default search action
Chen Dong 0002
Person information
- affiliation: Fuzhou University, College of Mathematics and Computer Science, China
Other persons with the same name
- Chen Dong — disambiguation page
- Chen Dong 0001 — Beijing University of Posts and Telecommunications, China (and 1 more)
- Chen Dong 0003 — University of Illinois, Urbana-Champaign, Department of Electrical and Computer Engineering, IL, USA (and 1 more)
- Chen Dong 0004 — Adobe, Inc., San Jose, CA , USA
- Chen Dong 0005 — Nanjing University, School of Electronic Science and Engineering, China
- Chen Dong 0006 — Lanzhou University of Technology, School of Computer and Communication, China
- Chen Dong 0007 — Guangdong Commerce and Industry College, College of Electronic and Information Engineering, China
- Chen Dong 0008 — Zhejiang Wanli University, School of Computer Science And Information Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Yujie Wan, Yuzhong Chen, Jiali Lin, Jiayuan Zhong, Chen Dong:
A knowledge-augmented heterogeneous graph convolutional network for aspect-level multimodal sentiment analysis. Comput. Speech Lang. 85: 101587 (2024) - [j29]Chen Dong, Xiao Chen, Zhenyi Chen:
Reactant and Waste Minimization during Sample Preparation on Micro-Electrode-Dot-Array Digital Microfluidic Biochips using Splitting Trees. J. Electron. Test. 40(1): 87-99 (2024) - [j28]Xuanwei Lin, Ximeng Liu, Bijia Chen, Yuyang Wang, Chen Dong, Pengzhen Hu:
ATAL: Active Learning Using Adversarial Training for Data Augmentation. IEEE Internet Things J. 11(3): 4787-4800 (2024) - [j27]Chen Dong, Xiaodong Guo, Sihuang Lian, Yinan Yao, Zhenyi Chen, Yang Yang, Zhanghui Liu:
Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips. J. King Saud Univ. Comput. Inf. Sci. 36(3): 101996 (2024) - [j26]Yonghua Zhan, Feng Yuan, Rui Shi, Guozhen Shi, Chen Dong:
PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices. Sensors 24(2): 496 (2024) - [c22]Jingjing Lin, Jingsong Lin, Chenxi Lyu, Xinmin Fan, Chen Dong:
malDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 133-140 - 2023
- [j25]Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong:
A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare. IEEE Access 11: 137990-137998 (2023) - [j24]Zelin Chen, Lvmin Liu, Yujie Wan, Yuzhong Chen, Chen Dong, Weiwei Li, Yuhang Lin:
Improving BERT with local context comprehension for multi-turn response selection in retrieval-based dialogue systems. Comput. Speech Lang. 82: 101525 (2023) - [j23]Chen Dong, Jihai Luo, Qiyu Hong, Zhenyi Chen, Yuzhong Chen:
A dynamic distributed edge-cloud manufacturing with improved ADMM algorithms for mass personalization production. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101632 (2023) - [j22]Dong Chen, Chen Dong, Wenwu He, Zhenyi Chen, Ximeng Liu, Hao Zhang:
A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101822 (2023) - [j21]Yonghua Zhan, Bixia Yi, Yang Yang, Rui Shi, Chen Dong, Minming Huang:
A privilege-constrained sanitizable signature scheme for e-health systems. J. Syst. Archit. 142: 102939 (2023) - [j20]Chen Dong, Yinan Yao, Yi Xu, Ximeng Liu, Yan Wang, Hao Zhang, Li Xu:
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. Sensors 23(12): 5503 (2023) - [c21]Yan Chen, Zhongliao Yang, Chen Dong, Hui Lin, Zhenyi Chen:
A Novel Fast Video Fragment Matching Algorithm for Copyright Protection. DASC/PiCom/CBDCom/CyberSciTech 2023: 220-227 - [c20]Yinan Yao, Decheng Qiu, Bolun Li, Chen Dong, Li Xu, Xiaodong Guo, Changping Lai:
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare. DASC/PiCom/CBDCom/CyberSciTech 2023: 367-374 - [c19]Jingsong Lin, Xiaodong Guo, Chen Dong, Chenxi Lyu, Li Xu, Zhenyi Chen:
Text Summarization Generation Based on Improved Transformer Model. DASC/PiCom/CBDCom/CyberSciTech 2023: 831-836 - [c18]Yaojie Ke, Yinan Yao, Zhengye Xie, Hepeng Xie, Hui Lin, Chen Dong:
Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5. DASC/PiCom/CBDCom/CyberSciTech 2023: 942-949 - [c17]Jihai Luo, Chen Dong, Zhenyi Chen, Li Xu, Tianci Chen:
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm. GPC (2) 2023: 47-62 - [c16]Jingzhou Ye, Hui Lin, Xiaoding Wang, Chen Dong, Jianmin Liu:
Efficient and Reliable Federated Recommendation System in Temporal Scenarios. GPC (2) 2023: 97-107 - [c15]Peixin Huang, Chen Dong, Zhenyi Chen, Zihang Zhen, Lei Jiang:
An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm. GPC (1) 2023: 209-222 - [c14]Huichang Huang, Zhongliao Yang, Jiayuan Zhong, Li Xu, Chen Dong, Ruishen Bao:
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare. GPC (2) 2023: 209-223 - [c13]Zhongliao Yang, Huichang Huang, Zeyi Liu, Chen Dong, Li Xu:
Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare. GPC (2) 2023: 266-281 - [c12]Chenxi Lyu, Yinan Yao, Xiaodong Guo, Zihong Huang, Chen Dong, Yuanyuan Zhang, Zhenyi Chen:
AntiMal: an Approach of Malware Detection Employing Swin Transformer. ICCNS 2023: 1-5 - [c11]Yinan Yao, Chen Dong, Zhengye Xie, Yuqing Li, Xiaodong Guo, Yang Yang, Xiaoding Wang:
A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning. ICCNS 2023: 69-76 - [c10]Zhirun Lin, Yang Yang, Yonghua Zhan, Jiayin Li, Chen Dong:
Blockchain-based Searchable Encryption Scheme for Spatial Text Data. ICCNS 2023: 100-105 - [c9]Xiaodong Guo, Chenxi Lyu, Zhenyi Chen, Xiaoding Wang, Ruishen Bao, Chen Dong:
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication. ICCNS 2023: 106-111 - 2022
- [j19]Yin Ye, Shengwu Xiong, Chen Dong, Zhenyi Chen:
The structural weight design method based on the modified grasshopper optimization algorithm. Multim. Tools Appl. 81(21): 29977-30005 (2022) - [j18]Wenzhong Guo, Sihuang Lian, Chen Dong, Zhenyi Chen, Xing Huang:
A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense. ACM Trans. Design Autom. Electr. Syst. 27(4): 40:1-40:33 (2022) - [c8]Xuanwei Lin, Chen Dong, Ximeng Liu, Yuanyuan Zhang:
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic. CCGRID 2022: 366-375 - [c7]Xuanwei Lin, Chen Dong, Ximeng Liu, Dong Cheng:
Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain. ML4CS (1) 2022: 457-471 - 2021
- [j17]Hanyang Lin, Yongzhao Zhan, Zizheng Zhao, Yuzhong Chen, Chen Dong:
Overlapping Community Detection Based on Attribute Augmented Graph. Entropy 23(6): 680 (2021) - [j16]Xudong Dong, Chen Dong, Zhenyi Chen, Ye Cheng, Bo Chen:
BotDetector: An extreme learning machine-based Internet of Things botnet detection model. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j15]Hao Zhang, Jieling Li, Xi-Meng Liu, Chen Dong:
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection. Future Gener. Comput. Syst. 122: 130-143 (2021) - [j14]Zhenyi Chen, Kwang-Cheng Chen, Chen Dong, Zixiang Nie:
6G Mobile Communications for Multi-Robot Smart Factory. J. ICT Stand. 9(3) (2021) - [c6]Chen Dong, Lingqing Liu, Ximeng Liu, Huangda Liu, Sihuang Lian:
MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection. ACM Great Lakes Symposium on VLSI 2021: 277-282 - [c5]Yi Xu, Zhenyi Chen, Binhong Huang, Ximeng Liu, Chen Dong:
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans. ISPA/BDCloud/SocialCom/SustainCom 2021: 55-62 - [c4]Qiyu Hong, Zhenyi Chen, Chen Dong, Qiancheng Xiong:
A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production. SMC 2021: 3297-3302 - 2020
- [j13]Chen Dong, Yulin Liu, Jinghui Chen, Ximeng Liu, Wenzhong Guo, Yuzhong Chen:
An Unsupervised Detection Approach for Hardware Trojans. IEEE Access 8: 158169-158183 (2020) - [j12]Yuzhong Chen, Zhenyu Liu, Yulin Liu, Chen Dong:
Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation. Entropy 22(9): 1026 (2020) - [j11]Zhanghui Liu, Yudong Zhang, Yuzhong Chen, Xinwen Fan, Chen Dong:
Detection of Algorithmically Generated Domain Names Using the Recurrent Convolutional Neural Network with Spatial Pyramid Pooling. Entropy 22(9): 1058 (2020) - [j10]Yang Yang, Ximeng Liu, Wenzhong Guo, Xianghan Zheng, Chen Dong, Zhiquan Liu:
Multimedia access control with secure provenance in fog-cloud computing networks. Multim. Tools Appl. 79(15-16): 10701-10716 (2020) - [j9]Chen Dong, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, Yuzhong Chen:
Hardware Trojans in Chips: A Survey for Detection and Prevention. Sensors 20(18): 5165 (2020) - [c3]Guorong He, Chen Dong, Xing Huang, Wenzhong Guo, Ximeng Liu, Tsung-Yi Ho:
HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems. ACM Great Lakes Symposium on VLSI 2020: 415-420 - [c2]Chen Dong, Lingqing Liu, Huangda Liu, Wenzhong Guo, Xing Huang, Sihuang Lian, Ximeng Liu, Tsung-Yi Ho:
A Survey of DMFBs Security: State-of-the-Art Attack and Defense. ISQED 2020: 14-20
2010 – 2019
- 2019
- [j8]Chen Dong, Yin Ye, Ximeng Liu, Yang Yang, Wenzhong Guo:
The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT. IEEE Access 7: 16952-16963 (2019) - [j7]Chen Dong, Guorong He, Ximeng Liu, Yang Yang, Wenzhong Guo:
A Multi-Layer Hardware Trojan Protection Framework for IoT Chips. IEEE Access 7: 23628-23639 (2019) - [j6]Chen Dong, Ziqi Xiong, Ximeng Liu, Yin Ye, Yang Yang, Wenzhong Guo:
Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization. IEEE Access 7: 24571-24584 (2019) - [j5]Chen Dong, Fan Zhang, Ximeng Liu, Xing Huang, Wenzhong Guo, Yang Yang:
A Locating Method for Multi-Purposes HTs Based on the Boundary Network. IEEE Access 7: 110936-110950 (2019) - [j4]Rongzhong Chen, Chen Dong, Yin Ye, Zhenyi Chen, Yanhua Liu:
QSSA: Quantum Evolutionary Salp Swarm Algorithm for Mechanical Design. IEEE Access 7: 145582-145595 (2019) - [j3]Jinghui Chen, Chen Dong, Guorong He, Xiaoyu Zhang:
A method for indoor Wi-Fi location based on improved back propagation neural network. Turkish J. Electr. Eng. Comput. Sci. 27(4): 2511-2525 (2019) - [j2]Chen Dong, Jinghui Chen, Wenzhong Guo, Jian Zou:
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things. Int. J. Distributed Sens. Networks 15(12) (2019) - 2018
- [j1]Shijie Lin, Chen Dong, Zhiqiang Wang, Wenzhong Guo, Zhenyi Chen, Yin Ye:
A Chaotic Artificial Bee Colony Algorithm Based on Lévy Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2472-2476 (2018)
2000 – 2009
- 2008
- [c1]Chen Dong, Gaofeng Wang, Zhenyi Chen, Zuqiang Yu:
A Method of Self-Adaptive Inertia Weight for PSO. CSSE (1) 2008: 1195-1198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint