default search action
Zhiyan Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Zhiyan Chen, Qing Zhang, Guici Chen:
Fixed-Time Stabilization for a Class of Stochastic Memristive Inertial Neural Networks With Time-Varying Delays. IEEE Access 12: 40496-40507 (2024) - [j9]Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic:
Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier. Comput. Networks 250: 110576 (2024) - 2023
- [j8]Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. ACM Comput. Surv. 55(5): 105:1-105:37 (2023) - [j7]Zhiyan Chen, Omer Melih Gul, Burak Kantarci:
Practical Byzantine Fault Tolerance Based Robustness for Mobile Crowdsensing. Distributed Ledger Technol. Res. Pract. 2(2): 1-24 (2023) - [j6]Changhao Han, Hui Zhao, Zhiyan Chen, Fanggang Wang:
Sparse Neural Network for Detection and Decoding of Non-Binary Polar-Coded SCMA. IEEE Trans. Wirel. Commun. 22(7): 4475-4488 (2023) - [c17]Zhiyan Chen, Ming Tao, Xueqiang Li, Ligang He:
Service-Aware Cooperative Task Offloading and Scheduling in Multi-access Edge Computing Empowered IoT. ICA3PP (2) 2023: 327-346 - [c16]Zhiyan Chen, Xinke Tang, Zixian Wei, Lihang Liu, Zhen Chen, H. Y. Fu:
Real-Time Audio Transmission System Using NLOS UV Communication Based on Wall Reflections. ICAIT 2023: 177-181 - [i4]Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic:
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier. CoRR abs/2306.09451 (2023) - 2022
- [b1]Zhiyan Chen:
Optimizing task offloading for mobile edge cloud systems. University of Warwick, Coventry, UK, 2022 - [j5]Shenyuan Ren, Ligang He, Junyu Li, Zhiyan Chen, Peng Jiang, Chang-Tsun Li:
Contention-aware prediction for performance impact of task co-running in multicore computers. Wirel. Networks 28(3): 1293-1300 (2022) - [j4]Peng Jiang, Ligang He, Shenyuan Ren, Zhiyan Chen, Rui Mao:
vChecker: an application-level demand-based co-scheduler for improving the performance of parallel jobs in Xen. Wirel. Networks 28(3): 1313-1319 (2022) - [c15]Zhiyan Chen, Ligang He:
Allocating Resource Capacities for an Offload-enabled Mobile Edge Cloud System. BigDataService 2022: 14-21 - [c14]Zhiyan Chen, Hui Zhao, Lu Hou:
Sparse Factor Graph-Based Expanded Iterative Detection and Decoding Scheme for Uplink Polar Coded SCMA System. BMSB 2022: 1-6 - [c13]Zhiyan Chen, Burak Kantarci:
Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing. ICC 2022: 2780-2785 - [c12]Zhiyan Chen, Ligang He:
Modelling Task Offloading Mobile Edge Computing. ICCDE 2022: 15-21 - [c11]Zhiyan Chen, Ligang He:
Modelling the offload of AI Tasks in Mobile Clouds. ICUFN 2022: 266-270 - [c10]Zhiyan Chen, Ligang He:
Optimizing Offloading Strategies for Mobile Edge Cloud Systems. SmartCloud 2022: 22-31 - [i3]Zhiyan Chen, Burak Kantarci:
Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing. CoRR abs/2202.07802 (2022) - [i2]Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. CoRR abs/2204.03433 (2022) - 2021
- [j3]Zhiyan Chen, Claudio Fiandrino, Burak Kantarci:
On blockchain integration into mobile crowdsensing via smart embedded devices: A comprehensive survey. J. Syst. Archit. 115: 102011 (2021) - [c9]Zhiyan Chen, Murat Simsek, Burak Kantarci, Petar Djukic:
All Predict Wisest Decides: A Novel Ensemble Method to Detect Intrusive Traffic in IoT Networks. GLOBECOM 2021: 1-6 - [c8]Zhiyan Chen, Murat Simsek, Burak Kantarci:
Federated Learning-Based Risk-Aware Decision to Mitigate Fake Task Impacts on Crowdsensing Platforms. ICC 2021: 1-6 - [c7]Zhiyan Chen, Yusuke Matsumoto, Aiko Suge, Hiroshi Takahashi:
The Visualization of Innovation Pathway Based on Patent Data - Comparison Between Japan and America. KES-AMSTA 2021: 265-273 - [c6]Zhiyan Chen, Burak Kantarci:
Adversarial Machine Learning-Driven Fake Task Anticipation in Mobile Crowdsensing Systems. SOSE 2021: 57-63 - [i1]Zhiyan Chen, Murat Simsek, Burak Kantarci:
Federated Learning-Based Risk-Aware Decision toMitigate Fake Task Impacts on CrowdsensingPlatforms. CoRR abs/2101.01266 (2021) - 2020
- [c5]Zhiyan Chen, Murat Simsek, Burak Kantarci:
Region-Aware Bagging and Deep Learning-Based Fake Task Detection in Mobile Crowdsensing Platforms. GLOBECOM 2020: 1-7 - [c4]Zhiyan Chen, Yueqian Zhang, Murat Simsek, Burak Kantarci:
Deep Belief Network-based Fake Task Mitigation for Mobile Crowdsensing under Data Scarcity. ICC 2020: 1-7
2010 – 2019
- 2018
- [c3]Peng Jiang, Ligang He, Shenyuan Ren, Zhiyan Chen, Rui Mao:
vPlacer: A Co-scheduler for Optimizing the Performance of Parallel Jobs in Xen. ICA3PP (1) 2018: 19-33 - [c2]Shenyuan Ren, Ligang He, Junyu Li, Chao Chen, Zhuoer Gu, Zhiyan Chen:
Scheduling DAG Applications for Time Sharing Systems. ICA3PP (2) 2018: 272-286 - 2016
- [j2]Sha Liu, Shun Hu, Jian Weng, Shuhua Zhu, Zhiyan Chen:
A novel asymmetric three-party based authentication scheme in wearable devices environment. J. Netw. Comput. Appl. 60: 144-154 (2016) - 2015
- [j1]Zhiyan Chen, Xiaojie Li, Shuhua Zhu, Danlong Fu, Yihai Xing:
基于Hash结构词典的双向最大匹配分词法 (Bi-direction Maximum Matching Method Based on Hash Structural Dictionary). 计算机科学 42(Z11): 49-54 (2015) - 2010
- [c1]Xiaojin Zhu, Zhiyan Chen, Zhiyuan Gao, Xiaojun Wu:
Experimental research and verification for Coullet chaos system. ICNC 2010: 3040-3044
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint