default search action
Lifeng Yuan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Weifeng Yin, Lifeng Yuan, Yizhi Ren, Weizhi Meng, Dong Wang, Qiuhua Wang:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 19: 6665-6678 (2024) - 2023
- [j14]Siyu Yao, Yizhi Ren, Dong Wang, Yeru Wang, Weifeng Yin, Lifeng Yuan:
SNN-PPRL: A secure record matching scheme based on siamese neural network. J. Inf. Secur. Appl. 76: 103529 (2023) - [j13]Qisen Xi, Yizhi Ren, Liang Kou, Yongrui Cui, Zuohua Chen, Lifeng Yuan, Dong Wang:
EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction. Mob. Networks Appl. 28(5): 1818-1830 (2023) - [c8]Zhen Zhang, Xin Wang, Lifeng Yuan, Gongxun Miao, Mengqiu Liu, Wenhao Yun, Guohua Wu:
DGNN: Dependency Graph Neural Network for Multimodal Emotion Recognition in Conversation. ICONIP (9) 2023: 86-99 - [c7]Yumiao Gao, Yizhi Ren, Jiawei Rao, Zuohua Chen, Qisen Xi, Haoda Wang, Dong Wang, Lifeng Yuan:
Chinese Event Causality Identification Based on Retrieval Enhancement. NLPCC (1) 2023: 159-170 - 2022
- [j12]Yizhi Ren, Zelong Li, Lifeng Yuan, Zhen Zhang, Chunhua Su, Yujuan Wang, Guohua Wu:
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems. IEICE Trans. Inf. Syst. 105-D(2): 289-299 (2022) - [j11]Weitong Hu, Ting Wu, Yuanfang Chen, Yanzhao Shen, Lifeng Yuan:
Correction to: A lossless secret image sharing scheme using a larger finite field. Multim. Tools Appl. 81(21): 31199 (2022) - [c6]Zuohua Chen, Guohua Wu, Qiuhua Wang, Zhen Zhang, Qisen Xi, Yizhi Ren, Lifeng Yuan:
Label Semantic Extension for Chinese Event Extraction. NLPCC (1) 2022: 197-208 - 2021
- [j10]Qiuhua Wang, Mingyang Kang, Lifeng Yuan, Yunlu Wang, Gongxun Miao, Kim-Kwang Raymond Choo:
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. KSII Trans. Internet Inf. Syst. 15(6): 2255-2281 (2021) - [j9]Weitong Hu, Ting Wu, Yuanfang Chen, Yanzhao Shen, Lifeng Yuan:
A lossless secret image sharing scheme using a larger finite field. Multim. Tools Appl. 80(19): 28731-28743 (2021) - [j8]Guohua Wu, Mingyao Wang, Qiuhua Wang, Ye Yao, Lifeng Yuan, Gongxun Miao:
A Novel Threshold Changeable Secret Image Sharing Scheme. Symmetry 13(2): 286 (2021) - [j7]Rui Wang, Guohua Wu, Qiuhua Wang, Lifeng Yuan, Zhen Zhang, Gongxun Miao:
Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two's Complement. Symmetry 13(6): 921 (2021)
2010 – 2019
- 2019
- [j6]Xuan Ni, Linqiang Chen, Lifeng Yuan, Guohua Wu, Ye Yao:
An Evaluation of Deep Learning-Based Computer Generated Image Detection Approaches. IEEE Access 7: 130830-130840 (2019) - [c5]Qi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan, Linqiang Chen:
Data Poisoning Attacks on Graph Convolutional Matrix Completion. ICA3PP (2) 2019: 427-439 - [p1]Jia Liu, Mingchu Li, Zitong Feng, Cheng Guo, Lifeng Yuan, Muhammad Alam:
An Evolutionary Game-Based Mechanism for Unwanted Traffic Control. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 37-51 - 2018
- [j5]Chaolong Zhang, Yigang He, Lifeng Yuan, Sheng Xiang:
Analog Circuit Incipient Fault Diagnosis Method Using DBN Based Features Extraction. IEEE Access 6: 23053-23064 (2018) - [c4]Mengjin Jiang, Yizhi Ren, Ye Yao, Lifeng Yuan, Ting Wu, Zhen Wang:
CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 334-337 - 2017
- [j4]Chaolong Zhang, Yigang He, Lifeng Yuan, Sheng Xiang:
Capacity Prognostics of Lithium-Ion Batteries using EMD Denoising and Multiple Kernel RVM. IEEE Access 5: 12061-12070 (2017) - [j3]Lifeng Yuan, Mingchu Li, Cheng Guo, Wei-Tong Hu, Zhi-Hui Wang:
A Verifiable E-voting Scheme with Secret Sharing. Int. J. Netw. Secur. 19(2): 260-271 (2017) - 2015
- [j2]Chaolong Zhang, Yigang He, Lifeng Yuan, Sheng Xiang, Jin-Ping Wang:
Prognostics of Lithium-Ion Batteries Based on Wavelet Denoising and DE-RVM. Comput. Intell. Neurosci. 2015: 918305:1-918305:8 (2015) - [c3]Cheng Guo, Ruhan Zhuang, Lifeng Yuan, Bin Feng:
A Group Authentication Scheme Supporting Cheating Detection and Identification. FCST 2015: 110-114 - 2013
- [j1]Mingchu Li, Lifeng Yuan, He Jiang, Bing Liu, Haitze J. Broersma:
Tank-Ring Factors in Supereulerian Claw-Free Graphs. Graphs Comb. 29(3): 599-608 (2013)
2000 – 2009
- 2006
- [c2]Lifeng Yuan, Qigang Zhou, Wenwen Li, Qingfeng Zhang, Weiguo Jiang:
DEM-based Watershed Topographic Attributes Extraction and Analysis. IGARSS 2006: 911-913 - [c1]Wenwen Li, Chaowei Yang, Bin Zhou, Yingchao Ren, Chongjun Yang, Lifeng Yuan:
Design and Implementation of an Integrated WMS Service Portal. IGARSS 2006: 924-927
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint