Zhang:
The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process. Future Internet 15(2): 56 (2023) - [j79]Yonghong Chen, Shibing Zhang:
A Helium Speech Unscrambling Algorithm Based on Deep Learning. Inf. 14(3): 189 (2023) - [j78]Ross Baldick, Yonghong Chen, Bing Huang:
Optimization Formulations for Storage Devices with Disjoint Operating Modes. Oper. Res. 71(6): 1978-1996 (2023) - [c31]Zhiqiang Li, Yonghong Chen, Zhan Teng, Xuwen Huang:
ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network. CNIOT 2023: 614-620 - [c30]Xuwen Huang, Yonghong Chen, Zhiqiang Li, Teng Zhan:
Detection of Network Time Covert Channels Based on Image Processing. CNIOT 2023: 701-707 - [i7]Bing Huang, Arezou Ghesmati, Yonghong Chen, Ross Baldick:
A Computational Efficient Pumped Storage Hydro Optimization in the Look-ahead Unit Commitment and Real-time Market Dispatch Under Uncertainty. CoRR abs/2304.03821 (2023) - [i6]Peng Lan, Donglai Chen, Chong Xie, Keshu Chen, Jinyuan He, Juntao Zhang, Yonghong Chen, Yan Xu:
Elastically-Constrained Meta-Learner for Federated Learning. CoRR abs/2306.16703 (2023) - 2022
- [j77]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen:
Towards blind detection of steganography in low-bit-rate speech streams. Int. J. Intell. Syst. 37(12): 12085-12112 (2022) - [j76]Yonghong Chen, Hao Li, Han Li, Wenhao Liu, Yirui Wu, Qian Huang, Shaohua Wan:
An Overview of Knowledge Graph Reasoning: Key Technologies and Applications. J. Sens. Actuator Networks 11(4): 78 (2022) - [c29]Jun Guo, Yonghong Chen, Yihang Hao, Zixin Yin, Yin Yu, Simin Li:
Towards Comprehensive Testing on the Robustness of Cooperative Multi-agent Reinforcement Learning. CVPR Workshops 2022: 114-121 - [i5]Jun Guo, Yonghong Chen, Yihang Hao, Zixin Yin, Yin Yu, Simin Li:
Towards Comprehensive Testing on the Robustness of Cooperative Multi-agent Reinforcement Learning. CoRR abs/2204.07932 (2022) - 2021
- [j75]Yonghong Chen, Zhigang Wang, Zhichao Lyu, Jianbo Li, Yongwen Yang, Yibo Li:
Research on Manipulation Strategy and Flight Test of the Quad Tilt Rotor in Conversion Process. IEEE Access 9: 40286-40307 (2021) - [j74]Xianglong Luo, Wenjuan Gan, Lixin Wang, Yonghong Chen, Enlin Ma:
A Deep Learning Prediction Model for Structural Deformation Based on Temporal Convolutional Networks. Comput. Intell. Neurosci. 2021: 8829639:1-8829639:12 (2021) - [j73]Guobing Yan, Qiang Sun, Jianying Huang, Yonghong Chen:
Helmet Detection Based on Deep Learning and Random Forest on UAV for Power Construction Safety. J. Adv. Comput. Intell. Intell. Informatics 25(1): 40-49 (2021) - [j72]Chonggao Sun, Yonghong Chen, Hui Tian, Shuhong Wu:
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network. IEEE Open J. Comput. Soc. 2: 407-418 (2021) - [j71]Shuhong Wu, Yonghong Chen, Hui Tian, Chonggao Sun:
Detection of Covert Timing Channel Based on Time Series Symbolization. IEEE Open J. Commun. Soc. 2: 2372-2382 (2021) - 2020
- [j70]Shuo Zhang, Shibing Zhang, Yingdong Hu, Xiaoge Zhang, Yonghong Chen:
Symmetric Peaks-Based Spectrum Sensing Algorithm for Detecting Modulated Signals. IEEE Access 8: 79851-79860 (2020) - [j69]Zhichao Lyu, Zhigang Wang, Dengyan Duan, Lili Lin, Jianbo Li, Yongwen Yang, Yonghong Chen, Yibo Li:
Tilting Path Optimization of Tilt Quad Rotor in Conversion Process Based on Ant Colony Optimization Algorithm. IEEE Access 8: 140777-140791 (2020) - [j68]Yonghong Chen, Qingfei Gao, Jun Cheng, Kaibo Shi, Wenhai Qi:
Static Output Feedback Control for Fuzzy Systems With Stochastic Fading Channel and Actuator Faults. IEEE Access 8: 200714-200723 (2020) - [j67]Jinpu Xie, Yonghong Chen, Linfan Wang, Zhe Wang:
A network covert timing channel detection method based on threshold secret sharing. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j66]Tian Wang, Jiandian Zeng, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Data collection from WSNs to the cloud based on mobile Fog elements. Future Gener. Comput. Syst. 105: 864-872 (2020) - [j65]Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
StegoNote: Steganography in Guitar Music Using Note Modulation. Int. J. Netw. Secur. 22(1): 68-79 (2020) - [j64]Yang Chen, Yonghong Chen:
A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis. Int. J. Netw. Secur. 22(2): 242-249 (2020) - [j63]Linfan Wang, Yonghong Chen:
A Perceptual Hash-based Approach to Detect Covert Timing Channels. Int. J. Netw. Secur. 22(4): 686-697 (2020) - [j62]Yonghong Chen, Jie Yang, Xuehong Cao, Shibing Zhang:
Energy Efficiency Analysis and Optimization of Multiantenna Heterogeneous Cellular Networks Modeled by Matérn Hard-core Point Process. KSII Trans. Internet Inf. Syst. 14(8): 3366-3383 (2020) - [c28]Yanyan Ge, Jiajun Chen, Dongmei Li, Shibing Zhang, Lili Guo, Yonghong Chen:
Spectrum Sensing Algorithm Based on Real-time Likelihood Ratio in Cognitive Networks. BlackSeaCom 2020: 1-6 - [c27]Quan Sun, Yonghong Chen, Tian Wang:
A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing. SpaCCS Workshops 2020: 430-443 - [c26]Dongmei Li, Shibing Zhang, Lili Guo, Yonghong Chen:
Helium Speech Correction Algorithm Based on Deep Neural Networks. WCSP 2020: 99-103 - [i4]Caiyi Xu, Jianping Xing, Yafei Ning, Yonghong Chen, Yong Wu:
SDOD: Real-time Segmenting and Detecting 3D Objects by Depth. CoRR abs/2001.09425 (2020) - [i3]Bing Huang, Yonghong Chen, Ross Baldick:
A Configuration Based Pumped Storage Hydro Model in MISO Day-Ahead Market. CoRR abs/2009.04944 (2020)
2010 – 2019
- 2019
- [j61]Yiqiao Cai, Chi Shao, Huizhen Zhang, Shunkai Fu, Hui Tian, Yonghong Chen:
A Neighborhood-Assisted Framework for Differential Evolution. IEEE Access 7: 44338-44358 (2019) - [j60]Hui Tian, Yuxiang Chen, Hong Jiang, Yongfeng Huang, Fulin Nan, Yonghong Chen:
Public Auditing for Trusted Cloud Storage Services. IEEE Secur. Priv. 17(1): 10-22 (2019) - [j59]Fulin Nan, Hui Tian, Tian Wang, Yiqiao Cai, Yonghong Chen:
A collusion-resistant public auditing scheme for shared cloud data. Int. J. Inf. Technol. Manag. 18(2/3): 195-212 (2019) - [j58]Bowen Zhu, Yonghong Chen, Yiqiao Cai:
Three Kinds of Network Security Situation Awareness Model Based on Big Data. Int. J. Netw. Secur. 21(1): 115-121 (2019) - [j57]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang:
A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network. Int. J. Netw. Secur. 21(2): 243-249 (2019) - [j56]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network. Int. J. Netw. Secur. 21(4): 648-660 (2019) - [j55]Pengwen Lin, Yonghong Chen:
Network Security Situation Assessment Based on Text SimHash in Big Data Environment. Int. J. Netw. Secur. 21(4): 699-708 (2019) - [j54]Xianglong Luo, Xue Meng, Wenjuan Gan, Yonghong Chen:
Traffic Data Imputation Algorithm Based on Improved Low-Rank Matrix Decomposition. J. Sensors 2019: 7092713:1-7092713:11 (2019) - [j53]Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Zheng-an Huang, Yiqiao Cai, Yonghong Chen:
Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 23(11): 3779-3792 (2019) - [c25]Jie Yang, Ziyu Pan, Yonghong Chen:
Performance Analysis of Two-Tier Heterogeneous Cellular Networks Based on Poisson Hard-Core Process. ICCT 2019: 589-592 - [i2]Yanan Yu, Yongpei Guan, Yonghong Chen:
An Integral Formulation and Convex Hull Pricing for Unit Commitment. CoRR abs/1906.07862 (2019) - [i1]Yanan Yu, Yongpei Guan, Yonghong Chen:
An Efficient Iterative Algorithm for Convex Hull Pricing Problems on MISO Case Studies. CoRR abs/1910.12994 (2019) - 2018
- [j52]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Yonghong Chen, Yiqiao Cai, Hui Tian, Mande Xie:
Energy-efficient relay tracking with multiple mobile camera sensors. Comput. Networks 133: 130-140 (2018) - [j51]Hui Tian, Jun Sun, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen:
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication. IEEE Commun. Lett. 22(6): 1196-1199 (2018) - [j50]Yiqiao Cai, Jingliang Liao, Tian Wang, Yonghong Chen, Hui Tian:
Social learning differential evolution. Inf. Sci. 433-434: 464-509 (2018) - [j49]Guo Sun, Yiqiao Cai, Tian Wang, Hui Tian, Cheng Wang, Yonghong Chen:
Differential evolution with individual-dependent topology adaptation. Inf. Sci. 450: 1-38 (2018) - [j48]Zhao-Hua Zhu, Hui Tian, Chin-Chen Chang, Yonghong Chen, Tian Wang, Yiqiao Cai:
StegTab: Steganography in Guitar Tablatures. J. Inf. Hiding Multim. Signal Process. 9(4): 904-917 (2018) - [j47]Dacheng Li, Yanrong Li, Wenfu Yang, Yanqin Ge, Qijin Han, Lingling Ma, Yonghong Chen, Xuan Li:
An Enhanced Single-Pair Learning-Based Reflectance Fusion Algorithm with Spatiotemporally Extended Training Samples. Remote. Sens. 10(8): 1207 (2018) - [j46]Jie Liu, Hui Tian, Chin-Chen Chang, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry 10(8): 336 (2018) - [c24]Jing Lu, Yuxiang Chen, Hui Tian, Yonghong Chen, Tian Wang, Yiqiao Cai:
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data. ICA3PP (Workshops) 2018: 185-191 - 2017
- [j45]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Hui Tian, Yiqiao Cai, Yonghong Chen, Bineng Zhong:
Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access 5: 7692-7701 (2017) - [j44]Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen, Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang:
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc Sens. Wirel. Networks 37(1-4): 95-115 (2017) - [j43]Yiqiao Cai, Guo Sun, Tian Wang, Hui Tian, Yonghong Chen, Jiahai Wang:
Neighborhood-adaptive differential evolution for global numerical optimization. Appl. Soft Comput. 59: 659-706 (2017) - [j42]Tian Wang, Wenhua Wang, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Interoperable localization for mobile group users. Comput. Commun. 105: 53-65 (2017) - [j41]Hui Tian, Jun Sun, Chin-Chen Chang, Jie Qin, Yonghong Chen:
Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation. IEEE Commun. Lett. 21(4): 749-752 (2017) - [j40]Tian Wang, Yang Li, Yonghong Chen, Hui Tian, Yiqiao Cai, Weijia Jia, Baowei Wang:
Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System. IEEE Commun. Lett. 21(11): 2532-2535 (2017) - [j39]Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 379: 160-176 (2017) - [j38]Weipeng Guo, Yonghong Chen, Yiqiao Cai, Tian Wang, Hui Tian:
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. KSII Trans. Internet Inf. Syst. 11(11): 5574-5591 (2017) - [j37]Hui Tian, Jun Sun, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate. Mob. Inf. Syst. 2017: 5418978:1-5418978:18 (2017) - [j36]Xiaogang Cheng, Ren Guo, Yonghong Chen:
Cryptanalysis and improvement of a quantum private set intersection protocol. Quantum Inf. Process. 16(2): 37 (2017) - [j35]Tian Wang, Qun Wu, Sheng Wen, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors 17(1): 139 (2017) - [j34]Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu:
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134: 9-22 (2017) - [j33]Hui Tian, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu:
Distributed steganalysis of compressed speech. Soft Comput. 21(3): 795-804 (2017) - [j32]Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang:
Enabling public auditability for operation behaviors in cloud storage. Soft Comput. 21(8): 2175-2187 (2017) - [j31]Yiqiao Cai, Meng Zhao, Jingliang Liao, Tian Wang, Hui Tian, Yonghong Chen:
Neighborhood guided differential evolution. Soft Comput. 21(16): 4769-4812 (2017) - [j30]Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu:
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Trans. Serv. Comput. 10(5): 701-714 (2017) - [c23]Qun Wu, Tian Wang, Yiqiao Cai, Hui Tian, Yonghong Chen:
Rumor restraining based on propagation prediction with limited observations in large-scale social networks. ACSW 2017: 1:1-1:8 - [c22]Zhaoyi Chen, Hui Tian, Jing Lu, Wenqi Chen, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage. CSE/EUC (2) 2017: 51-57 - [c21]Zhaoyi Chen, Hui Tian, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Logging and Public Audit for Operation Behavior in Cloud Storage. CSE/EUC (1) 2017: 444-450 - 2016
- [j29]Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving differential evolution with a new selection method of parents for mutation. Frontiers Comput. Sci. 10(2): 246-269 (2016) - [j28]Yonghong Chen, Ning Zhang, Hui Tian, Tian Wang, Yiqiao Cai:
A Novel Connection Correlation Scheme Based on Threshold Secret Sharing. IEEE Commun. Lett. 20(12): 2414-2417 (2016) - [j27]Tian Wang, Zhen Peng, Cheng Wang, Yiqiao Cai, Yonghong Chen, Hui Tian, Junbin Liang, Bineng Zhong:
Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(2): 5831471:1-5831471:11 (2016) - [j26]Jin Liu, Hui Tian, Jing Lu, Yonghong Chen:
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. J. Ambient Intell. Humaniz. Comput. 7(1): 139-147 (2016) - [j25]Yonghong Chen, Jie Yang, Xuehong Cao, Rui Chen:
Energy Efficiency Analysis of Multi-Antenna Heterogeneous Relay-Assisted Cellular Network via Stochastic Geometry. J. Commun. 11(11): 970-976 (2016) - [j24]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks). 计算机科学 43(Z11): 393-397 (2016) - [j23]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol). 计算机科学 43(Z6): 353-356 (2016) - [j22]Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Networks 9(15): 2934-2944 (2016) - [j21]Yiqiao Cai, Jiahai Wang, Yonghong Chen, Tian Wang, Hui Tian, Wei Luo:
Adaptive direction information in differential evolution for numerical optimization. Soft Comput. 20(2): 465-494 (2016) - [j20]Jingliang Liao, Yiqiao Cai, Tian Wang, Hui Tian, Yonghong Chen:
Cellular direction information based differential evolution for numerical optimization: an empirical study. Soft Comput. 20(7): 2801-2827 (2016) - [c20]Zhaoyi Chen, Hui Tian, Jing Lu, Yiqiao Cai, Tian Wang, Yonghong Chen:
Operational-Behavior Auditing in Cloud Storage. CloudComp 2016: 162-172 - [c19]Xinling Kong, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai, Xin Chen:
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering. CyberC 2016: 42-45 - [c18]Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Hui Tian, Yonghong Chen:
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users. SpaCCS Workshops 2016: 197-207 - 2015
- [j19]Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong:
Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Networks 93: 199-212 (2015) - [j18]Hui Tian, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Improved adaptive partial-matching steganography for Voice over IP. Comput. Commun. 70: 95-108 (2015) - [j17]Hui Tian, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
A High-Capacity Covering Code for Voice-Over-IP Steganography. Int. J. Inf. Technol. Web Eng. 10(3): 46-63 (2015) - [j16]Yonghong Chen, Huijian Wang, Shibing Zhang:
Opportunistic Spectrum Access in Imperfect Spectrum Sensing Cognitive Networks. J. Commun. 10(6): 410-414 (2015) - [j15]Hui Tian, Jie Qin, Yongfeng Huang, Yonghong Chen, Tian Wang, Jin Liu, Yiqiao Cai:
Optimal matrix embedding for Voice-over-IP steganography. Signal Process. 117: 33-43 (2015) - [c17]Jie Qin, Hui Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang:
An Efficient VoIP Steganography Based on Random Binary Matrix. 3PGCIC 2015: 462-465 - [c16]Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions. ARES 2015: 455-460 - [c15]Tian Wang, Zhen Peng, Junbin Liang, Yiqiao Cai, Yonghong Chen, Hui Tian, Bineng Zhong:
Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks. WASA 2015: 836-844 - 2014
- [j14]Xinlei Ma, Yonghong Chen:
DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy. IEEE Commun. Lett. 18(1): 114-117 (2014) - [c14]Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving Differential Evolution with Ring Topology-Based Mutation Operators. 3PGCIC 2014: 103-109 - [c13]Shibing Zhang, Guodong Zhang, Yonghong Chen, Lili Guo:
A spectrum trading algorithm using an agent in cognitive radio networks. ICUMT 2014: 386-389 - [c12]Tian Wang, Zhen Peng, Yonghong Chen, Yiqiao Cai, Hui Tian:
Continuous tracking for mobile targets with mobility nodes in WSNs. SMARTCOMP 2014: 261-268 - 2013
- [j13]Yonghong Chen, Xinlei Ma, Xinya Wu:
DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory. IEEE Commun. Lett. 17(5): 1052-1054 (2013) - [j12]Xinya Wu, Yonghong Chen:
Validation of Chaos Hypothesis in NADA and Improved DDoS Detection Algorithm. IEEE Commun. Lett. 17(12): 2396-2399 (2013) - [c11]Yonghong Chen, Yan Chen, Jinge Wang:
A Novel Worm Drive for Rehabilitation Robot Joint. MSN 2013: 586-590 - [c10]Yan Chen, Yonghong Chen, Jinge Wang:
The Three-Dimensional Modeling of Femur. MSN 2013: 591-593 - 2012
- [j11]Brian Carlson, Yonghong Chen, Mingguo Hong, Roy Jones, Kevin Larson, Xingwang Ma, Peter Nieuwesteeg, Haili Song, Kimberly Sperry, Matthew Tackett, Doug Taylor, Jie Wan, Eugene J. Zak:
MISO Unlocks Billions in Savings Through the Application of Operations Research for Energy and Ancillary Services Markets. Interfaces 42(1): 58-73 (2012) - [j10]Yonghong Chen, Jiancong Chen:
Digital Image Watermarking Based on Mixed Error Correcting Code. J. Information Security 3(2): 156-161 (2012) - [c9]Yonghong Chen, Xiwei Xu, Liming Zhu:
Web Platform API Design Principles and Service Contract. APSEC 2012: 877-886 - [c8]Xiangbin Feng, Yonghong Chen:
Digital image watermarking based on Super-Resolution Image Reconstruction. FSKD 2012: 1778-1782
2000 – 2009
- 2009
- [j9]Yonghong Chen, Steven L. Bressler, Mingzhou Ding:
Dynamics on networks: assessing functional connectivity with Granger causality. Comput. Math. Organ. Theory 15(4): 329-350 (2009) - 2008
- [j8]Yan Zhang, Xue Wang, Steven L. Bressler, Yonghong Chen, Mingzhou Ding:
Prestimulus Cortical Activity is Correlated with Speed of Visuomotor Processing. J. Cogn. Neurosci. 20(10): 1915-1925 (2008) - [j7]Xue Wang, Yonghong Chen, Mingzhou Ding:
Estimating Granger causality after stimulus onset: A cautionary note. NeuroImage 41(3): 767-776 (2008) - [c7]Zhenyu Zhou, Yun Jiao, Tianyu Tang, Zuhong Lu, Yijun Liu, Yonghong Chen, Mingzhou Ding:
Detecting Effective Connectivity in Human Brain using Granger Causality. BMEI (2) 2008: 394-398 - [c6]Yonghong Chen, Xing Liu, Vaithianathan Mani Venkatasubramanian:
Fast Algorithms for Detecting Circular VAR Flows in Large Power-Flow Models. HICSS 2008: 170 - 2007
- [j6]Xue Wang, Yonghong Chen, Steven L. Bressler, Mingzhou Ding:
Granger Causality between Multiple Interdependent Neurobiological Time Series: Blockwise versus Pairwise Methods. Int. J. Neural Syst. 17(2): 71-78 (2007) - [j5]Shouyan Wang, Yonghong Chen, Mingzhou Ding, Jianfeng Feng, John F. Stein, Tipu Z. Aziz, Xing Liu:
Revealing the dynamic causal interdependence between neural and muscular signals in Parkinsonian tremor. J. Frankl. Inst. 344(3-4): 180-195 (2007) - [j4]Xue Wang, Yonghong Chen, Mingzhou Ding:
Testing for Statistical Significance in Bispectra: A Surrogate Data Approach and Application to Neuroscience. IEEE Trans. Biomed. Eng. 54(11): 1974-1982 (2007) - 2006
- [c5]Yonghong Chen:
A New Secure Communication Scheme Based on Synchronization of Chaotic System. ICNC (2) 2006: 452-455 - [c4]Steven L. Bressler, Craig G. Richter, Yonghong Chen, Mingzhou Ding:
Top-Down Cortical Influences in Visual Expectation. IJCNN 2006: 188-194 - [c3]Steven L. Bressler, Craig G. Richter, Yonghong Chen, Mingzhou Ding:
Top-Down Cortical Influences in Visual Expectation. IJCNN 2006: 384-390 - 2005
- [c2]Mingzhou Ding, Kevin H. Knuth, Yonghong Chen, Steven L. Bressler, Charles E. Schroeder:
Coping with trial-to-trial variability of event related signals: A Bayesian inference approach. EUSIPCO 2005: 1-4 - 2004
- [j3]Zimbul Albo, Gonzalo Viana Di Prisco, Yonghong Chen, Govindan Rangarajan, Wilson A. Truccolo, Jianfeng Feng, Robert P. Vertes, Mingzhou Ding:
Is partial coherence a viable technique for identifying generators of neural oscillations? Biol. Cybern. 90(5): 318-326 (2004) - 2003
- [j2]Yonghong Chen, Yaolin Jiang, Jianxue Xu:
Dynamic properties and a new learning mechanism in higher order neural networks. Neurocomputing 50: 17-30 (2003) - [j1]Wilson A. Truccolo, Govindan Rangarajan, Yonghong Chen, Mingzhou Ding:
Analyzing stability of equilibrium points in neural networks: a general approach. Neural Networks 16(10): 1453-1460 (2003)
1990 – 1999
- 1997
- [c1]Yonghong Chen, Qiao Li:
They are Just Butterflies. COCOON 1997: 512-513
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-30 20:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint