Yifei Chen

ORCID: 0000-0002-6389-3964
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Medical Image Segmentation Techniques
  • Mobile Ad Hoc Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Transportation and Mobility Innovations
  • Cloud Computing and Resource Management
  • AI in cancer detection
  • Blockchain Technology Applications and Security
  • Advanced Wireless Network Optimization
  • Access Control and Trust
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Consumer Market Behavior and Pricing
  • Advanced Electron Microscopy Techniques and Applications
  • Assembly Line Balancing Optimization
  • IPv6, Mobility, Handover, Networks, Security
  • Reinforcement Learning in Robotics
  • Complexity and Algorithms in Graphs
  • Cooperative Communication and Network Coding
  • Transportation Planning and Optimization
  • IoT and Edge/Fog Computing
  • Advanced Image Fusion Techniques
  • Scheduling and Optimization Algorithms
  • Agricultural Economics and Policy

Hangzhou Dianzi University
2024-2025

Howard Hughes Medical Institute
2025

University of California, San Francisco
2025

Xi'an Railway Survey and Design Institute
2023

Harbin Institute of Technology
2023

Hefei University of Technology
2020-2022

Pan Asia Technical Automotive Center (China)
2020

Nanjing Audit University
2015

Anhui University
2005-2008

Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority timely gather, analyze, trace data promotes vehicular investigations. However, adversaries crave identity provider/user, damage evidence, violate evidence jurisdiction, leak evidence. Therefore, protecting privacy accountability while guaranteeing access control traceability in VDF no easy task. To address above-mentioned issues, we propose Eunomia: an...

10.1109/tdsc.2021.3130583 article EN IEEE Transactions on Dependable and Secure Computing 2021-11-25

With technological advancements in recent years, single particle cryogenic electron microscopy (cryo-EM) has become a major methodology for structural biology. Structure determination by cryo-EM is premised on randomly orientated particles embedded thin layer of vitreous ice to resolve high-resolution information all directions. Otherwise, preferentially distributed orientations will lead anisotropic resolution the structure. Here we established deconvolution approach, named AR-Decon,...

10.1101/2025.02.23.639707 preprint EN cc-by bioRxiv (Cold Spring Harbor Laboratory) 2025-03-01

Traffic-sensitive navigation systems in vehicular networks help drivers avoid traffic jams by providing several realtime routes. However, still encounter privacy concerns because their sensitive locations, i.e., start point and endpoint, are submitted to an honest-but-curious service provider (NSP). Previous privacy-preserving studies exhibit serious deficiencies under similar queries: if a driver makes queries, periodically requests for the same endpoint NSP, these will eventually reveal...

10.1109/tdsc.2020.3017534 article EN IEEE Transactions on Dependable and Secure Computing 2020-01-01

Current connected and autonomous vehicles will contribute to various green vehicular services. However, sharing personal data with untrustworthy Navigation Service Providers (NSPs) raises serious location concerns. To address this issue, many Location Privacy-Preserving Mechanisms (LPPMs) have been proposed. In addition, several quantification methods designed help understand privacy illustrate how is leaked. their assessment insufficient due the incomplete assumptions about adversary's...

10.1109/tgcn.2022.3144641 article EN IEEE Transactions on Green Communications and Networking 2022-01-20

The efficient operation of Intelligent Warehousing System does not rely on individual resource scheduling in stages but multi-type resources collaborative scheduling. In this paper, a model for stackers, automated guided vehicles and picking workstations outbound process is abstracted into hybrid flow-shop problem within an warehouse scene. Considering the impacts uncertain factors related to scheduling, objective function minimizing makespan based triangular fuzzy processing time. A genetic...

10.3233/jifs-191827 article EN Journal of Intelligent & Fuzzy Systems 2020-06-02

Ride-hailing is a favored vehicular service model where drivers can deliver convenient rides to waiting riders via responding road-side unit or ride-hailing provider. However, previous works did not consider the order-linking function rider Cathy waving for ride will be matched driver Bob in with Alice whose destination close start point of Cathy. Furthermore, malicious matching executor could collude an appointed interfere process, which causes unfairness and has been addressed before. To...

10.1109/trustcom50675.2020.00085 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

Resource allocation is expected to be a most important factor especially for heterogeneous applications in wireless ad hoc networks. In this paper, novel resource algorithm (HRA) presented networks, supporting both elastic and inelastic traffic. First, by combining the first order Lagrangian method with pseudo utility, original nonconvex problem converted into new convex one. Then, we successfully solve dual-based decomposition approach. addition, integrate utility fairness framework, which...

10.1155/2015/686189 article EN cc-by International Journal of Distributed Sensor Networks 2015-01-01

Traditional supervised learning methods have historically encountered certain constraints in medical image segmentation due to the challenging collection process, high labeling cost, low signal-to-noise ratio, and complex features characterizing biomedical images. This paper proposes a semi-supervised model, DFCPS, which innovatively incorporates Fixmatch concept. significantly enhances model's performance generalizability through data augmentation processing, employing varied strategies for...

10.48550/arxiv.2402.11273 preprint EN arXiv (Cornell University) 2024-02-17

Whole Slide Image (WSI) classification is often formulated as a Multiple Instance Learning (MIL) problem. Recently, Vision-Language Models (VLMs) have demonstrated remarkable performance in WSI classification. However, existing methods leverage coarse-grained pathogenetic descriptions for visual representation supervision, which are insufficient to capture the complex appearance of images, hindering generalizability models on diverse downstream tasks. Additionally, processing high-resolution...

10.48550/arxiv.2402.19326 preprint EN arXiv (Cornell University) 2024-02-29

Privacy policies have disrupted the multi-billion dollar online advertising market by making real-time and precise user data untraceable, which poses significant challenges to optimization of Return-On-Investment (ROI) constrained products in industry. protection strategies, including event aggregation reporting delays, hinder access detailed instantaneous feedback data, thus incapacitating traditional identity-revealing attribution techniques. In this paper, we introduces a novel Spending...

10.1145/3637528.3671540 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2024-08-24

The risk assessment of landslides is an important component landslide assessment, which great significance for the prediction and prevention landslides. How to scientifically reasonably select evaluation factors a weak link in existing research. For selection factors, data analysis method mistakenly deleted factor screening. Therefore, hierarchical grey relational was first used calculate comprehensive correlation degree based on expert experience, then random forest model best assess risk....

10.25236/ajets.2023.060911 article EN Academic Journal of Engineering and Technology Science 2023-01-01

移动Ad hoc 网自组织、移动性等特性为组网带来便利的同时也增加了路由管理的难度.针对现有可靠路由算法解决问题具有局限性以及获取链路评价信息低效等问题,在DSR(dynamic source routing)协议基础上提出了基于本地信任系统的可靠路由协议(reliable routing protocol based on local trust system,简称TR-DSR).TR-DSR 协议选择路由时,综合考虑路由上各节点和各链路的可靠信任度,并在路由建立过程中利用这些信息,在确保找到可靠路由的基础上降低寻路开销.同时,为了防止自私节点对信任系统评价正确性的影响,提出了基于GTFT(generous tit fortat)策略的激励节点推荐响应行为的DFR(decide forwarding recommendation)算法.仿真实验结果表明,在节点频繁移动和存在大量自私节点的网络中,该协议的性能优势明显,验证了TR-DSR 协议的可靠性.;The features of mobile ad network such as self-organization,...

10.3724/sp.j.1001.2013.04271 article EN Journal of Software 2013-12-29
Coming Soon ...