Liangyin Chen

ORCID: 0000-0001-6166-890X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optical Wireless Communication Technologies
  • Indoor and Outdoor Localization Technologies
  • Semiconductor Lasers and Optical Devices
  • Mobile Ad Hoc Networks
  • Speech and Audio Processing
  • Network Security and Intrusion Detection
  • Photonic and Optical Devices
  • Anomaly Detection Techniques and Applications
  • Advanced Photonic Communication Systems
  • IoT and Edge/Fog Computing
  • Retinal Imaging and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Distributed and Parallel Computing Systems
  • Energy Efficient Wireless Sensor Networks
  • Cerebrovascular and Carotid Artery Diseases
  • Service-Oriented Architecture and Web Services
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Intracranial Aneurysms: Treatment and Complications
  • Wireless Communication Security Techniques
  • Advanced Wireless Communication Technologies
  • Corporate Finance and Governance
  • Wireless Signal Modulation Classification
  • Advanced Authentication Protocols Security
  • Photonic Crystals and Applications

Chengdu University
2007-2025

Sichuan University
2015-2025

Shanghai University of International Business and Economics
2022-2025

Tsinghua Sichuan Energy Internet Research Institute
2022-2023

National Chung Hsing University
2021-2022

Guizhou University
2021-2022

Pfizer (United Kingdom)
2021

Shanghai University of Finance and Economics
2020

Sichuan Academy Of Social Sciences
2020

Chang Gung University
2013

In recent years, microblog systems such as Twitter and Sina Weibo have averaged multimillion active users. On the other hand, system has become a new means of rumor-spreading platform. this paper, we investigate machine-learning-based rumor identification approaches. We observed that feature design selection stronger impact on accuracy than machine-learning algorithms. Meanwhile, publishers' behavior may diverge from normal users', post different responses post. However, mass posts not been...

10.1109/tcss.2016.2517458 article EN IEEE Transactions on Computational Social Systems 2015-09-01

Trusted third parties (TTPs) are frequently used for serving as an authority to issue and verify transactions in applications. Although the TTP-based paradigm provides customers with convenience, it causes a whole set of inevitable problems such security threats, privacy vulnerabilities, censorship. The is not suitable all modern networks, e.g., 5G beyond which been evolving support ubiquitous, decentralized, autonomous services. Driven by vision blockchain technologies, there has shift...

10.1109/comst.2021.3115797 article EN IEEE Communications Surveys & Tutorials 2021-01-01

Abstract Background Exposure to environmental endocrine‐disrupting chemicals ( EDC s) is associated with allergy, chronic inflammation, and immunodeficiency. Phthalates, the common s used in plastic industry, may act as adjuvants disrupt immune system enhance allergy. Plasmacytoid DC pDC are predominant cells secreting type I interferon IFN ) against infection professional antigen‐presenting regulating adaptive immunity. However, effects of phthalates on function unknown. Methods Circulating...

10.1111/all.12162 article EN Allergy 2013-06-05

An intracranial aneurysm is a cerebrovascular disorder that can result in various diseases. Clinically, diagnosis of an utilizes digital subtraction angiography (DSA) modality as gold standard. The existing automatic computer-aided (CAD) research studies with DSA were based on classical image processing (DIP) methods. However, the feature extraction methods badly hampered by complex vascular distribution, and sliding window time-consuming during searching extraction. Therefore, developing...

10.1186/s12938-019-0726-2 article EN cc-by BioMedical Engineering OnLine 2019-11-14

Limited biomarkers have been identified as prognostic predictors for stage III colon cancer. To combat this shortfall, we developed a computer-aided approach which combing convolutional neural network with machine classifier to predict the prognosis of cancer from routinely haematoxylin and eosin (H&E) stained tissue slides. We trained model by using 101 cancers West China Hospital (WCH). The predictive effectivity was validated 67 WCH 47 Cancer Genome Atlas Colon Adenocarcinoma database....

10.1038/s41598-020-67178-0 article EN cc-by Scientific Reports 2020-06-25

Advanced metering infrastructure (AMI) is a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication key agreement (AKA) protocol needed AMI systems to ensure confidentiality integrity communication data. Since devices are connected open network generally deployed outdoors with limited computation, communication, storage, designing suitable AKA challenging task. Researchers still looking good ways make SG secure efficient...

10.1109/tii.2022.3191319 article EN IEEE Transactions on Industrial Informatics 2022-08-05

Active speaker detection is a challenging task in audiovisual scenarios, with the aim to detect who speaking one or more scenarios. This has received considerable attention because it crucial many applications. Existing studies have attempted improve performance by inputting multiple candidate information and designing complex models. Although these methods achieved excellent performance, their high memory computational power consumption render application resource-limited scenarios...

10.1109/cvpr52729.2023.02196 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

In this paper, we examine the impact of eponymy (i.e. naming a firm after its owner) on innovation activity firms. We report that eponymous firms generally have lower level innovation, specifically, fewer patents. After classifying total patents into invention patents, utility model and design find reduced levels are predominantly evident in decreased numbers Our findings robust employing alternative measures propensity score matching, regression methods. difference-in-differences to address...

10.1080/00036846.2025.2449855 article EN Applied Economics 2025-01-07

10.1109/icassp49660.2025.10888791 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Internet of Things (IoT) user authentication protocols enable secure and session key negotiation between users IoT devices via an intermediate server, allowing to access sensor data or control remotely. However, the existing schemes often assume that servers (registration center servers) are fully trusted, overlooking potential risk insider attackers. Moreover, most lack critical security properties, such as resistance ephemeral secret leakage attacks offline password guessing attacks, they...

10.3390/s25072013 article EN cc-by Sensors 2025-03-23

As nodes' characteristics that they are self-governed and resource-limited, wireless sensor networks (WSNs) face potential threats due to various attacks, among which the most threatening attack is wormhole attack. Wormhole severely imperils WSNs difficult be detected, for it causes incorrect routing by private tunnels damages in terms of data leakage, dropping, delayed delivery. However, existing solutions based on additional hardware, incur high communication overhead, or fail give...

10.1109/access.2019.2894637 article EN cc-by-nc-nd IEEE Access 2019-01-01

Due to the great success of Vision Transformer (ViT) in image classification tasks, many pure architectures for human action recognition have been proposed. However, very few works attempted use conduct bimodal recognition, i.e., both skeleton and RGB modalities recognition. As proved previous works, modality are complementary each other tasks. How a Transformer-based framework is challenge. In this paper, we propose RGBSformer, novel two-stream using modalities. Using only videos, can...

10.3390/app13042058 article EN cc-by Applied Sciences 2023-02-05

In this paper, we propose and demonstrate a secure private non-orthogonal multiple access (NOMA) based visible light communication (VLC) system.Orthogonal frequency division multiplexing (OFDM) modulation is applied in the system two-level chaotic encryption scheme further implemented, which can guarantee both security of legitimate users against eavesdroppers privacy among all users.An experimental demonstration with two one eavesdropper successfully verifies feasibility proposed NOMA VLC...

10.1364/oe.26.034031 article EN cc-by Optics Express 2018-12-14

Due to sulfur agglomeration and drastic volume expansion during charging, a significant challenge for lithium–sulfur battery applications is achieve favorable energy densities while realizing substantial loading.

10.1039/c9ta14240a article EN Journal of Materials Chemistry A 2020-01-01

Recently, the use of wireless channel state information (CSI) to generate encryption keys in physical layer has gained significant attention from researchers. Unlike classical cryptography, this approach relies on variability channel, reciprocity, and spatial decorrelation ensure security, making it more lightweight providing strong randomness. This article proposes a key generation scheme for LAN MIMO systems based feature fusion autoencoder (FFAEncoder) address issue high disagreement rate...

10.1109/jiot.2023.3288641 article EN IEEE Internet of Things Journal 2023-06-24

Reliable and robust airport flight ground service resources collaborative scheduling has emerged as an issue of major concern at congested airports, which great significance on quality operation efficiency. Due to the uncertainty process multiple vehicles in operations, combination simulation optimization (sim-opt) techniques been proven be effective means solve problem. However, existing models still have limitations reliability feasible solutions robustness evaluations. In this work, we...

10.1016/j.neucom.2023.127212 article EN cc-by Neurocomputing 2024-01-02

Angle-based localization of a source at unique coordinates in the three-dimensional (3-D) space utilizes traditionally two-dimensional (2-D) angle arrival (AOA) measurements from planar arrays. This paper investigates positioning performance and develops an optimal solution for 3-D using one-dimensional (1-D) (SA) that has appeal involving linear arrays only. The by SA is less understood algorithms literature are suboptimal have restrictions on altitudes orientations array receivers....

10.1109/tsp.2022.3163889 article EN IEEE Transactions on Signal Processing 2022-01-01

In the Industrial Internet, computing- and power-limited mobile devices (MDs) in production process can hardly support computation-intensive or time-sensitive applications. As a new computing paradigm, edge (MEC) almost meet requirements of latency calculation by handling tasks approximately close to MDs. However, limited battery capacity MDs causes unreliable task offloading MEC, which will increase system overhead reduce economic efficiency manufacturing actual production. To make scheme...

10.3390/s21103513 article EN cc-by Sensors 2021-05-18

Locating a device is basic element for many Internet of Things (IoT) applications. In particular, it often demands an algorithm having low complexity to limit the energy consumption and most important, sufficient robustness without knowing in near-field point localization or far-field direction arrival (DOA) estimation. This article proposes new that can achieve two purposes, with theoretical analysis validate optimal accuracy real data experiment support promising performance. The first...

10.1109/jiot.2021.3127690 article EN IEEE Internet of Things Journal 2021-11-13
Coming Soon ...