Liquan Chen

ORCID: 0000-0002-7202-4939
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Wireless Communication Security Techniques
  • Blockchain Technology Applications and Security
  • Chaos-based Image/Signal Encryption
  • Privacy-Preserving Technologies in Data
  • Advanced Steganography and Watermarking Techniques
  • Cloud Data Security Solutions
  • Landslides and related hazards
  • Digital Media Forensic Detection
  • Advanced Wireless Communication Technologies
  • Synthetic Aperture Radar (SAR) Applications and Techniques
  • Advanced Malware Detection Techniques
  • Advanced Authentication Protocols Security
  • Quantum Computing Algorithms and Architecture
  • IoT and Edge/Fog Computing
  • Cryospheric studies and observations
  • Security and Verification in Computing
  • Mobile Ad Hoc Networks
  • Energy Harvesting in Wireless Networks
  • Adversarial Robustness in Machine Learning
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Energy Efficient Wireless Sensor Networks
  • Quantum Information and Cryptography
  • Wireless Signal Modulation Classification

Southeast University
2014-2025

Chang'an University
2019-2024

Purple Mountain Laboratories
2020-2024

Shanghai Electric (China)
2024

Quzhou College of Technology
2023

Beijing University of Posts and Telecommunications
2023

Southeast University
2023

Institute of Biophysics
2022

Hebei University of Technology
2022

Shanghai University
2021

For data collection in large-scale wireless sensor networks (WSNs), dynamic clustering provides a scalable and energy-efficient solution, which uses cluster head (CH) rotation range assignment algorithms to balance the energy consumption. Nevertheless, most existing works consider routing as two isolated issues, is harmful connectivity efficiency of network. In this paper, we provide detailed analysis on relations between routing, then propose joint (JCR) protocol for reliable efficient WSN....

10.1109/jiot.2015.2482363 article EN IEEE Internet of Things Journal 2015-09-25

Planetary gearbox is applied more and extensively in the modern industry. Its condition directly determines availability operation safety of machinery system that utilizes it for power transmission. To enhance its reliability, an early fault detection method proposed this study, which based on acoustic emission (AE) technique improved variational mode decomposition (VMD). AE data are expected to contain valuable information about than vibration data. Mutual used determine layer can avoid...

10.1109/jsen.2020.3015884 article EN IEEE Sensors Journal 2020-08-12

Physical layer key generation (PLKG) is a promising technique to establish symmetric keys between resource-constrained legitimate users. However, PLKG suffers from low rate in harsh environments where channel randomness limited. To address the problem, reconfigurable intelligent surfaces (RISs) are introduced reshape channels by controlling massive reflecting elements, which can provide more diversity. In this paper, we design probing protocol fully extract cascaded channel, i.e., through...

10.1109/tifs.2023.3268881 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

We propose a key generation protocol with the aid of reconfigurable intelligent surface (RIS) to boost secret rate (SKR) in quasi-static environments. Considering passive eavesdropper, we derive closed-form expression lower and upper bounds SKR. Our findings indicate SKR is determined by number RIS elements, correlation coefficient, pilot length quality reflecting channel. fully exploits randomness from direct channel Monte Carlo simulations validate analytical demonstrate our outperforms...

10.1109/lcomm.2021.3130635 article EN IEEE Communications Letters 2021-11-25

Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique, which exploits the hardware characteristics of RF front-end as identifiers. The receiver impairments interfere with feature extraction transmitter impairments, but their effect and mitigation have not been comprehensively studied. In this paper, we propose a receiver-agnostic RFFI system by employing adversarial training to learn receiver-independent features. Moreover, when there are multiple...

10.1109/tmc.2023.3340039 article EN IEEE Transactions on Mobile Computing 2023-12-06

In network-connected UAV (NC-UAV) communication systems, user authentication is replaced by platform identity and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation (DAA) an attractive cryptographic scheme that provides elegant balance between anonymity. However, of the low-level computing capability limited transmission bandwidth in UAV, existing DAA schemes not suitable for NC-UAV systems. this paper, we propose enhanced with mutual...

10.1109/cc.2018.8387987 article EN China Communications 2018-05-01

Public clouds have drawn increasing attention from academia and industry due to their high computational storage performance. Attribute-based encryption (ABE) is the most promising technology simultaneously achieve confidentiality fine-grained access control of cloud-stored data. However, traditional ABE that relies on centralized authority faces several key management issues, such as escrow, distribution, tracking, update, heavy communication computing overhead for users, which will cause...

10.1109/tnsm.2022.3185237 article EN IEEE Transactions on Network and Service Management 2022-06-22

Landslide inventory mapping (LIM) is a key prerequisite for landslide susceptibility evaluation and disaster mitigation. It aims to record the location, size, extent of landslides in each map scale. Machine learning algorithms, such as support vector machine (SVM) random forest (RF), have been increasingly applied detection using remote sensing images recent decades. However, their limitations impeded wide application. Furthermore, despite widespread use deep algorithms sensing, LIM, are...

10.3390/rs14215517 article EN cc-by Remote Sensing 2022-11-02

10.1109/tcsvt.2025.3545067 article EN IEEE Transactions on Circuits and Systems for Video Technology 2025-01-01

Landslides pose a significant hazard to lives and property worldwide. Understanding the triggering factors of landslides provides essential information for mitigation. While much research has focused on effects precipitation, underground mining, water level changes, earthquakes landslides, there remains gap in understanding impact long-term subtle tectonic interseismic motion, particularly over large-scale areas. Interferometric Synthetic Aperture Radar (InSAR) is widely used landslide...

10.5194/egusphere-egu25-9853 preprint EN 2025-03-14

The occurrence of collapses and landslides due to underground mining has its unique failure mechanism, especially in the Karst mountainous regions China. Spaceborne airborne remote sensing observations provide rapid effective tools for assessing surface changes monitoring deformation such landslides. In this study, we take Jianshanying landslide, a typical mining-induced fast-deformed as an example, reveal mechanism landslide by investigating historical displacement. First, complete...

10.1080/15481603.2023.2268367 article EN cc-by-nc GIScience & Remote Sensing 2023-10-11

The present study aimed to investigate the association between excision repair cross-complementation group 1 (ERCC1) expression and clinical resistance platinum‑based chemotherapy or characteristics, including survival time, in patients with epithelial ovarian cancer (EOC). ERCC1 was determined by immunohistochemical staining 92 tumor specimens from EOC. effect of on progression‑free time (PFS) overall (OS), its investigated Kaplan‑Meier analysis, Cox regression analysis χ2 test. Of EOC,...

10.3892/ol.2016.4732 article EN Oncology Letters 2016-06-15
Coming Soon ...