[1] Shuhong Chen*(Corresponding Author), Jiawei Yang, Guojun Wang, Zijia Wang, Haojie Yin,Yinglin Feng. CLFLDP: Communication-Efficient Layer Clipping Federated Learning with Local Differential Privacy.Journal of Systems Architecture . 10.1016/j.sysarc.2024.103067(Q1,CCF B, IF:4.5)
[2] Shuhong Chen, Zhiyong Jie,Guojun Wang,Kuan-Ching Li,Jiawei Yang,Xulang Liu.A New Federated Learning-Based Wireless Communication and Client Scheduling Solution for Combating COVID-19. Computer Communications,206(2023): 101-109. (Q1,CCF C, IF:6.0)
[3] Jiawei Yang, Shuhong Chen*(Corresponding Author), Guojun Wang, Zhijia Wang, Zhiyong Jie, Muhammad Arif. GFL-ALDPA:A Gradient Compression Federated Learning Framework Based on Adaptive Local Differential Privacy Budget Allocation. Multimedia Tools and Applications. (Q2,IF:3.6)
[4] Jianming Wu, Shuhong Chen*(Corresponding Author), Guojun Wang, Hao Wang, Hanjun Li, Tao Peng. Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text. TrustCom 2023(CCF C).
[5] Zhenkun Luo, Shuhong Chen*(Corresponding Author), Guojun Wang, and Hanjun Li. Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features. TrustCom 2023(CCF C).
[6] Kairen Chen, Shuhong Chen*(Corresponding Author), Guojun Wang, Chenchen Wang. Enhancing Medical Image Classificationthrough Channel Grouping and Partial ConvolutionNetwork. the International Symposium on Intelligent and Trustworthy Computing, Communications, and Networking (ITCCN-2023).
[7] Yaxin Mei, Wenhua Wang, Yuzhu Liang, Qin Liu, Shuhong Chen, Tian Wang . Privacy-Enhanced Cooperative Storage Scheme for Contact-free Sensory Data in AIoT with Eficient Synchronization. ACM Transactions on Sensor Networks. 2023 (Q1, IF:4.1)
[8] Zijia Wang, Qiang Yang , Yuhui Zhang , Shuhong Chen, Yuangen Wang. Superiority combination learning distributed particle swarm optimization for large-scale optimization. Applied Soft Computing.136(2023) (Q1, IF:8.7)
[9] Yihua Zheng, Shuhong Chen, Jianming Wu, Kairen Chen, Guojun Wang, Tao Peng.Real-time Driver Fatigue Detection Method Based on Comprehensive Facial Features. ICA3PP 2023.
[10] Zhiyong Jie, Shuhong Chen*(Corresponding Author), Junqiu Lai, Muhammad Arif, Zongyuan He, Personalized federated recommendation system with historical parameter clustering, Journal of Ambient Intelligence and Humanized Computing, 2022: https://doi.org/10.1007/s12652-022-03709-z. ( SCI & EI index, Q2, IF:4.594)
[11] Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Shuhong Chen*(Corresponding Author), Muhammad Arif, Impact of Reenactment Programs on Young Generation Springer, The Second International Conference on Ubiquitous Security (UbiSec 2022), Zhangjiajie, China, December 28 - 31, 2022 . (EI index)
[12] Shitao Wang1, Wenjun Jiang1, and Shuhong Chen, An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection, The Second International Conference on Ubiquitous Security (UbiSec 2022), Zhangjiajie, China, December 28 - 31, 2022 .(EI index)
[13] Shuhong Chen, Guojun Wang, Weijia Jia, Cluster-Group Based Trusted Computing for Mobile Social Networks Using Implicit Social Behavioral Graph,Elsevier: Future Generation Computer Systems, 2016, (55):391–400. ( SCI & EI index, IF: 2.786, Citing number: 000368652400033, Accession number: IP53204442, DOI: 10.1016/j.future.2014.06.005, Q1,CCF C)
[14] Shuhong Chen, Guojun Wang, Weijia Jia, k-FuzzyTrust: An Efficient Trust Computation for Large-scale Mobile Social Networks using Fuzzy Implicit Social Graph, Elsevier: Information sciences, 2015, (318):123–143. ( SCI & EI index, IF: 4.221, Citing number: 000357707600009, Accession number: 20152400940605, DOI: 10.1016/j.ins.2014.09.058,Q1,CCF B)
[15] Entao Luo, Shuhong Chen *(Corresponding Author), Wenbo Wang, Shaobo Zhang, Khan-butt Pinial, A Privacy Preserving Friend Discovery Multi Key Obfuscation Scheme in Mobile Social Networks. Chinese Journal of Electronics(电子学报).2018,46(9):2123-2130. (EI index, Accession number: 20185206314490, CCF A)
[16] Runchuan Li, Shuhong Chen*(Corresponding Author), Jiawei Yang, Entao Luo, Edge-based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning, Mobile Information Systems, 2021: 1-14. ( SCI & EI index, Q4)
[17] Xuehao Shen, Yuezhong Wu*, Shuhong Chen*(Corresponding Author), Xueming Luo, An Intelligent Garbage Sorting System Based on Edge Computing and Visual Understanding of Social Internet of Vehicles, Mobile Information Systems, 2021: 1-12. ( SCI & EI index,Q4)
[18] Shuhong Chen, Guojun Wang, Guofeng Yan, Dongqing Xie, Multi-dimensional Fuzzy Trust Evaluation for Mobile Social Networks Based on Dynamic Community Structure. Concurrency and Computation:Practice and Experience, 2017, 29(7):1-22. ( SCI & EI index, IF: 1.133, Citing number: 000398712500004, Accession number: 20162802586831, DOI:10.1002/cpe. 3901.Q4)
[19] Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen, A Survey on Mobile Malware Detection Techniques. IEICE Transations on Information and System, 2021(2): 204-211. ( SCI & EI index,Q4)
[20] Zhe Tang, Zhengyun Chen, Fang Qi, Lingyan Zhang, and Shuhong Chen, Pest-YOLO: Deep Image Mining and Multi-Feature Fusion for Real-Time Agriculture Pest Detection, 21st IEEE International Conference on Data Mining ( ICDM IEEE 2021), Auckland, New Zealand, December 7-10, 2021. (SCI & EI index, https://icdm2021.auckland.ac.nz/accepted-papers/, CCF B)
[21] Muhammad Sohaib Yousaf, Shazia Riaz, Saqib Ali, Shuhong Chen, Guojun Wang, The Future Prospects of Adversarial Nets, Lecture Notes in Computer Science (LNCS 12383),2021: 15-26. (EI index)
[22] Min Li, Haroon Elahi, Shuhong Chen*(Corresponding Author), A Risk Analysis of Android Children’s Apps. Lecture Notes in Computer Science,2020, 12432: 539-546.(EI index, DOI: http://doi.org/10.1007/978-3-030-60029-7_48)
[23] WenyinYang, GuojunWang, Kim-Kwang RaymondChoo, ShuhongChen. HEPart: A balanced hypergraph partitioning algorithm for big data applications, Elsevier: Future Generation Computer Systems, 2018, (83): 250-268. ( SCI & EI index, Accession number: 20180504685149, Q1,CCF C类)
[24] Zuojie Deng, Shuhong Chen* (Corresponding Author), Xiaolan Tan, Dan Song; Fan Wu, An Efficient Provable Multi-Copy Data Possession Scheme with Data Dynamics, Lecture Notes in Computer Science (LNCS 11342),2018:392-402 (EI index, Accession number: 18318888 ,DOI: 10.1007/978-3-030- 05345-1_34)
[25] Mehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi, A Method for Privacy-Preserving in IoT-SDN Integration Environment.2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, 2018: 681-688.(ISPA/IUCC/BDCloud/SocialCom/SustainCom) (EI index, Accession Number: 18529764 )
[26] Muhammad Arif, Guojun Wang, Shuhong Chen, Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction.2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, 2018: 895-902.(ISPA/IUCC/BDCloud/SocialCom/SustainCom) (EI index, Accession Number: 18199189 )
[27] Mehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi, A Method for Privacy-preserving in IoT-SDN Integration Environment, 16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom, Melbourne, Australia. Dec 11-13, 2018. (EI index )
[28] Mehdi Gheisari, Guojun Wang, Shuhong Chen, Hamidreza Ghorbani, IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking, 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Guangzhou, China. Nov 15-17, 2018. (EI index )
[29] Muhammad Faizan Khan, Guojun Wang, Md Zakirul Alam Bhuiyan, Shuhong Chen, Wi-Fi Radar Placement for Coverage in Collapsed Structures, 16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom, Melbourne, Australia. Dec 11-13, 2018. ( SCI & EI index )
[30] Yuezhong Wu, Shuhong Chen* (Corresponding Author), Guojun Wang, Changyun Li. User-Controlled Encrypted Data Sharing Model in Cloud Storage. The 1st EAI International Conference on Advanced Hybrid Information Processing(ADHIP). Springer, July 17–18, Harbin, China, 2017. ( EI index, Accession number: 20180804811894)
[31] Entao Luo, Guojun Wang, Shuhong Chen, Khan-butt Pinial. Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks. Journal on Communications(通信学报, CCF B), 2017, 38(10): 81-93. (EI index, Accession number: 20164803063879)
[32] Yuezhong Wu, Zhihong Wang, Shuhong Chen, Guojun Wang, Changyun Li*. Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph. The 15th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA). IEEE, Guangzhou, China, Dec.12-15, 2017,(1):715-721. (EI index)
[33] Feng Wang, Wenjun Jiang, Shuhong Chen, Dongqing Xie, Guojun Wang. Exploring user topic influence for group recommendation on learning resources. The 14th IEEE International Conference on Ubiquitous Intelligence and Computing ( UIC 2017). San Francisco, USA. Aug 4- 8, 2017. (EI index)
[34] Entao Luo, Guojun Wang, Shuhong Chen, Xiangdong Yin, Wen Li, W, "Second Degree Social Connections"- Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks. 15th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) / 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC). Guangzhou, China. DEC 12-15, 2017. ( SCI & EI index, Accession Number: 17804544 )
[35] Yuezhong Wu, Shuhong Chen, A Research on User Interest Model Using Ontology and VSM Extension. International Journal of u- and e- Service, Science and Technology, 2016, 9(7):147-156. (EI index, Accession number: 20163102666560)
[36] Yuezhong Wu, Shuhong Chen , " A Research on User Interest Model Using Ontology and VSM Extension" , International Journal of u- and e- Service, Science and Technology, 2016, 9(7):147-156. (EI index)
[37] Shuhong Chen, Guofeng Yan. Trust Evaluation Mechanism Using Type-2 Fuzzy Logic System. Journal of Hunan Institute of Engineering (Natural Science Edition),2015,25(3):36-50
[38] Shuhong Chen, Hong Wang. Design and Implementation of Multi-Tasking Operating System Based on Intel X86 Platform. Journal of Hunan Institute of Engineering (Natural Science Edition),2015,25(4):36-39