Machine learning and deep learning methods for cybersecurity Y Xin, L Kong, Z Liu, Y Chen, Y Li, H Zhu, M Gao, H Hou, C Wang Ieee access 6, 35365-35381, 2018 | 1134 | 2018 |
A secure cryptocurrency scheme based on post-quantum blockchain YL Gao, XB Chen, YL Chen, Y Sun, XX Niu, YX Yang Ieee Access 6, 27205-27213, 2018 | 194 | 2018 |
Semi‐selfish mining based on hidden Markov decision process T Li, Z Wang, G Yang, Y Cui, Y Chen, X Yu International Journal of Intelligent Systems 36 (7), 3596-3612, 2021 | 102 | 2021 |
A secure and efficient data integrity verification scheme for cloud-IoT based on short signature H Zhu, Y Yuan, Y Chen, Y Zha, W Xi, B Jia, Y Xin IEEE Access 7, 90036-90044, 2019 | 97 | 2019 |
A new lattice-based signature scheme in post-quantum blockchain network CY Li, XB Chen, YL Chen, YY Hou, J Li Ieee Access 7, 2026-2033, 2018 | 95 | 2018 |
Is semi‐selfish mining available without being detected? T Li, Z Wang, Y Chen, C Li, Y Jia, Y Yang International Journal of Intelligent Systems 37 (12), 10576-10597, 2022 | 82 | 2022 |
PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs Y Chen, J Sun, Y Yang, T Li, X Niu, H Zhou International Journal of Intelligent Systems 37 (2), 1204-1221, 2022 | 80 | 2022 |
Rational protocols and attacks in blockchain system T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang Security and communication networks 2020 (1), 8839047, 2020 | 76 | 2020 |
A heterogeneous ensemble learning framework for spam detection in social networks with imbalanced data C Zhao, Y Xin, X Li, Y Yang, Y Chen Applied Sciences 10 (3), 936, 2020 | 68 | 2020 |
FaDe: a blockchain-based fair data exchange scheme for big data sharing Y Chen, J Guo, C Li, W Ren Future Internet 11 (11), 225, 2019 | 48 | 2019 |
Cryptanalysis of secret sharing with a single d-level quantum system XB Chen, X Tang, G Xu, Z Dou, YL Chen, YX Yang Quantum Information Processing 17, 1-11, 2018 | 48 | 2018 |
Dynamic multi-key FHE in asymmetric key setting from LWE Y Chen, S Dong, T Li, Y Wang, H Zhou IEEE Transactions on Information Forensics and Security 16, 5239-5249, 2021 | 45 | 2021 |
Depet: A decentralized privacy-preserving energy trading scheme for vehicular energy network via blockchain and k-anonymity Y Long, Y Chen, W Ren, H Dou, NN Xiong Ieee Access 8, 192587-192596, 2020 | 41 | 2020 |
Quantum K-nearest-neighbor image classification algorithm based on KL transform NR Zhou, XX Liu, YL Chen, NS Du International Journal of Theoretical Physics 60, 1209-1224, 2021 | 38 | 2021 |
Automated software vulnerability detection based on hybrid neural network X Li, L Wang, Y Xin, Y Yang, Q Tang, Y Chen Applied Sciences 11 (7), 3201, 2021 | 36 | 2021 |
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things. C Li, G Xu, Y Chen, H Ahmad, J Li Computers, Materials & Continua 61 (2), 2019 | 34 | 2019 |
Energy trading scheme based on consortium blockchain and game theory Y Chen, Y Li, Q Chen, X Wang, T Li, C Tan Computer Standards & Interfaces 84, 103699, 2023 | 28 | 2023 |
An attention-based graph neural network for spam bot detection in social networks C Zhao, Y Xin, X Li, H Zhu, Y Yang, Y Chen Applied Sciences 10 (22), 8160, 2020 | 26 | 2020 |
A privacy measurement framework for multiple online social networks against social identity linkage X Li, Y Yang, Y Chen, X Niu Applied Sciences 8 (10), 1790, 2018 | 21 | 2018 |
Impsuic: a quality updating rule in mixing coins with maximum utilities X Yu, Z Wang, Y Wang, F Li, T Li, Y Chen, Y Tian, X Yu International Journal of Intelligent Systems 36 (3), 1182-1198, 2021 | 20 | 2021 |