


default search action
Yulong Shen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yulong Shen 0001
— Xidian University, School of Computer Science, Xi'an, Shaanxi, China
- Yulong Shen 0002
(aka: Yu-Long Shen 0002) — Chinese Academy of Sciences (CAS), Quanzhou Institute of Equipment Manufacturing, Haixi Institutes, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i7]Anxiao Song, Shujie Cui, Jianli Bai, Ke Cheng, Yulong Shen, Giovanni Russello:
Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on Vertical Dataset. CoRR abs/2507.20688 (2025) - 2024
- [j11]Mubarak Umar
, Jiandong Wang
, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen:
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction. Ad Hoc Networks 152: 103303 (2024) - [j10]Mubarak Umar
, Jiandong Wang
, Hafsa Kabir Ahmad, Shuangrui Zhao, Feng Li, Shuguang Wang, Minggang Zheng, Yulong Shen, Zhiwei Zhang, Xin Guo:
Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles. Veh. Commun. 45: 100708 (2024) - [c17]Lele Zheng, Yang Cao, Renhe Jiang, Kenjiro Taura, Yulong Shen, Sheng Li, Masatoshi Yoshikawa:
Enhancing Privacy of Spatiotemporal Federated Learning Against Gradient Inversion Attacks. DASFAA (1) 2024: 457-473 - [c16]Cheng Zhou, Guangxia Li, Yulong Shen:
A Simple and Effective Method for Anomaly Detection on Attributed Graphs via Feature Consistency. ICASSP 2024: 7780-7784 - [c15]Yuanyu Zhang, Jia-Ning Wang, Zhumeng Zheng, Yulong Shen, Yunsong Jiang, Mengfei Yang:
Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofing. NaNA 2024: 172-178 - [c14]Jian Yang, Xinyu Hu
, Yulong Shen, Gang Xiao:
Refining Pre-trained Language Models for Domain Adaptation with Entity-Aware Discriminative and Contrastive Learning. SDM 2024: 409-417 - [i6]Lele Zheng, Yang Cao, Renhe Jiang, Kenjiro Taura, Yulong Shen, Sheng Li
, Masatoshi Yoshikawa:
Enhancing Privacy of Spatiotemporal Federated Learning against Gradient Inversion Attacks. CoRR abs/2407.08529 (2024) - [i5]Lele Zheng, Yang Cao, Renhe Jiang, Kenjiro Taura, Yulong Shen, Sheng Li, Masatoshi Yoshikawa:
Extracting Spatiotemporal Data from Gradients with Large Language Models. CoRR abs/2410.16121 (2024) - [i4]Bowen Zhao, Jiuhui Li, Peiming Xu, Xiaoguo Li, Qingqi Pei, Yulong Shen:
TRUST: A Toolkit for TEE-Assisted Secure Outsourced Computation over Integers. CoRR abs/2412.01073 (2024) - 2023
- [j9]Yulong Shen, Nengji Zhou
:
Numerical variational studies of quantum phase transitions in the sub-Ohmic spin-boson model with multiple polaron ansatz. Comput. Phys. Commun. 293: 108895 (2023) - [c13]Jian Yang, Xinyu Hu, Weichun Huang, Hao Yuan, Yulong Shen, Gang Xiao:
Advancing Domain Adaptation of BERT by Learning Domain Term Semantics. KSEM (4) 2023: 12-24 - 2022
- [c12]Guangxia Li, Gang Xiao
, Junbo Zhang, Jia Liu, Yulong Shen:
Towards Relational Multi-Agent Reinforcement Learning via Inductive Logic Programming. ICANN (2) 2022: 99-110 - [c11]Zewei Guo, Shuangrui Zhao, Jiandong Wang, Haipeng Lit, Yulong Shen:
Optimal Location Design for UAV Covert Communications with a Full-Duplex Receiver. NaNA 2022: 35-40 - [c10]Xinghong Jiang, Xuan Li, Chenyang Lv, Yong Ma, Yulong Shen, Meibin He, Guozheng Li:
An Encrypted Abnormal Stream Detection Method Based on Improved Skyline Computation. NaNA 2022: 198-204 - [c9]Jiandong Wang, Xiang Xia, Zhiwei Zhang, Yuanyu Zhang, Yulong Shen, Baoquan Ren:
Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization. NaNA 2022: 489-494 - [c8]Lu Sun, Liang Wu, Zaichen Zhang, Jian Dang, Yulong Shen, Gefeng Huang, Liliang Ding:
An Intelligent Indoor Localization System in the NLOS Environment Based on Deep Learning and CSI Images. WCSP 2022: 455-459 - [e1]Honghao Gao, Jun Wun, Jianwei Yin, Feifei Shen, Yulong Shen, Jun Yu:
Communications and Networking - 16th EAI International Conference, ChinaCom 2021, Virtual Event, November 21-22, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 433, Springer 2022, ISBN 978-3-030-99199-9 [contents] - 2021
- [c7]Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. USENIX Security Symposium 2021: 3291-3308 - [i3]Jian Yang, Gang Xiao, Yulong Shen, Wei Jiang, Xinyu Hu
, Ying Zhang, Jinghui Peng:
A Survey of Knowledge Enhanced Pre-trained Models. CoRR abs/2110.00269 (2021) - 2020
- [i2]Yanni Li, Bing Liu, Jiangtao Cui, Zhi Wang, Yulong Shen, Yueshen Xu, Kaicheng Yao:
Similarities and Evolutionary Relationships of COVID-19 and Related Viruses. CoRR abs/2003.05580 (2020)
2010 – 2019
- 2019
- [j8]Bo Shen, Yulong Shen, Wen Ji:
Profit optimization in service-oriented data market: A Stackelberg game approach. Future Gener. Comput. Syst. 95: 17-25 (2019) - [j7]Wengui Su, Xiang Wang
, Fu Li, Yulong Shen, Qingqi Pei:
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering. Multim. Tools Appl. 78(7): 7927-7945 (2019) - [c6]Yeqiu Xiao, Yulong Shen, Yong Zeng, Yuzhen Zhang:
Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks. ICC 2019: 1-6 - 2018
- [c5]Juntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori:
Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm. ICNC 2018: 215-219 - 2017
- [j6]Le Xiao, Wei Wei, Weidong Yang, Yulong Shen, Xianglin Wu:
A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput. 21(13): 3713-3721 (2017) - [c4]Jiao Quan, Xiaochen Li, Yeqiu Xiao, Yulong Shen, Fenghua Li:
Secure Transmission with Limited Feedback in MISOME Wiretap Channels. NaNA 2017: 48-53 - [i1]Juntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori:
Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction. CoRR abs/1708.06926 (2017) - 2016
- [j5]Fangwei Wang, Wen-Yan Huang, Yulong Shen, Changguang Wang:
Analysis of SVEIR worm attack model with saturated incidence and partial immunization. J. Commun. Inf. Networks 1(4): 105-115 (2016) - 2014
- [j4]Yulong Shen, Yuanyu Zhang:
Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming. Inf. Sci. 281: 201-210 (2014) - [j3]Yulong Shen, Yuanyu Zhang:
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks. EAI Endorsed Trans. Scalable Inf. Syst. 1(2): e2 (2014) - 2012
- [j2]Yulong Shen, Qingqi Pei, Qijian Xu, Zhiwei Zhang:
The multimedia service session handoff method in heterogeneous wireless networks. Int. J. Grid Util. Comput. 3(1): 68-77 (2012) - [c3]Yinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, Yahui Li:
Security Information Flow Control Model and Method in MILS. CIS 2012: 591-595 - 2011
- [c2]Yulong Shen, Qingzhen Liu, Wenzhong Guo:
Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization. ICNC 2011: 2179-2183 - 2010
- [c1]Yahui Li, Xining Cui, Linping Hu, Yulong Shen:
Efficient security transmission protocol with identity-based encryption in wireless mesh networks. HPCS 2010: 679-685
2000 – 2009
- 2003
- [j1]France Laliberté, Langis Gagnon, Yulong Shen:
Registration and Fusion of Retinal Images - An Evaluation Study. IEEE Trans. Medical Imaging 22(5): 661-673 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-23 04:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint