


default search action
Yuancheng Li 0005
Person information
Other persons with the same name
- Yuancheng Li — disambiguation page
- Yuancheng Li 0001
- Yuancheng Li 0002
- Yuancheng Li 0003
- Yuancheng Li 0004
- Yuancheng Li 0006
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Liguang Zang
, Yuancheng Li
:
Clean-label attack based on negative afterimage on neural networks. Int. J. Mach. Learn. Cybern. 16(1): 449-460 (2025) - [j47]Rong Huang
, Yuancheng Li
, Peidong Yin
, Xingyu Shang
, Yuanyuan Wang:
Transferable Attention-Distracting Adversarial Attack on Data-Driven Models for Power Systems. IEEE Trans. Inf. Forensics Secur. 20: 4985-4998 (2025) - 2024
- [j46]Zhichao Ju
, Yuancheng Li
:
Vehicle-to-Vehicle Energy Sharing Scheme: A Privacy-Preserving Solution Based on Local Differential Privacy Method. IEEE Netw. 38(6): 106-112 (2024) - [j45]Sardar Shan Ali Naqvi
, Yuancheng Li
, Muhammad Uzair
:
DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Comput. Sci. 10: e1784 (2024) - [j44]Jiawei Liu, Qingle Wang
, Qingxia Mu, Yuancheng Li
, Long Cheng, Wenqi Sun:
Advancing multi-party quantum key agreement protocols: the power of a two-layer approach. Quantum Inf. Process. 23(3): 97 (2024) - [j43]Zhiying Liu
, Yuancheng Li
, Qingle Wang
, Jianbin Li
:
TSCW-GAN Based FDIAs Defense for State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks. IEEE Trans. Ind. Informatics 20(4): 5048-5059 (2024) - [j42]Zhichao Ju
, Yuancheng Li
:
Local Differential Privacy-Based Privacy-Preserving Data Range Query Scheme for Electric Vehicle Charging. IEEE Trans. Netw. Sci. Eng. 11(1): 673-684 (2024) - [j41]Zhichao Ju
, Yuancheng Li
:
V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm. IEEE Trans. Netw. Sci. Eng. 11(1): 1093-1105 (2024) - [c9]Sardar Shan Ali Naqvi
, Yuancheng Li
, Muhammad Uzair:
DDoS Attack Detection in Smart Grid Networks Using Visual Features. ICCR 2024: 1-5 - 2023
- [j40]Yuancheng Li
, Chaohang Yu, Yaqi Cui:
TPCaps: a framework for code clone detection and localization based on improved CapsNet. Appl. Intell. 53(13): 16594-16605 (2023) - [j39]Liguang Zang
, Yuancheng Li
, Hui Chen
:
Multilabel Recognition Algorithm With Multigraph Structure. IEEE Trans. Circuits Syst. Video Technol. 33(2): 782-792 (2023) - [j38]Rong Huang
, Yuancheng Li
:
Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System. IEEE Trans. Smart Grid 14(3): 2367-2376 (2023) - 2022
- [j37]Yuancheng Li
, Shenglong Zhou
, Hui Chen
:
Attention-based fusion factor in FPN for object detection. Appl. Intell. 52(13): 15547-15556 (2022) - [j36]Haiqing Liu, Ming Ai, Rong Huang, Rixuan Qiu, Yuancheng Li
:
Identity authentication for edge devices based on zero-trust architecture. Concurr. Comput. Pract. Exp. 34(23) (2022) - [j35]Hui Chen
, Hao Mao, Yuancheng Li
:
Elliptical convolution kernel: More real visual field. Neurocomputing 492: 107-116 (2022) - [j34]Long Cheng
, Archana Kalapgar, Amogh Jain, Yue Wang, Yongtai Qin, Yuancheng Li
, Cong Liu
:
Cost-aware real-time job scheduling for hybrid cloud using deep reinforcement learning. Neural Comput. Appl. 34(21): 18579-18593 (2022) - [j33]Mingming Meng, Yuancheng Li
:
SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks. PeerJ Comput. Sci. 8: e1027 (2022) - [j32]Yifeng Huang, Long Cheng
, Lianting Xue
, Cong Liu
, Yuancheng Li
, Jianbin Li, Tomás Ward
:
Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling. IEEE Syst. J. 16(3): 4232-4242 (2022) - [j31]Rong Huang
, Yuancheng Li
:
False Phasor Data Detection Under Time Synchronization Attacks: A Neural Network Approach. IEEE Trans. Smart Grid 13(6): 4828-4836 (2022) - [j30]Yuancheng Li
, Rongyan Yang
:
Edge Computing Offloading Strategy Based on Dynamic Non-cooperative Games in D-IoT. Wirel. Pers. Commun. 122(1): 109-127 (2022) - 2021
- [j29]Qingle Wang
, Chaohang Yu, Yuancheng Li
, Jiangshan Liu, Runhua Shi
, Yuqian Zhou:
Authenticated Quantum Sortition and Application in "Picking at Random" Problems. IEEE Commun. Lett. 25(2): 518-522 (2021) - [j28]Yuancheng Li
, Rong Huang
, Longqiang Ma:
False Data Injection Attack and Defense Method on Load Frequency Control. IEEE Internet Things J. 8(4): 2910-2919 (2021) - [j27]Yuancheng Li
, Rong Huang
, Longqiang Ma:
Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack. IEEE Internet Things J. 8(20): 15522-15530 (2021) - [j26]Haiqing Liu, Daoxing Li, Yuancheng Li
:
Confident sequence learning: A sequence class-label noise filtering technique to improve scene digit recognition. J. Intell. Fuzzy Syst. 40(5): 9345-9359 (2021) - [j25]Guixian Wu, Yuancheng Li
:
Non-maximum suppression for object detection based on the chaotic whale optimization algorithm. J. Vis. Commun. Image Represent. 74: 102985 (2021) - [j24]Guixian Wu, Yuancheng Li
:
CyclicNet: an alternately updated network for semantic segmentation. Multim. Tools Appl. 80(2): 3213-3227 (2021) - [j23]Haiqing Liu, Daoxing Li, Yuancheng Li
:
Poisonous Label Attack: Black-Box Data Poisoning Attack with Enhanced Conditional DCGAN. Neural Process. Lett. 53(6): 4117-4142 (2021) - [j22]Rixuan Qiu, Xiong Liu, Rong Huang, Fuyong Zheng, Liang Liang, Yuancheng Li
:
Differential privacy EV charging data release based on variable window. PeerJ Comput. Sci. 7: e481 (2021) - [j21]Qingle Wang, Yuancheng Li
, Chaohang Yu, Runhua Shi, Zhichao Zhang:
Quantum-based anonymity and secure veto. Quantum Inf. Process. 20(3): 85 (2021) - [j20]Qingle Wang, Jiangshan Liu, Yuancheng Li
, Chaohang Yu, Shijie Pan
:
Quantum Bell states-based anonymous voting with anonymity trace. Quantum Inf. Process. 20(4): 142 (2021) - [j19]Yuancheng Li
, Baiji Hu
:
A Consortium Blockchain-Enabled Secure and Privacy-Preserving Optimized Charging and Discharging Trading Scheme for Electric Vehicles. IEEE Trans. Ind. Informatics 17(3): 1968-1977 (2021) - [c8]Lianting Xue, Long Cheng
, Yuancheng Li
, Ying Mao:
Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 204-208 - 2020
- [j18]Yuancheng Li
, Wendan Huo, Rixuan Qiu, Jing Zeng
:
Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 110-118 (2020) - [j17]Yuancheng Li
, Boyan Wang
, Baiji Hu
:
Semantically find similar binary codes with mixed key instruction sequence. Inf. Softw. Technol. 125: 106320 (2020) - [j16]Yuancheng Li
, Haiyan Hou, Wenping Chen:
A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing. Inf. Secur. J. A Glob. Perspect. 29(6): 284-296 (2020) - [j15]Qingle Wang
, Yuancheng Li
, Chaohang Yu, Hui He, Kejia Zhang:
Quantum anonymous ranking and selection with verifiability. Quantum Inf. Process. 19(5): 166 (2020) - [j14]Yuancheng Li
, Baiji Hu
:
An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain. IEEE Trans. Smart Grid 11(3): 2627-2637 (2020)
2010 – 2019
- 2019
- [j13]Yuancheng Li
, Yuanyuan Wang
:
False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid. IEEE Access 7: 3656-3664 (2019) - [j12]Yuancheng Li
, Pan Zhang, Rong Huang
:
Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid. IEEE Access 7: 36285-36293 (2019) - [j11]Shan Ali
, Yuancheng Li
:
Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network. IEEE Access 7: 108647-108659 (2019) - [j10]Haiqing Liu, Yan Zhang, Shiqiang Zheng, Yuancheng Li
:
Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network. IEEE Access 7: 160546-160558 (2019) - [j9]Yuancheng Li
, Yimeng Wang
, Daoxing Li
:
Privacy-preserving lightweight face recognition. Neurocomputing 363: 212-222 (2019) - [j8]Yuancheng Li
, Yuanyuan Wang, Shuhua Hao, Xiaoyu Zhao:
Intelligent terminal face spoofing detection algorithm based on deep belief network. J. Electronic Imaging 28(4): 043024 (2019) - [j7]Yuancheng Li
, Pan Zhang, Longqiang Ma:
Denial of service attack and defense method on load frequency control system. J. Frankl. Inst. 356(15): 8625-8645 (2019) - [c7]Bin Liu, Hao Yang, Yuancheng Li
, Yuxiang Li, Dangdang Niu, Zhiming Lv:
An Improved Programming Model for Thread-Level Speculation. ISPA/BDCloud/SocialCom/SustainCom 2019: 666-672 - 2018
- [j6]Yuancheng Li
, Xiangqian Nie, Rong Huang:
Web spam classification method based on deep belief networks. Expert Syst. Appl. 96: 261-270 (2018) - 2017
- [j5]Yuancheng Li
, Yan Li:
Face aging effect simulation model based on multilayer representation and shearlet transform. J. Electronic Imaging 26(5): 53011 (2017) - 2016
- [j4]Yuancheng Li
, Panpan Guo, Xiang Li
:
Short-Term Load Forecasting Based on the Analysis of User Electricity Behavior. Algorithms 9(4): 80 (2016) - 2010
- [j3]Yuancheng Li
, Qiu Yang, Runhai Jiao:
Image compression scheme based on curvelet transform and support vector machine. Expert Syst. Appl. 37(4): 3063-3069 (2010)
2000 – 2009
- 2009
- [j2]Yinglong Ma
, Shipeng Zhang, Yuancheng Li
, Zheng Yi, Shaohua Liu:
An approach for multi-agent coordination based on semantic approximation. Int. J. Intell. Inf. Database Syst. 3(2): 163-179 (2009) - [c6]Yuancheng Li
, Jie Yang:
A Novel Method to Extract Informative Blocks from Web Pages. JCAI 2009: 536-539 - 2007
- [j1]Bo Li, Runhai Jiao, Yuancheng Li
:
Fast Adaptive Wavelet for Remote Sensing Image Compression. J. Comput. Sci. Technol. 22(5): 770-778 (2007) - [c5]Yuancheng Li
, Haitao Hu:
Image Compression Using Wavelet Support Vector Machines. ICIC (1) 2007: 922-929 - [c4]Yuancheng Li
, Kehe Wu, Yinglong Ma
, Shipeng Zhang:
Image Digital Watermarking Technique Based on Kernel Independent Component Analysis. RSFDGrC 2007: 467-474 - 2005
- [c3]Runhai Jiao, Yuancheng Li
, Qingyuan Wang, Bo Li:
SVM Regression and Its Application to Image Compression. ICIC (1) 2005: 747-756 - 2003
- [c2]Yuancheng Li
, Tingjian Fang:
Rough Set Methods for Constructing Support Vector Machines. RSFDGrC 2003: 334-338 - [c1]Yuancheng Li
, Tingjian Fang:
Application of Fuzzy Support Vector Machines in Short-Term Load Forecasting. RSFDGrC 2003: 363-367
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-19 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint