


default search action
Yu Chen 0002
Person information
- affiliation: Binghamton University, New York, NY, USA
- affiliation: University of Southern California, Los Angeles, CA, USA
Other persons with the same name
- Yu Chen — disambiguation page
- Yu Chen 0001
— Wuhan University of Technology, School of Science, China
- Yu Chen 0003
— Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (and 1 more)
- Yu Chen 0004
— Tsinghua University, Department of Computer Science and Technology, Beijing, China
- Yu Chen 0005 — University of California, Los Angeles, CA, USA
- Yu Chen 0006
— Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beiing, China (and 1 more)
- Yu Chen 0007 — University of Tokyo, Japan
- Yu Chen 0008
— San Jose State University, School of Information Systems and Technology, CA, USA (and 3 more)
- Yu Chen 0009 — University of Cambridge, UK (and 1 more)
- Yu Chen 0010
— State Key Laboratory of Transmission Equipment and System Safety and Electrical New Technology, Chongqing, China
- Yu Chen 0011
— Wayne State University, Detroit, MI, USA
- Yu Chen 0012 — DFKI, Saarbrücken, Germany (and 1 more)
- Yu Chen 0013
— Columbia University, Department of Electrical Engineering, New York, NY, USA
- Yu Chen 0014
— China University of Mining and Technology, Key Laboratory for Land Environment and Disaster Monitoring of NASG, Xuzhou, China (and 1 more)
- Yu Chen 0015 — Sichuan University, Business School, Chengdu, China
- Yu Chen 0016 — University of Waterloo, Ontario, Canada
- Yu Chen 0017 — Texas A&M University, College Station, USA
- Yu Chen 0018
— University of Science and Technology of China, School of Management, Hefei, China
- Yu Chen 0019
— Carnegie Mellon University, Pittsburgh, PA, USA
- Yu Chen 0020 — China University of Mining and Technology, Xuzhou, China
- Yu Chen 0021 — Wuhan University, School of Computer Science, National Engineering Research Center for Multimedia Software, China
- Yu Chen 0022
— Rensselaer Polytechnic Institute, Computer Science Department, Troy, NY, USA
- Yu Chen 0023
— Zhengzhou University of Aeronautics, School of Electronics and Communication Engineering, China
- Yu Chen 0024
— University of Liverpool, Institute for Risk and Uncertainty, UK (and 1 more)
- Yu Chen 0025
— Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yu Chen 0026
— Central South University, School of Life Sciences, Center for Medical Genetics / Hunan Key Laboratory of Medical Genetics, Changsha, China
- Yu Chen 0027
— Central South University, School of Resources and Safety Engineering, Changsha, China (and 1 more)
- Yu Chen 0028
— University of Electronic Science and Technology, School of Automation Engineering, Chengdu, China
- Yu Chen 0029
— Wuhan University, School of Geodesy and Geomatics, China
- Yu Chen 0030
— Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yu Chen 0031
— Harbin Institute of Technology, School of Electrical Engineering and Automation, China
- Yu Chen 0032 — Shenzhen University, College of Architecture and Urban Planning, China
- Yu Chen 0033
— Yancheng Teachers University, School of Information Engineering, China (and 2 more)
- Yu Chen 0034
— Beijing Polytechnic, School of Telecommunication Engineering, China (and 1 more)
- Yu Chen 0035
— Shenyang Pharmaceutical University, School of Business Administration, China
- Yu Chen 0036
— College of William and Mary, Williamsburg, VA, USA
- Yu Chen 0037
— Motovis Inc. (and 1 more)
- Yu Chen 0038
— Nanjing University, China
- Yu Chen 0039
— École Polytechnique Fédérale de Lausanne, Switzerland (and 2 more)
- Yu Chen 0040 — Xi'an Jiaotong University, Department of Electrical and Information Engineering, Institute of Artificial Intelligence and Robotics, Xi'an, China
- Yu Chen 0041
— Chinese Academie of Sciences, Institute of Geographical Sciences and Natural Resources Research, State Key Laboratory of Resources and Environmental Information System, Beijing, China
- Yu Chen 0042
— Tianjin University of Technology, China (and 2 more)
- Yu Chen 0043
— University of California, San Diego, CA, USA
- Yu Chen 0044
— University of Edinburgh, School of Engineering, Institute for Digital Communication, UK
- Yu Chen 0045
— Yale University, School of Medicine, Department of Psychiatry, New Haven, CT, USA
- Yu Chen 0046
— Kunming University of Science and Technology, Faculty of Information Engineering and Automation, China
- Yu Chen 0047
— Central South University, School of Automation, Changsha, China
- Yu Chen 0048
— Donghua University, Shanghai, China
- Yu Chen 0049
— North China Electric Power University, School of Control and Computer Engineering, Baoding, China
- Yu Chen 0050
— China University of Geosciences, School of Geography and Information Engineering, Wuhan, China
- Yu Chen 0051
— University of Technology Sydney, Faculty of Engineering and IT, Australia
- Yu Chen 0052
— Tsinghua University, BNRist, RIIT, Institute of Internet Industry, Beijing, China
- Yu Chen 0053
— National University of Defense Technology, College of Electronic Engineering, Hefei, China
- Yu Chen 0054
— Shandong University of Technology, School of Electrical and Electronic Engineering, Zibo, China
- Yu Chen 0055
— Jiangxi Normal University, School of Software, Nanchang, China
- Yu Chen 0056
— Hubei University of Technology, School of Computers, Wuhan, China
- Yu Chen 0057
— Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China
- Yu Chen 0058
— Wuhan University of Technology, School of Transportation, China
- Yu Chen 0059
— Delft University of Technology, Faculty of Civil Engineering and Geosciences, The Netherlands
- Yu Chen 0060
— Northeast Forestry University, College of Information and Computer Engineering, Harbin, China (and 1 more)
- Yu Chen 0061
— Huazhong University of Science and Technology, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yu Chen 0062
— Xidian University, State Key Laboratory of Integrated Services Network, Xi'an, China
- Yu Chen 0063
— Xi'an Jiaotong University, School of Electrical Engineering, China
- Yu Chen 0064
— Soochow University, School of Computer Science and Technology, Suzhou, China
- Yu Chen 0065
— University of Strathclyde, Department of Physics, Glasgow, UK
- Yu Chen 0066
— University of Glasgow, James Watt School of Engineering, UK (and 1 more)
- Yu Chen 0067
— Ningbo University, China
- Yu Chen 0068 — Rensselaer Polytechnic Institute, USA
- Yu Chen 0069 — Swansea University, UK
- Yu Chen 0070
— University of Michigan, Electrical Engineering and Computer Science, Ann Arbor, MI, USA (and 1 more)
- Yu Chen 0071
— University of Illinois at Urbana-Champaign, Department of Mechanical Science and Engineering, IL, US
- Yu Chen 0072 — Department of Automation and Key Laboratory of System Control and Information Processing, Shanghai Jiao Tong University, Shanghai, China
- Yu Chen 0073 — Tianjin University of Technology, School of Chinese Language and Culture, Tianjin, China
- Yu Chen 0074
— Institute for Interdisciplinary Information Sciences (IIIS), Tsinghua University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Ronghua Xu
, Deeraj Nagothu, Yu Chen, Alex Aved, Erika Ardiles-Cruz, Erik Blasch:
A Secure Interconnected Autonomous System Architecture for Multi-Domain IoT Ecosystems. IEEE Commun. Mag. 62(7): 52-57 (2024) - [j40]Qian Qu, Mohsen Hatami
, Ronghua Xu
, Deeraj Nagothu
, Yu Chen
, Xiaohua Li, Erik Blasch
, Erika Ardiles-Cruz, Genshe Chen
:
The Microverse: A Task-Oriented Edge-Scale Metaverse. Future Internet 16(2): 60 (2024) - [c102]Nihal Poredi, Deeraj Nagothu, Yu Chen:
Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis. CCNC 2024: 534-539 - [c101]Lhamo Dorje, Xiaohua Li, Yu Chen, Nihal Poredi:
High-Resolution Imaging Capability of Large-Scale LEO Satellite Constellations. ICC 2024: 1594-1599 - [e1]Yu Chen
, Chung-Wei Lin
, Bo Chen
, Qi Zhu
:
Security and Privacy in Cyber-Physical Systems and Smart Vehicles - First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 552, Springer 2024, ISBN 978-3-031-51629-0 [contents] - 2023
- [j39]Alem Fitwi
, Yu Chen
, Sencun Zhu
:
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling. IEEE Trans. Serv. Comput. 16(1): 276-287 (2023) - [c100]Qian Qu, Simeon Ogunbunmi
, Mohsen Hatami
, Ronghua Xu, Yu Chen, Genshe Chen, Erik Blasch:
A Digital Twins Enabled Reputation System for Microchain-based UAV Networks. CloudNet 2023: 428-432 - [c99]Nihal Poredi, Yu Chen, Xiaohua Li, Erik Blasch:
Enhance Public Safety Surveillance in Smart Cities by Fusing Optical and Thermal Cameras. FUSION 2023: 1-7 - [c98]Qian Qu
, Han Sun
, Yu Chen
:
Poster Abstract: Light-Weight Real-Time Senior Safety Monitoring using Digital Twins. IoTDI 2023: 450-451 - [c97]Qian Qu, Ronghua Xu, Han Sun, Yu Chen, Sumantra Sarkar, Indrajit Ray:
A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse. MetaCom 2023: 86-93 - [c96]Simeon Ogunbunmi
, Mohsen Hatami
, Ronghua Xu, Yu Chen, Erik Blasch, Erika Ardiles-Cruz, Alexander J. Aved, Genshe Chen:
A Lightweight Reputation System for UAV Networks. SmartSP 2023: 114-129 - [i37]Kelsey Nelson, Javad Mohammadi, Yu Chen, Erik Blasch, Alex Aved, David Ferris, Erika Ardiles-Cruz, Philip Morrone:
Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet. CoRR abs/2310.17069 (2023) - 2022
- [j38]Ning Chen, Yu Chen
:
Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service. Future Internet 14(2): 54 (2022) - [j37]Deeraj Nagothu
, Ronghua Xu
, Yu Chen
, Erik Blasch
, Alexander J. Aved:
Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach. Future Internet 14(5): 125 (2022) - [j36]Ronghua Xu
, Yu Chen
, Genshe Chen
, Erik Blasch
:
SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network. Future Internet 14(12): 354 (2022) - [j35]Deeraj Nagothu
, Ronghua Xu
, Yu Chen
, Erik Blasch
, Alexander J. Aved
:
DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication. IT Prof. 24(5): 46-52 (2022) - [j34]Yuanyi Sun, Sencun Zhu, Yu Chen:
ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings. Proc. Priv. Enhancing Technol. 2022(3): 630-649 (2022) - [j33]Ronghua Xu
, Yu Chen
:
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2677-2688 (2022) - [c95]Ronghua Xu, Yu Chen:
Fairledger: a Fair Proof-of-Sequential-Work based Lightweight Distributed Ledger for IoT Networks. Blockchain 2022: 348-355 - [c94]Xiaohua Li, Lhamo Dorje, Yezhan Wang, Yu Chen, Erika Ardiles-Cruz:
High-Resolution Imaging Satellite Constellation. DDDAS 2022: 95-102 - [c93]Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch:
A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. ICCCN 2022: 1-7 - [c92]Han Sun, Yu Chen:
Real-Time Elderly Monitoring for Senior Safety by Lightweight Human Action Recognition. ISMICT 2022: 1-6 - [c91]Nihal Poredi, Deeraj Nagothu, Yu Chen, Xiaohua Li, Alexander J. Aved, Erika Ardiles-Cruz, Erik Blasch:
Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication. MMSP 2022: 1-6 - [i36]Han Sun, Yu Chen:
Real-Time Elderly Monitoring for Senior Safety by Lightweight Human Action Recognition. CoRR abs/2207.10519 (2022) - [i35]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication. CoRR abs/2207.13070 (2022) - [i34]Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch:
A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems. CoRR abs/2208.01466 (2022) - 2021
- [j32]Ronghua Xu
, Deeraj Nagothu, Yu Chen
:
Decentralized Video Input Authentication as an Edge Service for Smart Cities. IEEE Consumer Electron. Mag. 10(6): 76-82 (2021) - [j31]Alem Fitwi
, Yu Chen
, Han Sun, Robert Harrod:
Estimating Interpersonal Distance and Crowd Density with a Single-Edge Camera. Comput. 10(11): 143 (2021) - [j30]Ronghua Xu
, Deeraj Nagothu, Yu Chen
:
EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT Networks. Future Internet 13(10): 248 (2021) - [j29]Qian Qu, Ronghua Xu
, Yu Chen
, Erik Blasch
, Alexander J. Aved:
Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT). Future Internet 13(11): 291 (2021) - [j28]Seyed Yahya Nikouei
, Yu Chen
, Alex J. Aved
, Erik Blasch
:
I-ViSE: Interactive Video Surveillance as an Edge Service Using Unsupervised Feature Queries. IEEE Internet Things J. 8(21): 16181-16190 (2021) - [j27]Deeraj Nagothu, Yu Chen, Alexander J. Aved, Erik Blasch:
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. EAI Endorsed Trans. Security Safety 7(24): e4 (2021) - [j26]Xiaohua Li
, Yu Chen
:
Lightweight 2D Imaging for Integrated Imaging and Communication Applications. IEEE Signal Process. Lett. 28: 528-532 (2021) - [j25]Seyed Yahya Nikouei
, Yu Chen
, Sejun Song, Baek-Young Choi
, Timothy R. Faughnan:
Toward Intelligent Surveillance as an Edge Network Service (iSENSE) Using Lightweight Detection and Tracking Algorithms. IEEE Trans. Serv. Comput. 14(6): 1624-1637 (2021) - [c90]Khalid J. Almalki
, Muhammad Mohzary
, Baek-Young Choi
, Sejun Song, Yu Chen:
Crowd Safety Sensing (CroSS) for the Post Pandemic Era. GLOBECOM (Workshops) 2021: 1-6 - [c89]Alem Fitwi, Yu Chen:
Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain. ICCCN 2021: 1-8 - [c88]Ronghua Xu, Yu Chen:
Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces. ICCCN 2021: 1-8 - [c87]Khalid J. Almalki
, Baek-Young Choi
, Yu Chen, Sejun Song:
Characterizing Scattered Occlusions for Effective Dense-Mode Crowd Counting. ICCVW 2021: 3833-3842 - [c86]Khalid J. Almalki
, Muhammad Mohzary
, Baek-Young Choi
, Sejun Song, Yu Chen:
Mosaic: Modeling Safety Index in Crowd by Detecting Face Masks against COVID-19 and Beyond. ISC2 2021: 1-7 - [c85]Mohd Khan, Yu Chen:
A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks. ISPA/BDCloud/SocialCom/SustainCom 2021: 1771-1776 - [c84]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
DeFake: Decentralized ENF-Consensus Based DeepFake Detection in Video Conferencing. MMSP 2021: 1-6 - [c83]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus. SenSys 2021: 505-510 - [i33]Ronghua Xu, Yu Chen:
Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces. CoRR abs/2104.05583 (2021) - [i32]Alem Fitwi, Yu Chen:
Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain. CoRR abs/2104.05617 (2021) - 2020
- [j24]Seungmin Rho, Yu Chen:
Wireless multimedia surveillance networks. Multim. Tools Appl. 79(23-24): 15791 (2020) - [j23]Alem Fitwi, Meng Yuan, Seyed Yahya Nikouei, Yu Chen:
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge. EAI Endorsed Trans. Security Safety 7(23): e3 (2020) - [c82]Alem Fitwi, Yu Chen, Sencun Zhu:
PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service. CIC 2020: 125-134 - [c81]Han Sun, Yu Chen, Alexander J. Aved, Erik Blasch:
Collaborative Multi-Object Tracking as an Edge Service using Transfer Learning. HPCC/DSS/SmartCity 2020: 1112-1119 - [c80]Alem Fitwi, Yu Chen:
Privacy-Preserving Selective Video Surveillance. ICCCN 2020: 1-10 - [c79]Meng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen, Yunxi Dong:
Minor Privacy Protection Through Real-time Video Processing at the Edge. ICCCN 2020: 1-6 - [c78]Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
An Experimental Study on Microservices based Edge Computing Platforms. INFOCOM Workshops 2020: 836-841 - [c77]Ronghua Xu, Zhe Zhai, Yu Chen, J. Koji Lum:
BIT: A Blockchain Integrated Time Banking System for Community Exchange Economy. ISC2 2020: 1-8 - [c76]Yuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen:
iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. WISEC 2020: 195-206 - [i31]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch:
I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries. CoRR abs/2003.04169 (2020) - [i30]Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
An Experimental Study on Microservices based Edge Computing Platforms. CoRR abs/2004.02372 (2020) - [i29]Joseph St. Cyr, Joshua Vanderpool, Yu Chen, Xiaohua Li:
HODET: Hybrid Object DEtection and Tracking using mmWave Radar and Visual Sensors. CoRR abs/2004.06861 (2020) - [i28]Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved, Genshe Chen, Dan Shen:
Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems. CoRR abs/2004.10674 (2020) - [i27]Meng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen, Yunxi Dong:
Minor Privacy Protection Through Real-time Video Processing at the Edge. CoRR abs/2005.01178 (2020) - [i26]Michael Rosenberg, John Henry Burns, Deeraj Nagothu, Yu Chen:
Enabling Continuous Operations for UAVs with an Autonomous Service Network Infrastructure. CoRR abs/2005.02496 (2020)
2010 – 2019
- 2019
- [j22]Seungmin Rho, Yu Chen:
Social Internet of Things: Applications, architectures and protocols. Future Gener. Comput. Syst. 92: 959-960 (2019) - [j21]Deeraj Nagothu, Yu Chen
, Erik Blasch
, Alexander J. Aved
, Sencun Zhu:
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors 19(11): 2424 (2019) - [c75]Alem Fitwi, Yu Chen, Sencun Zhu:
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge. Blockchain 2019: 552-555 - [c74]Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alexander J. Aved
:
BlendMAS: A Blockchain-Enabled Decentralized Microservices Architecture for Smart Public Safety. Blockchain 2019: 564-571 - [c73]Seyed Yahya Nikouei, Yu Chen, Sejun Song, Timothy R. Faughnan:
Kerman: A Hybrid Lightweight Tracking Algorithm to Enable Smart Surveillance as an Edge Service. CCNC 2019: 1-6 - [c72]Xuheng Lin, Ronghua Xu, Yu Chen, J. Koji Lum:
A Blockchain-Enabled Decentralized Time Banking for a New Social Value System. CNS 2019: 1-5 - [c71]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved
, Erik Blasch, Timothy R. Faughnan:
I-SAFE: instant suspicious activity identification at the edge using fuzzy decision making. SEC 2019: 101-112 - [c70]Ronghua Xu, Gowri Sankar Ramachandran
, Yu Chen, Bhaskar Krishnamachari:
BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces. ISC2 2019: 14-17 - [c69]Alem Fitwi, Yu Chen, Sencun Zhu:
No Peeking through My Windows: Conserving Privacy in Personal Drones. ISC2 2019: 199-204 - [c68]Zekun Yang, Yu Chen, Ning Zhou, Shiqiong Tong:
PReS: Power Peak Reduction by Real-time Scheduling for Urban Railway Transit. StICT 2019: 1-6 - [c67]Erik Blasch, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
A Study of Lightweight DDDAS Architecture for Real-Time Public Safety Applications Through Hybrid Simulation. WSC 2019: 762-773 - [c66]Alem Fitwi, Deeraj Nagothu, Yu Chen, Erik Blasch:
A Distributed Agent-Based Framework for a Constellation of Drones in a Military Operation. WSC 2019: 2548-2559 - [p1]Seyed Yahya Nikouei, Ronghua Xu, Yu Chen:
Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking. Fog and Edge Computing 2019: 319-346 - [i25]Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alex Aved:
BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety. CoRR abs/1902.10567 (2019) - [i24]Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch, Sencun Zhu:
A Study on Smart Online Frame Forging Attacks against Video Surveillance System. CoRR abs/1903.03473 (2019) - [i23]Seyed Yahya Nikouei, Ronghua Xu, Yu Chen, Alex Aved, Erik Blasch:
Decentralized Smart Surveillance through Microservices Platform. CoRR abs/1903.04563 (2019) - [i22]Alem Fitwi, Yu Chen, Sencun Zhu:
No Peeking through My Windows: Conserving Privacy in Personal Drones. CoRR abs/1908.09935 (2019) - [i21]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch, Timothy R. Faughnan:
I-SAFE: Instant Suspicious Activity identiFication at the Edge using Fuzzy Decision Making. CoRR abs/1909.05776 (2019) - [i20]Alem Fitwi, Yu Chen, Sencun Zhu:
A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge. CoRR abs/1909.09845 (2019) - [i19]Ronghua Xu, Gowri Sankar Ramachandran, Yu Chen, Bhaskar Krishnamachari:
BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces. CoRR abs/1909.10888 (2019) - [i18]Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:
Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT. CoRR abs/1909.10948 (2019) - [i17]Erik Blasch, Ronghua Xu, Yu Chen, Genshe Chen, Dan Shen:
Blockchain Methods for Trusted Avionics Systems. CoRR abs/1910.10638 (2019) - [i16]Ronghua Xu, Yu Chen:
Microchain: a Light Hierarchical Consensus Protocol for IoT System. CoRR abs/1912.10357 (2019) - 2018
- [j20]Ronghua Xu, Yu Chen
, Erik Blasch
, Genshe Chen:
BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Comput. 7(3): 39 (2018) - [j19]Seungmin Rho, Yu Chen:
Social Internet of Things: Applications, architectures and protocols. Future Gener. Comput. Syst. 82: 667-668 (2018) - [j18]Tianchong Gao
, Feng Li, Yu Chen, Xukai Zou:
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model. IEEE Trans. Comput. Soc. Syst. 5(4): 1009-1020 (2018) - [c65]Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi
, Timothy R. Faughnan:
Smart Surveillance as an Edge Network Service: From Harr-Cascade, SVM to a Lightweight CNN. CIC 2018: 256-265 - [c64]Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi
, Timothy R. Faughnan:
Real-Time Human Detection as an Edge Service Enabled by a Lightweight CNN. EDGE 2018: 125-129 - [c63]Seyed Yahya Nikouei, Yu Chen, Timothy R. Faughnan:
Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking. SEC 2018: 336-337 - [c62]Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Aleksey Polunchenko, Sejun Song, Chengbin Deng, Timothy R. Faughnan:
Real-Time Human Objects Tracking for Smart Surveillance at the Edge. ICC 2018: 1-6 - [c61]Zekun Yang, Ning Chen, Yu Chen, Ning Zhou:
A Novel PMU Fog Based Early Anomaly Detection for an Efficient Wide Area PMU Network. ICFEC 2018: 1-10 - [c60]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models. ISC2 2018: 1-9 - [c59]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios. ISC2 2018: 1-8 - [c58]Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. ISC2 2018: 1-4 - [c57]Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander J. Aved
, Erik Blasch:
Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. ISC2 2018: 1-8 - [c56]Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:
BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs. iThings/GreenCom/CPSCom/SmartData 2018: 1027-1034 - [c55]Ronghua Xu, Xuheng Lin, Qi Dong, Yu Chen:
Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System. MobiQuitous 2018: 449-453 - [c54]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng, Roger Zimmermann:
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. SecureComm (1) 2018: 297-317 - [i15]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. CoRR abs/1804.09266 (2018) - [i14]Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:
BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. CoRR abs/1804.09267 (2018) - [i13]Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan:
Real-Time Human Detection as an Edge Service Enabled by a Lightweight CNN. CoRR abs/1805.00330 (2018) - [i12]Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan:
Intelligent Surveillance as an Edge Network Service: from Harr-Cascade, SVM to a Lightweight CNN. CoRR abs/1805.00331 (2018) - [i11]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models. CoRR abs/1805.00428 (2018) - [i10]Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:
A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs). CoRR abs/1805.00825 (2018) - [i9]Zekun Yang, Ning Chen, Yu Chen, Ning Zhou:
A Novel PMU Fog based Early Anomaly Detection for an Efficient Wide Area PMU Network. CoRR abs/1805.03573 (2018) - [i8]Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander J. Aved, Erik Blasch:
Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. CoRR abs/1807.06179 (2018) - [i7]Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen:
A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. CoRR abs/1807.07487 (2018) - [i6]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch:
EIQIS: Toward an Event-Oriented Indexable and Queryable Intelligent Surveillance System. CoRR abs/1807.11329 (2018) - [i5]Seyed Yahya Nikouei, Yu Chen, Sejun Song, Timothy R. Faughnan:
Kerman: A Hybrid Lightweight Tracking Algorithm to Enable Smart Surveillance as an Edge Service. CoRR abs/1808.02134 (2018) - [i4]Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng:
A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study. CoRR abs/1808.09858 (2018) - [i3]Ronghua Xu, Xuheng Lin, Qi Dong, Yu Chen:
Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System. CoRR abs/1809.01031 (2018) - [i2]Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen:
An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness. CoRR abs/1810.01291 (2018) - 2017
- [j17]Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. EAI Endorsed Trans. Security Safety 4(12): e3 (2017) - [j16]Ryan Wu, Bingwei Liu, Yu Chen, Erik Blasch, Haibin Ling, Genshe Chen:
A Container-Based Elastic Cloud Architecture for Pseudo Real-Time Exploitation of Wide Area Motion Imagery (WAMI) Stream. J. Signal Process. Syst. 88(2): 219-231 (2017) - [c53]Nawras Alkassab, Chin-Tser Huang, Yu Chen, Baek-Young Choi
, Sejun Song:
Benefits and schemes of prefetching from cloud to fog networks. CloudNet 2017: 54-58 - [c52]Haymanot Gebre-Amlak, Seoungjin Lee, Abdoh M. A. Jabbari, Yu Chen, Baek-Young Choi
, Chin-Tser Huang, Sejun Song:
MIST: Mobility-inspired software-defined fog system. ICCE 2017: 94-99 - [c51]Ning Chen, Zekun Yang, Yu Chen, Aleksey Polunchenko:
Online anomalous vehicle detection at the edge using multidimensional SSA. INFOCOM Workshops 2017: 851-856 - [c50]Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. MMM-ACNS 2017: 247-259 - [c49]Ning Chen, Yu Chen, Erik Blasch, Haibin Ling, Yang You, Xinyue Ye
:
Enabling Smart Urban Surveillance at The Edge. SmartCloud 2017: 109-119 - [c48]Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Preserving Local Differential Privacy in Online Social Networks. WASA 2017: 393-405 - [i1]Monireh Dabaghchian, Amir Alipour-Fanid, Songsong Liu, Kai Zeng, Xiaohua Li, Yu Chen:
Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios. CoRR abs/1712.09315 (2017) - 2016
- [j15]Seungmin Rho, Yu Chen:
Human-centric information technology and applications towards web 3.0. New Rev. Hypermedia Multim. 22(3): 167-168 (2016) - [c47]Ning Chen, Yu Chen, Yang You, Haibin Ling, Pengpeng Liang, Roger Zimmermann
:
Dynamic Urban Surveillance Video Stream Processing Using Fog Computing. BigMM 2016: 105-112 - [c46]Ning Chen, Yu Chen, Sejun Song, Chin-Tser Huang, Xinyue Ye
:
Poster Abstract: Smart Urban Surveillance Using Fog Computing. SEC 2016: 95-96 - [c45]Monireh Dabaghchian
, Songsong Liu, Amir Alipour-Fanid, Kai Zeng, Xiaohua Li, Yu Chen:
Intelligence Measure of Cognitive Radios with Learning Capabilities. GLOBECOM 2016: 1-6 - [c44]Pei Huang, Borui Li, Linke Guo, Zhanpeng Jin, Yu Chen:
A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems. GLOBECOM 2016: 1-6 - [c43]Xiaohua Li, Yu Chen, Kai Zeng:
Integration of machine learning and human learning for training optimization in robust linear regression. ICASSP 2016: 2613-2617 - [c42]Bingwei Liu, Yinan Lin, Yu Chen:
Quantitative workload analysis and prediction using Google cluster traces. INFOCOM Workshops 2016: 935-940 - 2015
- [j14]Zhanpeng Jin, Yu Chen:
Telemedicine in the Cloud Era: Prospects and Challenges. IEEE Pervasive Comput. 14(1): 54-61 (2015) - [j13]Sang-Soo Yeo
, Yu Chen, Cho-Li Wang:
Cloud, grid, P2P and internet computing: Recent trends and future directions. Peer-to-Peer Netw. Appl. 8(5): 835-837 (2015) - [c41]Ryan Wu, Bingwei Liu, Yu Chen, Erik Blasch, Haibin Ling, Genshe Chen:
Pseudo-real-time Wide Area Motion Imagery (WAMI) processing for dynamic feature detection. FUSION 2015: 1962-1969 - [c40]Zekun Yang, Ning Zhou, Aleksey Polunchenko, Yu Chen:
Singular Spectrum Analysis Based Quick Online Detection of Disturbance Start Time in Power Grid. GLOBECOM 2015: 1-6 - [c39]Douglas H. Summerville, Kenneth M. Zach, Yu Chen:
Ultra-lightweight deep packet anomaly detection for Internet of Things devices. IPCCC 2015: 1-8 - [r2]Bingwei Liu, Yu Chen:
Auditing for Data Integrity and Reliability in Cloud Storage. Handbook on Data Centers 2015: 535-559 - 2014
- [j12]Andrey M. Dolgikh, Zachary Birnbaum, Bingwei Liu, Yu Chen, Victor A. Skormin:
Cloud security auditing based on behavioural modelling. Int. J. Bus. Process. Integr. Manag. 7(2): 137-152 (2014) - [j11]Aaron Carpenter, Yu Chen:
Hardware Security in the Dark. Int. J. Softw. Informatics 8(2): 193-205 (2014) - [j10]Xiaoliang Wang
, Qiong Gui, Bingwei Liu, Zhanpeng Jin, Yu Chen:
Enabling Smart Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring. IEEE J. Biomed. Health Informatics 18(3): 739-745 (2014) - [c38]Ryan Wu, Yu Chen, Erik Blasch, Bingwei Liu, Genshe Chen, Dan Shen:
A container-based elastic cloud architecture for real-time full-motion video (FMV) target tracking. AIPR 2014: 1-8 - [c37]John Hubbard, Ken Weimer, Yu Chen:
A study of SSL Proxy attacks on Android and iOS mobile applications. CCNC 2014: 86-91 - [c36]Qi Dong, Yu Chen, Shahrzad Towfighian
:
MEGA: An energy aware algorithm for self-powered wireless sensor networks in sustainable smart infrastructure. GLOBECOM Workshops 2014: 1174-1179 - 2013
- [j9]Hao Chen, Thomas Gaska, Yu Chen, Douglas H. Summerville:
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection. Comput. Electr. Eng. 39(2): 295-308 (2013) - [j8]Jun Feng, Yu Chen:
A fair non-repudiation framework for data integrity in cloud storage services. Int. J. Cloud Comput. 2(1): 20-47 (2013) - [c35]Bingwei Liu, Erik Blasch, Yu Chen, Dan Shen, Genshe Chen:
Scalable sentiment classification for Big Data analysis using Naïve Bayes Classifier. IEEE BigData 2013: 99-104 - [c34]Rodolfo I. Ledesma Goyzueta
, Yu Chen:
A deterministic loss model based analysis of CUBIC. ICNC 2013: 944-949 - [c33]Rohan B. Golatkar, Yu Chen, Wei-Shinn Ku
:
LAVI: A Location Aware Virtual Infrastructure for VANETs. ICCVE 2013: 1-6 - [c32]Qiong Gui, Xiaoliang Wang
, Bingwei Liu, Zhanpeng Jin, Yu Chen:
Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud. ICHI 2013: 541-544 - [c31]Hao Chen, Yu Chen, Douglas H. Summerville, Zhou Su:
An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection. INFOCOM 2013: 1780-1787 - [c30]Andrey M. Dolgikh, Zachary Birnbaum, Yu Chen, Victor A. Skormin:
Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments. MDM (2) 2013: 177-181 - [c29]Zachary Birnbaum, Bingwei Liu, Andrey M. Dolgikh, Yu Chen, Victor A. Skormin:
Cloud Security Auditing Based on Behavioral Modeling. SERVICES 2013: 268-273 - 2012
- [c28]Jun Feng, Yu Chen, Douglas H. Summerville, Zhou Su:
An extension of RDP code with parallel decoding procedure. CCNC 2012: 154-158 - [c27]Brendan Kerrigan, Yu Chen:
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts. MMM-ACNS 2012: 286-298 - 2011
- [j7]Hao Chen, Yu Chen, Douglas H. Summerville:
A Survey on the Application of FPGAs for Network Infrastructure Security. IEEE Commun. Surv. Tutorials 13(4): 541-561 (2011) - [c26]Jun Feng, Yu Chen, Douglas H. Summerville, Wei-Shinn Ku
, Zhou Su:
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. CCNC 2011: 521-522 - [c25]Yu Chen, Chih-Jye Wang, Wei-Shinn Ku
, Zhou Su:
A location aware virtual infrastructure for VANETs. CCNC 2011: 820-821 - [c24]Jun Feng, Yu Chen, Douglas H. Summerville:
A fair multi-party non-repudiation scheme for storage clouds. CTS 2011: 457-465 - [c23]Zhou Su, Pinyi Ren, Yu Chen:
Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks. GLOBECOM 2011: 1-5 - [c22]Minda Xiang, Yu Chen, Wei-Shinn Ku
, Zhou Su:
Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad Hoc Networks. GLOBECOM 2011: 1-6 - [c21]Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, Shiqiong Tong:
A self-powered adaptive wireless sensor network for wastewater treatment plants. PerCom Workshops 2011: 356-359 - 2010
- [c20]Yu Chen, Wei-Shinn Ku
, Kazuya Sakai, Christopher DeCruze:
A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages. CCNC 2010: 1-5 - [c19]Jun Feng, Yu Chen, Pu Liu:
Bridging the Missing Link of Cloud Data Storage Security in AWS. CCNC 2010: 1-2 - [c18]Hao Chen, Yu Chen:
A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling. CollaborateCom 2010: 1-10 - [c17]Jun Feng, Yu Chen, Wei-Shinn Ku
, Zhou Su:
D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-Of-Order Keystream Generation. ICC 2010: 1-6 - [c16]Jun Feng, Yu Chen, Wei-Shinn Ku
, Pu Liu:
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms. ICPP Workshops 2010: 251-258 - [c15]Paolo Gasti, Yu Chen:
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices. PDP 2010: 624-630
2000 – 2009
- 2009
- [j6]Hongbing Hu, Yu Chen, Wei-Shinn Ku
, Zhou Su, Chung-Han Chen:
Weighted trust evaluation-based malicious node detection for wireless sensor networks. Int. J. Inf. Comput. Secur. 3(2): 132-149 (2009) - [j5]Wei-Shinn Ku
, Yu Chen, Roger Zimmermann
:
Privacy Protected Spatial Query Processing for Advanced Location Based Services. Wirel. Pers. Commun. 51(1): 53-65 (2009) - [c14]Yu Chen, Wei-Shinn Ku
:
Self-Encryption Scheme for Data Security in Mobile Devices. CCNC 2009: 1-5 - [c13]Scott Craver, Yu Chen, Hao Chen, Jun Yu, Idris M. Atakli:
BLINK: Securing Information to the Last Connection. CCNC 2009: 1-2 - [c12]Hao Chen, Douglas H. Summerville, Yu Chen:
Two-stage decomposition of SNORT rules towards efficient hardware implementation. DRCN 2009: 359-366 - [c11]Idris M. Atakli, Yu Chen, Qing Wu, Scott Craver:
BLINK: pixel-domain encryption for secure document management. MM&Sec 2009: 171-176 - [r1]Yu Chen, Wei-Shinn Ku:
Distributed Data Aggregation Technology for Real-Time DDoS Attacks Detection. Encyclopedia of Data Warehousing and Mining 2009: 701-708 - 2008
- [c10]Hao Chen, Yu Chen:
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. NAS 2008: 365-372 - [c9]Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su:
Malicious node detection in wireless sensor networks using weighted trust evaluation. SpringSim 2008: 836-843 - 2007
- [j4]Yu Chen, Kai Hwang, Wei-Shinn Ku
:
Collaborative Detection of DDoS Attacks over Multiple Network Domains. IEEE Trans. Parallel Distributed Syst. 18(12): 1649-1662 (2007) - [c8]Yu Chen, Kai Hwang:
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks. ICC 2007: 1203-1210 - [c7]Yu Chen, Kai Hwang, Wei-Shinn Ku:
Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed. DETER 2007 - 2006
- [j3]Kai Hwang, Min Cai, Yu-Kwong Kwok, Shanshan Song, Yu Chen, Ying Chen:
DHT-based security infrastructure for trusted internet and grid computing. Int. J. Crit. Infrastructures 2(4): 412-433 (2006) - [j2]Yu Chen, Kai Hwang:
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. J. Parallel Distributed Comput. 66(9): 1137-1151 (2006) - [c6]Yu Chen, Kai Hwang:
Collaborative Change Detection of DDoS Attacks on Community and ISP Networks. CTS 2006: 401-410 - 2005
- [j1]Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen:
Collaborative Internet Worm Containment. IEEE Secur. Priv. 3(3): 25-33 (2005) - [c5]Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou:
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. International Conference on Computational Science (3) 2005: 187-195 - [c4]Hua Wang, Jianyu Lou, Yu Chen, Ya-Min Sun, Xiaojun Shen:
Achieving maximum throughput with a minimum number of label switched paths in MPLS networks. ICCCN 2005: 187-192 - [c3]Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, Kai Hwang:
HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks. ICCNMC 2005: 423-432 - [c2]Yu Chen, Yu-Kwong Kwok, Kai Hwang:
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. ICDCS Workshops 2005: 123-129 - [c1]Yu Chen, Kai Hwang, Yu-Kwong Kwok:
Filtering of Shrew DDoS Attacks in Frequency Domain. LCN 2005: 786-793
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-22 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint