[1] Shuhong Chen*(Corresponding Author), Kairen Chen, Guojun Wang, Sheng Wen, Zhili Zhou. DSLL-Face: Distributed Supervision-Integrated Framework for Low-Light Face Detection. Accepted to appear in IEEE Transactions on Multimedia, 2025. (Q1, 中科院1区, CCFB, IF:3.8)
[2] Shuhong Chen*(Corresponding Author), Jiawei Yang, Guojun Wang, Zijia Wang, Haojie Yin,Yinglin Feng. CLFLDP: Communication-Efficient Layer Clipping Federated Learning with Local Differential Privacy.Journal of Systems Architecture . 10.1016/j.sysarc.2024.103067(Q1, 中科院2区, CCF B, IF:4.5)
[3] Shuhong Chen, Zhiyong Jie*,Guojun Wang,Kuan-Ching Li,Jiawei Yang,Xulang Liu.A New Federated Learning-Based Wireless Communication and Client Scheduling Solution for Combating COVID-19. Computer Communications,206(2023): 101-109. (Q1,中科院3区, CCF C, IF:6.0)
[4] Mengmeng Tang , Shuhong Chen*(Corresponding Author) , Guojun Wang , Hanjun Li , Zhuyi Yao, Sheng Wen. Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup. IEEE 23nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Hainan,China, Dec. 17-21, 2024.(CCF C)
[5] Li H, Chen S(Corresponding Author), Wang G, et al. Enhancing Few-Shot Malware Classification Through Joint Learning of Malware Images and Opcode Sequences. 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA). Kaifeng,China. Oct. 30 - Nov.02, 2024: 2060-2068.(CCF C)
[6] Haojie Yin, Shuhong Chen*(Corresponding Author), Zhenkun Luo, Mengmeng Tang, Sipeng Zhang and Zhuyi Yao. A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining Decentralized Identity and Zero-Knowledge Proofs. Accepted to appear in the Fourth International Conference on Ubiquitous Security (UbiSec 2024). Guangzhou, China, Dec.29-31, 2024.
[7] Jiawei Yang, Shuhong Chen*(Corresponding Author), Guojun Wang, Zhijia Wang, Zhiyong Jie, Muhammad Arif. GFL-ALDPA:A Gradient Compression Federated Learning Framework Based on Adaptive Local Differential Privacy Budget Allocation. Multimedia Tools and Applications. (Q2,IF:3.6)
[8] Jianming Wu, Shuhong Chen*(Corresponding Author), Guojun Wang, Hao Wang, Hanjun Li, Tao Peng. Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text. TrustCom 2023(CCF C).
[9] Zhenkun Luo, Shuhong Chen*(Corresponding Author), Guojun Wang, and Hanjun Li. Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features. TrustCom 2023(CCF C).
[10] Kairen Chen, Shuhong Chen*(Corresponding Author), Guojun Wang, Chenchen Wang. Enhancing Medical Image Classification through Channel Grouping And Partial Convolution Network. The International Symposium on Intelligent and Trustworthy Computing, Communications, and Networking (ITCCN-2023). Exeter, UK, November.1-3, 2023.
[11] Yaxin Mei, Wenhua Wang, Yuzhu Liang, Qin Liu, Shuhong Chen, Tian Wang*. Privacy-Enhanced Cooperative Storage Scheme for Contact-free Sensory Data in AIoT with Eficient Synchronization. ACM Transactions on Sensor Networks. (Q2, 中科院4区, CCF B, IF:4.1)
[12] Zijia Wang, Qiang Yang , Yuhui Zhang , Shuhong Chen, Yuangen Wang. Superiority combination learning distributed particle swarm optimization for large-scale optimization. Applied Soft Computing.136(2023).c (Q2, 中科院4区, CCF B, IF:4.1)
[13] Yihua Zheng, Shuhong Chen, Jianming Wu, Kairen Chen, Guojun Wang, Tao Peng.Real-time Driver Fatigue Detection Method Based on Comprehensive Facial Features. ICA3PP 2023.(CCF C)
[14] Zhiyong Jie, Shuhong Chen*(Corresponding Author), Junqiu Lai, Muhammad Arif, Zongyuan He, Personalized federated recommendation system with historical parameter clustering, Journal of Ambient Intelligence and Humanized Computing, 2022: https://doi.org/10.1007/s12652-022-03709-z. ( SCI & EI index, Q2, IF:4.594)
[15] Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Shuhong Chen*(Corresponding Author), Muhammad Arif, Impact of Reenactment Programs on Young Generation Springer, The Second International Conference on Ubiquitous Security (UbiSec 2022), Zhangjiajie, China, December 28 - 31, 2022 . (EI index)
[16] Shitao Wang1, Wenjun Jiang1, and Shuhong Chen, An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection, The Second International Conference on Ubiquitous Security (UbiSec 2022), Zhangjiajie, China, December 28 - 31, 2022 .(EI index)
[17] Tao Peng, Qin Liu, Guojun Wang, Yang Xiang, Shuhong Chen. Multidimensional Privacy Preservation in Location-Based Services[J]. Future Generation Computer Systems, (93) 2019:312-326.(SCI&EI index,Q1,CCF C)
[18] Shuhong Chen, Guojun Wang, Weijia Jia, Cluster-Group Based Trusted Computing for Mobile Social Networks Using Implicit Social Behavioral Graph,Elsevier: Future Generation Computer Systems, 2016, (55):391–400. ( SCI & EI index, IF: 2.786, Citing number: 000368652400033, Accession number: IP53204442, DOI: 10.1016/j.future.2014.06.005, Q1,CCF C)
[19] Shuhong Chen, Guojun Wang, Weijia Jia, k-FuzzyTrust: An Efficient Trust Computation for Large-scale Mobile Social Networks using Fuzzy Implicit Social Graph, Elsevier: Information sciences, 2015, (318):123–143. ( SCI & EI index, IF: 4.221, Citing number: 000357707600009, Accession number: 20152400940605, DOI: 10.1016/j.ins.2014.09.058,Q1,CCF B)
[20] Entao Luo, Shuhong Chen *(Corresponding Author), Wenbo Wang, Shaobo Zhang, Khan-butt Pinial, A Privacy Preserving Friend Discovery Multi Key Obfuscation Scheme in Mobile Social Networks. Chinese Journal of Electronics(电子学报).2018,46(9):2123-2130. (EI index, Accession number: 20185206314490, CCF A)
[21] Runchuan Li, Shuhong Chen*(Corresponding Author), Jiawei Yang, Entao Luo, Edge-based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning, Mobile Information Systems, 2021: 1-14. ( SCI & EI index, JCR四区)
[22] Xuehao Shen, Yuezhong Wu*, Shuhong Chen*(Corresponding Author), Xueming Luo, An Intelligent Garbage Sorting System Based on Edge Computing and Visual Understanding of Social Internet of Vehicles, Mobile Information Systems, 2021: 1-12. ( SCI & EI index,Q4)
[23] Shuhong Chen, Guojun Wang, Guofeng Yan, Dongqing Xie, Multi-dimensional Fuzzy Trust Evaluation for Mobile Social Networks Based on Dynamic Community Structure. Concurrency and Computation:Practice and Experience, 2017, 29(7):1-22. ( SCI & EI index, IF: 1.133, Citing number: 000398712500004, Accession number: 20162802586831, DOI:10.1002/cpe. 3901.Q4)
[24] Vasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen, A Survey on Mobile Malware Detection Techniques. IEICE Transations on Information and System, 2021(2): 204-211. ( SCI & EI index, Q4)
[25] Zhe Tang, Zhengyun Chen, Fang Qi, Lingyan Zhang, and Shuhong Chen, Pest-YOLO: Deep Image Mining and Multi-Feature Fusion for Real-Time Agriculture Pest Detection, 21st IEEE International Conference on Data Mining ( ICDM IEEE 2021), Auckland, New Zealand, December 7-10, 2021. (SCI & EI index, https://icdm2021.auckland.ac.nz/accepted-papers/, CCF B类)
[26] Muhammad Sohaib Yousaf, Shazia Riaz, Saqib Ali, Shuhong Chen, Guojun Wang, The Future Prospects of Adversarial Nets, Lecture Notes in Computer Science (LNCS 12383),2021: 15-26. (EI index)
[27] Min Li, Haroon Elahi, Shuhong Chen*(Corresponding Author), A Risk Analysis of Android Children’s Apps. Lecture Notes in Computer Science,2020, 12432: 539-546.(EI index, DOI: http://doi.org/10.1007/978-3-030-60029-7_48)
[28] WenyinYang, GuojunWang, Kim-Kwang RaymondChoo, ShuhongChen. HEPart: A balanced hypergraph partitioning algorithm for big data applications, Elsevier: Future Generation Computer Systems, 2018, (83): 250-268. ( SCI & EI index, Accession number: 20180504685149, Q1,CCF C类)
[29] Zuojie Deng, Shuhong Chen* (Corresponding Author), Xiaolan Tan, Dan Song; Fan Wu, An Efficient Provable Multi-Copy Data Possession Scheme with Data Dynamics, Lecture Notes in Computer Science (LNCS 11342),2018:392-402 (EI index, Accession number: 18318888 ,DOI: 10.1007/978-3-030- 05345-1_34)
[30] Mehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi, A Method for Privacy-Preserving in IoT-SDN Integration Environment.2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, 2018: 681-688.(ISPA/IUCC/BDCloud/SocialCom/SustainCom) (EI index, Accession Number: 18529764 ).(CCF C)c
[31] Muhammad Arif, Guojun Wang, Shuhong Chen, Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction.2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, 2018: 895-902.(ISPA/IUCC/BDCloud/SocialCom/SustainCom) (EI index, Accession Number: 18199189 ).(CCF C)
[32] Mehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi, A Method for Privacy-preserving in IoT-SDN Integration Environment, 16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom, Melbourne, Australia. Dec 11-13, 2018. (EI index ).(CCF C)
[33] Mehdi Gheisari, Guojun Wang, Shuhong Chen, Hamidreza Ghorbani, IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking, 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Guangzhou, China. Nov 15-17, 2018. (EI index )(CCF C)
[34] Muhammad Faizan Khan, Guojun Wang, Md Zakirul Alam Bhuiyan, Shuhong Chen, Wi-Fi Radar Placement for Coverage in Collapsed Structures, 16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom, Melbourne, Australia. Dec 11-13, 2018. ( SCI & EI index )(CCF C)
[35] Yuezhong Wu, Shuhong Chen* (Corresponding Author), Guojun Wang, Changyun Li. User-Controlled Encrypted Data Sharing Model in Cloud Storage. The 1st EAI International Conference on Advanced Hybrid Information Processing(ADHIP). Springer, July 17–18, Harbin, China, 2017. ( EI index, Accession number: 20180804811894)
[36] Entao Luo, Guojun Wang, Shuhong Chen, Khan-butt Pinial. Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks. Journal on Communications(通信学报, CCF B类), 2017, 38(10): 81-93. (EI index, Accession number: 20164803063879)
[37] Yuezhong Wu, Zhihong Wang, Shuhong Chen, Guojun Wang, Changyun Li*. Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph. The 15th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA). IEEE, Guangzhou, China, Dec.12-15, 2017,(1):715-721. (EI index)(CCF C)
[38] Feng Wang, Wenjun Jiang, Shuhong Chen, Dongqing Xie, Guojun Wang. Exploring user topic influence for group recommendation on learning resources. The 14th IEEE International Conference on Ubiquitous Intelligence and Computing ( UIC 2017). San Francisco, USA. Aug 4- 8, 2017. (EI index)(CCF C)
[39] Entao Luo, Guojun Wang, Shuhong Chen, Xiangdong Yin, Wen Li, W, "Second Degree Social Connections"- Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks. 15th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) / 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC). Guangzhou, China. DEC 12-15, 2017. ( SCI & EI index, Accession Number: 17804544 )(CCF C)