Yijin Chen

ORCID: 0000-0002-4307-0346
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Zebrafish Biomedical Research Applications
  • Polymer composites and self-healing
  • Remote Sensing and Land Use
  • Pluripotent Stem Cells Research
  • Adversarial Robustness in Machine Learning
  • Advanced Materials and Mechanics
  • Maritime Navigation and Safety
  • Advanced Computational Techniques and Applications
  • CAR-T cell therapy research
  • Topic Modeling
  • Dielectric materials and actuators
  • Blockchain Technology Applications and Security
  • Information Retrieval and Search Behavior
  • Virus-based gene therapy research
  • CRISPR and Genetic Engineering
  • Advanced Measurement and Detection Methods
  • Spam and Phishing Detection
  • Aluminum Alloys Composites Properties
  • Health Literacy and Information Accessibility
  • Gas Sensing Nanomaterials and Sensors
  • Advanced ceramic materials synthesis
  • Natural Language Processing Techniques
  • Structural Analysis and Optimization

Zhejiang University
2023-2025

Wuhan University of Technology
2025

First Affiliated Hospital Zhejiang University
2023-2024

China University of Mining and Technology
2018-2024

Cell Technology (China)
2024

Zhejiang Lab
2023

South China Normal University
2020-2023

Jiangsu University
2023

University of Electronic Science and Technology of China
2017-2022

Bauman Moscow State Technical University
2020-2021

Internet of Vehicles (IoVs) is highly characterized by collaborative environment data sensing, computing and processing. Emerging Big Data Artificial Intelligence (AI) technologies show significant advantages efficiency for knowledge sharing among intelligent vehicles. However, it challenging to guarantee the security privacy during process. Moreover, conventional AI-based algorithms cannot work properly in distributed vehicular networks. In this paper, a hierarchical blockchain framework...

10.1109/tits.2020.3002712 article EN IEEE Transactions on Intelligent Transportation Systems 2020-06-29

In this paper, a kind of morphing skin embedded with pneumatic muscle fibers is proposed from the bionics perspective. The elastic modulus designed experimentally determined and their output force tested internal air pressure varying 0 to 0.4 MPa. experimental results show that contraction ratio using given material could reach up 26.8%. Isothermal tensile tests are conducted on fabricated skin, compared theoretical predictions based rule mixture. When strain lower than 3% in its...

10.1088/0964-1726/20/8/085033 article EN Smart Materials and Structures 2011-07-29

As a typical smart material, shape memory polymers (SMPs) have the capability of variable stiffness in response to external stimuli, such as heat, electricity, magnetism and solvents. In this research, polymer composite (SMPC) tube composed multi-layered filament wound structures is investigated. The SMPC possesses considerable flexibility under high temperature rigidity low temperature. Significant changes effective engineering modulus can be achieved through regulating environment Based on...

10.1088/0964-1726/21/9/094021 article EN Smart Materials and Structures 2012-08-31

Patients with relapsed or refractory multiple myeloma (R/R-MM) are more susceptible to develop severe coronavirus disease 2019 (COVID-19) for their immunocompromised states. Despite good responses B-cell maturation antigen (BCMA)-targeted chimeric receptor (CAR)-T cell therapy, deficiencies in humoral immunity following CAR-T infusions can still cause life-threatening complications these patients. We conducted a comparative study delineate the clinical characteristics and outcomes between...

10.1038/s41409-025-02525-1 article EN cc-by-nc-nd Bone Marrow Transplantation 2025-02-21

With the rapid advancements in remote sensing technology, spectral information from hyperspectral images has become increasingly rich, facilitating detailed analysis of Earth's surface objects. However, this abundance data poses significant challenges processing, such as curse dimensionality leading to “Hughes” phenomenon, "strong correlation" due high resolution, and "non-linear characteristics" caused by varied reflectance rates. Therefore,...

10.20944/preprints202401.1274.v1 preprint EN 2024-01-17

With a large number of devices and wealth user data sets, the Internet Things (IoT) has become great host for federated learning (FL). At same time, massive amount in IoT results desperate demand privacy preserving. The onion router (Tor) is promising method to solve issue IoT-based FL by anonymity. However, devices' resource too limited execute cryptographic operations Tor. Moreover, network traffics Tor can be easily controlled malicious routers with fake high self-reported bandwidth. In...

10.1109/jiot.2022.3162826 article EN IEEE Internet of Things Journal 2022-03-29

Internet of Things (IoT) is an essential information infrastructure for smart cities in data sensing, collecting, merging, transmitting, or even reverse controlling. Whereas, the devices IoT are fundamentally different processing abilities. Combined with fog computing, some stronger nodes who have better computing capabilities can be taken as to help other weak task processing, such analysis, etc. Consequently, a new problem raised that how schedule tasks among nodes, so achieve minimum...

10.1109/icct.2017.8359780 article EN 2017-10-01

In this study, a kind of morphing skin composed silicon rubber and shape memory polymer composite tube is designed, manufactured, investigated. Significant stiffness variation for the can be obtained through changing its environment temperature. First, in order to investigate basic elastic properties skin, Rule Mixture used predict effective engineering modulus ratio with different matrix volume fractions. The tensile test conducted on two states (cold state heated state) validate accuracy...

10.1177/1045389x13517307 article EN Journal of Intelligent Material Systems and Structures 2013-12-31

Purpose This study considers online searching by health information consumers as a learning process. We focus on search sequences, query reformulation, and conceptual changes. Design/methodology/approach A qualitative user (30 participants; three seeking tasks) investigated mobile behavior. Recorded screen activity, questionnaires, in-depth personal interview data were collected analyzed. Findings (1) Search platform sequences of in process exacted their features highlighted. (2) Query...

10.1108/lht-08-2019-0174 article EN Library Hi Tech 2020-03-09

Distributed machine learning (DML) can realize massive dataset training when no single node work out the accurate results within an acceptable time. However, this will inevitably expose more potential targets to attackers compared with non-distributed environment. In paper, we classify DML into basic-DML and semi-DML. basic-DML, center server dispatches tasks distributed machines aggregates their results. While in semi-DML, further devotes resources addition its duty basic-DML. We firstly...

10.1109/access.2019.2962525 article EN cc-by IEEE Access 2019-12-26

In this research, a fluidic flexible matrix composites (F 2 MC) tube composed of composite (FMC) and inner liner is investigated. Significant changes in effective axial elastic modulus could be achieved through controlling the interior fluid. Based on classical laminated-plate theory anisotropic elasticity, three-dimensional analytical method proposed to characterize mechanical behavior F MC tube. comparison with experiment result, analysis deemed possess satisfying accuracy prediction...

10.1177/1045389x11420591 article EN Journal of Intelligent Material Systems and Structures 2011-09-11

Software Defined Wireless Rechargeable Sensor Networks (SDWRSNs) are an inexorable trend for (WSNs), including Network (WRSNs). However, the traditional network devices cannot be completely substituted in short term. Hybrid SDWRSNs, where software defined and coexist, will last a long time. SDWRSNs bring new challenges as well opportunities energy saving issues, which is still key problem considering that wireless chargers also exhaustible, especially some rigid environment out of main...

10.3390/s17092126 article EN cc-by Sensors 2017-09-15

A new structure damage identification method is proposed based on wavelet packet analysis of the time domain response. It known that distribution node energy response varies if damaged. The presented i

10.3233/jae-162134 article EN International Journal of Applied Electromagnetics and Mechanics 2016-08-30

The Service Function Chain (SFC) is a mechanism which transmit packets through different services in order. With Software Defined Networking (SDN) and Network Virtualization (NFV), network can be flexible deployed on the middleboxes. However, end-to-end transmission delay of SFC will influence time network, key indicator to performance network. One way decrease optimize sequence service In this paper, we put forward Middlebox Placement Optimization (MPO) algorithm. Different from previous...

10.1109/icct.2017.8359969 article EN 2017-10-01

Domain adaptation helps generalizing object detection models to target domain data with distribution shift. It is often achieved by adapting access the whole data. In a more realistic scenario, unpredictable until inference stage. This motivates us explore an model at test-time, a.k.a. test-time (TTA). this work, we approach adaptive (TTAOD) from two perspective. First, adopt self-training paradigm generate pseudo labeled objects exponential moving average model. The labels are further used...

10.48550/arxiv.2303.17937 preprint EN cc-by arXiv (Cornell University) 2023-01-01

The powerful information diffusion ability of online social networks (OSNs) attracts many attackers to spread malware, because malware can fiercely among massive active users with close relationship in OSNs. A message-recallable function user profile modern OSNs delete messages containing malicious link, and stop spreading. However, existing works on propagation models have not concerned the new mechanism (MRM). This paper proposes a novel model analyze performance MRM. For analyzing model,...

10.1109/icct.2017.8359857 article EN 2017-10-01

Malware, which spreads among hosts, brings potential damage to computer systems. Its propagation will even be facilitated when search engine exists. In this paper, we try dig deeper into the infected time of communities and malware behaviour in a context. order address these problems, two layer model is proposed for via engine. Derived from model, have found that exists, reciprocal different follows power law distribution number increases exponentially at early stage. Both hypothesis are...

10.1109/infcomw.2018.8406953 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2018-04-01

In this presented paper, spandex fibers with high elasticity and recovery ratio were added into shape memory epoxy resin, the mechanical properties improved obviously compared pure resin. Compared material, elastic modulus of sample 20vol% was increased by 28.2%, tensile stress 49.7%, fracture strain 16.4%. Then graphitized multi-walled carbon nanotubes (GMWNTs) mixed reinforced SMPCs to make it conductive. It found that surface-modified (by acid treatment) GMWNTs incorporated very well...

10.1117/12.915125 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2012-03-24

Recent work has showcased the powerful capability of large language models (LLMs) in recalling knowledge and reasoning. However, reliability LLMs combining these two capabilities into reasoning through multi-hop facts not been widely explored. This paper systematically investigates possibilities for to utilize shortcuts based on direct connections between initial terminal entities knowledge. We first explore existence factual Knowledge Neurons, revealing that: (i) strength is highly...

10.48550/arxiv.2402.11900 preprint EN arXiv (Cornell University) 2024-02-19

Abstract Background Cancer‐targeted T‐cell receptor T (TCR‐T) cells hold promise in treating cancers such as hematological malignancies and breast cancers. However, approaches to obtain cancer‐reactive TCR‐T have been unsuccessful. Methods Here, we developed a novel strategy screen for cancer‐targeted using special humanized mouse model with person‐specific immune fingerprints. Rare steady‐state circulating hematopoietic stem progenitor were expanded via three‐dimensional culture of...

10.1002/cai2.118 article EN cc-by Cancer Innovation 2024-04-15
Coming Soon ...