default search action
Zhong Chen 0001
Person information
- affiliation: Peking University, School of Electronics Engineering and Computer Science, Beijing, China
Other persons with the same name
- Zhong Chen — disambiguation page
- Zhong Chen 0002 — South China University of Technology, School of Mechanical & Automotive Engineering, Guangzhou, China
- Zhong Chen 0003 — Xavier University of Louisiana, New Orleans, LA, USA (and 1 more)
- Zhong Chen 0004 — Nanyang Technological University, School of Materials Science and Engineering, Singapore
- Zhong Chen 0005 — Xiamen University, Department of Communication Engineering, Fujian Key Laboratory of Plasma and Magnetic Resonance, China
- Zhong Chen 0006 — Sun Yat-sen University, School of Chemistry, Guangzhou, China
- Zhong Chen 0007 — East China Normal University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j41]Xihan Zhang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Hao Hu, Zhong Chen:
A sharding blockchain-based UAV system for search and rescue missions. Frontiers Comput. Sci. 19(3): 193805 (2025) - 2024
- [j40]Kang Liu, Yang Lu, Shiyi Tan, Wei Liang, Huiping Sun, Zhong Chen:
CFAuditChain: Audit BlockChain Based On Cuckoo Filter. Comput. J. 67(6): 2208-2218 (2024) - [j39]Che Wang, Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Junjie Xia, Feng Gao, Zhi Guan, Zhong Chen:
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack. Frontiers Comput. Sci. 18(5): 185348 (2024) - [j38]Yue Li, Han Liu, Jianbo Gao, Jiashuo Zhang, Zhi Guan, Zhong Chen:
Accelerating block lifecycle on blockchain via hardware transactional memory. J. Parallel Distributed Comput. 184: 104779 (2024) - [j37]Lipeng Wang, Mingsheng Hu, Zhijuan Jia, Zhi Guan, Zhong Chen:
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud. IEEE Trans. Inf. Forensics Secur. 19: 4572-4584 (2024) - [c144]Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. ICSE 2024: 164:1-164:13 - [c143]Ke Wang, L. Yue, Jianbo Gao, Che Wang, Zhi Guan, Zhong Chen:
RollupNet: Trustless State Channels for Real-Time Cross Rollup Contract Execution. INFOCOM (Workshops) 2024: 1-2 - [c142]Ziming Chen, Yue Li, Jianbo Gao, Jiashuo Zhang, Ke Wang, Jian-bin Hu, Zhi Guan, Zhong Chen:
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes. ISSRE 2024: 570-581 - [c141]Che Wang, Yue Li, Jianbo Gao, Ke Wang, Jiashuo Zhang, Zhi Guan, Zhong Chen:
SolaSim: Clone Detection for Solana Smart Contracts via Program Representation. ICPC 2024: 258-269 - [c140]Ke Wang, Yue Li, Che Wang, Jianbo Gao, Zhi Guan, Zhong Chen:
XGuard: Detecting Inconsistency Behaviors of Crosschain Bridges. SIGSOFT FSE Companion 2024: 612-616 - [c139]Libin Xia, Jiashuo Zhang, Che Wang, Zezhong Tan, Jianbo Gao, Zhi Guan, Zhong Chen:
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts. SANER 2024: 976-980 - [i18]Jiashuo Zhang, Yiming Shen, Jiachi Chen, Jianzhong Su, Yanlin Wang, Ting Chen, Jianbo Gao, Zhong Chen:
Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts. CoRR abs/2408.04939 (2024) - [i17]Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen:
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts. CoRR abs/2409.09661 (2024) - 2023
- [j36]Abba Garba, David J. Khoury, Patrick Balian, Samir Haddad, Jinane Sayah, Zhong Chen, Zhi Guan, Hani Hamdan, Jinan Charafeddine, Khalid Al Mutib:
LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications. IEEE Access 11: 28370-28383 (2023) - [j35]Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
DFHelper: Help clients to participate in federated learning tasks. Appl. Intell. 53(10): 12749-12773 (2023) - [j34]Lipeng Wang, Zhi Guan, Zhong Chen, Mingsheng Hu:
Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management. IEEE Internet Things J. 10(23): 20955-20968 (2023) - [j33]Lipeng Wang, Zhi Guan, Zhong Chen, Mingsheng Hu:
sChain: An Efficient and Secure Solution for Improving Blockchain Storage. IEEE Trans. Inf. Forensics Secur. 18: 3662-3676 (2023) - [c138]Ke Wang, Jianbo Gao, Qiao Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen:
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. ACSAC 2023: 216-228 - [c137]Ya Han, Jianbo Gao, Zhi Guan, Zhong Chen, Lifeng Ren:
Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology. BIOTC 2023: 15-22 - [c136]Libin Xia, Jiashuo Zhang, Xihan Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications. DAPPS 2023: 151-157 - [c135]Ya Han, Jianbo Gao, Zhi Guan, Zhong Chen, Lifeng Ren:
Intelligent New Energy Vehicle Battery Swap Scheme based on Blockchain Technology. ICBCT 2023: 57-63 - [c134]Jiashuo Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts. ICSE Companion 2023: 31-35 - [c133]Xiaofei Xu, Quan Z. Sheng, Boualem Benatallah, Zhong Chen, Robert Gazda, Abdulmotaleb El-Saddik, Munindar P. Singh:
Metaverse Services: The Way of Services Towards the Future. ICWS 2023: 179-185 - [c132]Jiakun Hao, Jianbo Gao, Peng Xiang, Jiashuo Zhang, Ziming Chen, Hao Hu, Zhong Chen:
TDID: Transparent and Efficient Decentralized Identity Management with Blockchain. SMC 2023: 1752-1759 - [i16]Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. CoRR abs/2312.09685 (2023) - 2022
- [j32]Zhenhao Wu, Jianbo Gao, Qingshan Li, Zhi Guan, Zhong Chen:
Make aspect-based sentiment classification go further: step into the long-document-level. Appl. Intell. 52(8): 8428-8447 (2022) - [c131]Meilin Lv, Kangjian Wei, Henry Kao, Huiping Sun, Zhong Chen:
ESUM: an efficient UTXO schedule model. ICBC 2022: 1-3 - [c130]Jianbo Gao, Jiashuo Zhang, Yue Li, Jiakun Hao, Ke Wang, Zhi Guan, Zhong Chen:
PShard: A Practical Sharding Protocol for Enterprise Blockchain. ICBTA 2022: 110-116 - [c129]Jianbo Gao, Jiashuo Zhang, Yue Li, Jiakun Hao, Ke Wang, Zhi Guan, Zhong Chen:
ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain. ICBTA 2022: 175-181 - [c128]Shiyi Tan, Yang Lu, Kang Liu, Huiping Sun, Zhong Chen:
DPLogChain: A Dynamic Packaging LogChain based on Random Witness. ICC 2022: 19-24 - [c127]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Yue Li, Zhi Guan, Zhong Chen:
TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment. ICC 2022: 1004-1009 - [c126]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. ASE 2022: 171:1-171:4 - [c125]Yu Dong, Yue Li, Dongqi Cui, Jianbo Gao, Zhi Guan, Zhong Chen:
Smifier: A Smart Contract Verifier for Composite Transactions. SEKE 2022: 507-512 - [i15]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. CoRR abs/2208.07119 (2022) - 2021
- [j31]Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen:
Correction to: A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14(4): 1869 (2021) - [j30]Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen:
A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14(5): 2665-2680 (2021) - [j29]Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava:
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme. IEEE Trans. Netw. Sci. Eng. 8(2): 1698-1710 (2021) - [c124]Ying Lan, Jianbo Gao, Yue Li, Ke Wang, Yuesheng Zhu, Zhong Chen:
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware. ICBTA 2021: 17-23 - [c123]Yue Li, Han Liu, Yuanliang Chen, Jianbo Gao, Zhenhao Wu, Zhi Guan, Zhong Chen:
FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory. ICDCS 2021: 250-260 - [c122]Ye Zou, Huiping Sun, Zhong Chen:
Associated Lattice-BERT for Spoken Language Understanding. ICONIP (6) 2021: 579-586 - [c121]Yanan Liu, Huiping Sun, Xu Song, Zhong Chen:
OverlapShard: Overlap-based Sharding Mechanism. ISCC 2021: 1-7 - [i14]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Ying Lan, Zhi Guan, Zhong Chen:
TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment. CoRR abs/2102.01970 (2021) - [i13]Ying Lan, Jianbo Gao, Ke Wang, Jiashuo Zhang, Zhenhao Wu, Yuesheng Zhu, Zhong Chen:
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware. CoRR abs/2103.13809 (2021) - 2020
- [j28]Chao Liu, Jianbo Gao, Yue Li, Huihui Wang, Zhong Chen:
Studying gas exceptions in blockchain-based cloud applications. J. Cloud Comput. 9: 35 (2020) - [j27]Lei Shi, Zhong Chen, Xiaohua Ding, Qiang Ma:
A new stable collocation method for solving a class of nonlinear fractional delay differential equations. Numer. Algorithms 85(4): 1123-1153 (2020) - [c120]Xian Chu, Huiping Sun, Zhong Chen:
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. Financial Cryptography Workshops 2020: 166-176 - [c119]Abba Garba, Qinwen Hu, Zhong Chen, Muhammad Rizwan Asghar:
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management. HPCC/DSS/SmartCity 2020: 824-829 - [c118]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. ICSME 2020: 826-829 - [c117]Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:
EShield: protect smart contracts against reverse engineering. ISSTA 2020: 553-556 - [i12]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. CoRR abs/2006.01476 (2020)
2010 – 2019
- 2019
- [j26]Ziqian Meng, Zhong Chen, Zhi Guan:
Peer-to-peer file sharing in next generation eXpressive Internet Architecture. CCF Trans. Netw. 1(1-4): 28-36 (2019) - [c116]Chao Liu, Jianbo Gao, Yue Li, Zhong Chen:
Understanding Out of Gas Exceptions on Ethereum. BlockSys 2019: 505-519 - [c115]Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352 - [c114]Zhenhao Wu, G. Wu, Kejing Yang, Yunfei Lan, Zhong Chen, Ernst Bekkering, Naixue Xiong:
Aspect Based Hierarchical System: A Fine-grained Sentiment Analysis System in Edge Computing. ICPS 2019: 731-736 - [c113]Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EasyFlow: keep ethereum away from overflow. ICSE (Companion Volume) 2019: 23-26 - [c112]Jianbo Gao, Han Liu, Yue Li, Chao Liu, Zhiqiang Yang, Qingshan Li, Zhi Guan, Zhong Chen:
Towards automated testing of blockchain-based decentralized applications. ICPC 2019: 294-299 - [i11]Jiashuo Zhang, Jianbo Gao, Zhenhao Wu, Wentian Yan, Qize Wu, Qingshan Li, Zhong Chen:
Performance Analysis of the Libra Blockchain: An Experimental Study. CoRR abs/1912.05241 (2019) - 2018
- [c111]Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. ICETE (2) 2018: 554-561 - [c110]Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:
ReGuard: finding reentrancy bugs in smart contracts. ICSE (Companion Volume) 2018: 65-68 - [i10]Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EASYFLOW: Keep Ethereum Away From Overflow. CoRR abs/1811.03814 (2018) - 2017
- [c109]Xiujia Guo, Zhao Wang, Zhong Chen:
Exploring the Network of Real-World Passwords: Visualization and Estimation. SecureComm 2017: 147-166 - [c108]Ziqian Meng, Zhong Chen, Zhi Guan:
Seamless service migration for human-centered computing in future Internet architecture. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - 2016
- [c107]Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan:
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68 - 2015
- [j25]Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen:
SCRHM: A Secure Continuous Remote Health Monitoring System. Int. J. Distributed Sens. Networks 11: 392439:1-392439:12 (2015) - [c106]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140 - [c105]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328 - [c104]Hongwei Meng, Chuck Song, Zhong Chen, Ziqian Meng:
Design of network mobility support in eXpressive Internet Architecture. ICCVE 2015: 169-174 - [c103]Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song:
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility. ICICS 2015: 269-281 - [c102]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305 - [c101]Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 - [c100]Huiping Sun, Ke Wang, Xu Li, Nan Qin, Zhong Chen:
PassApp: My App is My Password! MobileHCI 2015: 306-315 - [c99]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676 - [c98]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879 - [c97]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347 - [c96]Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan:
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 - [i9]Xiujia Guo, Haibo Chen, Xuqin Liu, Xiangyu Xu, Zhong Chen:
The Scale-free Network of Passwords : Visualization and Estimation of Empirical Passwords. CoRR abs/1511.08324 (2015) - 2014
- [j24]Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma:
Automated enforcement for relaxed information release with reference points. Sci. China Inf. Sci. 57(11): 1-19 (2014) - [j23]Song Luo, Zhong Chen:
Hierarchical identity-based encryption without key delegation in decryption. Int. J. Grid Util. Comput. 5(2): 71-79 (2014) - [j22]Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. Inf. Sci. 268: 447-457 (2014) - [c95]Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen:
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60 - [c94]Qing-Shan Li, Xiaolin Xu, Zhong Chen:
PUF-Based RFID Ownership Transfer Protocol in an Open Environment. PDCAT 2014: 131-137 - [c93]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 - [c92]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 - [c91]Liangwen Yu, Yonggang Wang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Edges Protection in Multiple Releases of Social Network Data. WAIM 2014: 669-680 - 2013
- [j21]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j20]Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013) - [j19]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j18]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - [j17]Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2): 927-932 (2013) - [j16]Huayou Si, Zhong Chen, Yong Deng, Lian Yu:
Semantic web services publication and OCT-based discovery in structured P2P network. Serv. Oriented Comput. Appl. 7(3): 169-180 (2013) - [c90]Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen:
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 - [c89]Tao Yang, Wei Xin, Liangwen Yu, Yong Yang, Jian-bin Hu, Zhong Chen:
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. APWeb 2013: 583-594 - [c88]Liu Yang, Minghui Qiu, Swapna Gottipati, Feida Zhu, Jing Jiang, Huiping Sun, Zhong Chen:
CQArank: jointly model topics and expertise in community question answering. CIKM 2013: 99-108 - [c87]Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen:
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287 - [c86]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 - [c85]Liangwen Yu, Tao Yang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Sensitive Edges Protection in Social Networks. WAIM 2013: 564-569 - [c84]Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen:
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740 - [c83]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 - 2012
- [j15]Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3): 573-581 (2012) - [j14]Hu Xiong, Zhong Chen, Fagen Li:
Bidder-anonymous English auction protocol based on revocable ring signature. Expert Syst. Appl. 39(8): 7062-7066 (2012) - [j13]Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. Int. J. Netw. Secur. 14(5): 297-300 (2012) - [j12]Suke Li, Zhi Guan, Liyong Tang, Zhong Chen:
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012) - [j11]Hu Xiong, Zhong Chen, Fagen Li:
Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3-4): 1213-1221 (2012) - [j10]Hu Xiong, Zhong Chen, Fagen Li:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. Secur. Commun. Networks 5(12): 1441-1451 (2012) - [j9]Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen:
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. ACM Trans. Sens. Networks 8(2): 14:1-14:19 (2012) - [c82]Yongming Jin, Wei Xin, Huiping Sun, Zhong Chen:
PUF-Based RFID Authentication Protocol against Secret Key Leakage. APWeb 2012: 318-329 - [c81]Huayou Si, Zhong Chen, Yun Zhao, Yong Deng:
P2P-Based Publication and Sharing of Axioms in OWL Ontologies for SPARQL Query Processing in Distributed Environment. APWeb 2012: 586-593 - [c80]Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen:
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. FSKD 2012: 2232-2236 - [c79]Tao Yang, Liyong Tang, Lingbo Kong, Zhong Chen:
On key issuing privacy in distributed online social networks. FSKD 2012: 2497-2501 - [c78]Wei Xin, Cong Tang, Tao Yang, Huiping Sun, Zhong Chen:
Towards privacy-preserving RFID-based location-based services. FSKD 2012: 2827-2831 - [c77]Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen:
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239 - [c76]Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen:
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407 - [c75]Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen:
Privacy Protection in Social Networks Using l-Diversity. ICICS 2012: 435-444 - [c74]Ying Chen, Qingni Shen, Pengfei Sun, Yangwei Li, Zhong Chen, Sihan Qing:
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation. IPDPS Workshops 2012: 2230-2236 - [c73]Wei Xin, Huiping Sun, Zhao Wang, Zhi Guan, Zhong Chen:
A RFID Path-Checking Protocol Based on Ordered Multisignatures. RFIDSec Asia 2012: 33-44 - [c72]Huayou Si, Zhong Chen, Yong Deng:
P2P-based Publication and Location of Web Ontology for Knowledge Sharing in Virtual Communities. SEKE 2012: 617-621 - [c71]Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen:
iSac: Intimacy Based Access Control for Social Network Sites. UIC/ATC 2012: 517-524 - [c70]Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen:
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System. UIC/ATC 2012: 525-532 - [c69]Tao Yang, Lingbo Kong, Liangwen Yu, Jian-bin Hu, Zhong Chen:
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs. WAIM 2012: 352-362 - 2011
- [j8]Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li:
On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2): 129-135 (2011) - [j7]Hu Xiong, Zhong Chen, Zhiguang Qin:
Efficient three-party authenticated key agreement protocol in certificateless cryptography. Int. J. Comput. Math. 88(13): 2707-2716 (2011) - [j6]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
Sorcery: Overcoming deceptive votes in P2P content sharing systems. Peer-to-Peer Netw. Appl. 4(2): 178-191 (2011) - [c68]Cong Sun, Liyong Tang, Zhong Chen:
Enforcing Relaxed Declassifications with Reference Points. ACIS-ICIS 2011: 76-81 - [c67]Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 - [c66]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen:
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381 - [c65]Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen:
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. CISIS 2011: 238-245 - [c64]Yu Chen, Song Luo, Zhong Chen:
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model. DBSec 2011: 263-270 - [c63]Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen:
A Novel Commutative Blinding Identity Based Encryption Scheme. FPS 2011: 73-89 - [c62]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen:
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature. FSKD 2011: 2217-2221 - [c61]Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing:
A Variant of Boyen-Waters Anonymous IBE Scheme. ICICS 2011: 42-56 - [c60]Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen:
Lightweight RFID Mutual Authentication Protocol against Feasible Problems. ICICS 2011: 69-77 - [c59]Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma:
A Multi-compositional Enforcement on Information Flow Security. ICICS 2011: 345-359 - [c58]Song Luo, Qingni Shen, Zhong Chen:
Fully Secure Unidirectional Identity-Based Proxy Re-encryption. ICISC 2011: 109-126 - [c57]Hu Xiong, Qianhong Wu, Zhong Chen:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. INCoS 2011: 92-99 - [c56]Longzhi Du, Yonggang Wang, Jian-bin Hu, Zhong Chen:
Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior. ISPA 2011: 270-275 - [c55]Zhi Guan, Hu Xiong, Suke Li, Zhong Chen:
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 - [c54]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54 - [c53]Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70 - [c52]Hu Xiong, Qianhong Wu, Zhong Chen:
Toward Pairing-Free Certificateless Authenticated Key Exchanges. ISC 2011: 79-94 - [c51]Cong Sun, Liyong Tang, Zhong Chen:
Enforcing Reactive Noninterference with Reachability Analysis. ITNG 2011: 321-326 - [i8]Ruichuan Chen, Eng Keong Lua, Zhuhua Cai, Jon Crowcroft, Zhong Chen:
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service. CoRR abs/1108.1343 (2011) - [i7]Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen:
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms. CoRR abs/1108.1350 (2011) - [i6]Cong Sun, Liyong Tang, Zhong Chen:
A New Enforcement on Declassification with Reachability Analysis. CoRR abs/1108.4172 (2011) - [i5]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptol. ePrint Arch. 2011: 90 (2011) - 2010
- [j5]Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu:
Filtering false data via authentic consensus in vehicle ad hoc networks. Int. J. Auton. Adapt. Commun. Syst. 3(2): 217-235 (2010) - [j4]Dihui Bao, Yelu Chen, Huiping Sun, Zhong Chen:
Supermarket Service Modeling and Evaluation. Int. J. Serv. Sci. Manag. Eng. Technol. 1(2): 33-50 (2010) - [j3]Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. J. Comput. Sci. Technol. 25(2): 375-387 (2010) - [j2]Nike Gui, Jian-bin Hu, Zhong Chen:
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. J. Networks 5(5): 535-542 (2010) - [c50]Suke Li, Jinmei Hao, Zhong Chen:
Generating Tags for Service Reviews. ADMA (2) 2010: 463-474 - [c49]Huiping Sun, Junde Song, Zhong Chen:
Survey of Authentication in Mobile IPv6 Network. CCNC 2010: 1-4 - [c48]Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:
Identity-based encryption based on DHIES. AsiaCCS 2010: 82-88 - [c47]Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:
When ABE Meets RSS. DBSec 2010: 319-326 - [c46]Song Luo, Jian-bin Hu, Zhong Chen:
New construction of identity-based proxy re-encryption. Digital Rights Management Workshop 2010: 47-50 - [c45]Yonggang Wang, Ennan Zhai, Jian-bin Hu, Zhong Chen:
Claper: Recommend classical papers to beginners. FSKD 2010: 2777-2781 - [c44]Suke Li, Zhong Chen:
Social Services Computing: Concepts, Research Challenges, and Directions. GreenCom/CPSCom 2010: 840-845 - [c43]Yong Deng, Zhonghai Wu, Cong Tang, Huayou Si, Hu Xiong, Zhong Chen:
A Hybrid Movie Recommender Based on Ontology and Neural Networks. GreenCom/CPSCom 2010: 846-851 - [c42]Anmin Xie, Cong Tang, Nike Gui, Zhuhua Cai, Jian-bin Hu, Zhong Chen:
An Adjacency Matrixes-Based Model for Network Security Analysis. ICC 2010: 1-5 - [c41]Song Luo, Jian-bin Hu, Zhong Chen:
Ciphertext Policy Attribute-Based Proxy Re-encryption. ICICS 2010: 401-415 - [c40]Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jian-bin Hu, Zhong Chen:
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability. ICPADS 2010: 139-146 - [c39]Song Luo, Jian-bin Hu, Zhong Chen:
Implementing Attribute-Based Encryption in Web Services. ICWS 2010: 658-659 - [c38]Huayou Si, Yun Zhao, Hengnian Qi, Zhong Chen:
The design and implementation of an approach to publish and discover Semantic Web Services. ISKE 2010: 406-411 - [c37]Suke Li, Jinmei Hao, Zhong Chen:
Tagging online service reviews. NLPKE 2010: 1-4 - [c36]Suke Li, Jinmei Hao, Zhong Chen:
Graph-based service quality evaluation through mining Web reviews. NLPKE 2010: 1-8 - [c35]Cong Sun, Liyong Tang, Zhong Chen:
Secure Information Flow in Java via Reachability Analysis of Pushdown System. QSIC 2010: 142-150 - [c34]Yulin Ni, Huayou Si, Weiping Li, Zhong Chen:
PDUS: P2P-Based Distributed UDDI Service Discovery Approach. ICSS 2010: 3-8 - [c33]Huayou Si, Yulin Ni, Zhong Chen, Lian Yu, Yun Zhao:
An Approach to Semantic Web Services Publication and Discovery Based on OWL Ontology Inference. SOSE 2010: 129-136 - [c32]Nike Gui, Ennan Zhai, Jian-bin Hu, Zhong Chen:
SWORDS: Improving Sensor Networks Immunity under Worm Attacks. WAIM 2010: 86-96 - [c31]Jinmei Hao, Suke Li, Zhong Chen:
Extracting Service Aspects from Web Reviews. WISM 2010: 320-327 - [i4]Hu Xiong, Jian-bin Hu, Tao Yang, Wei Xin, Zhong Chen:
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy. CoRR abs/1008.5015 (2010) - [i3]Hu Xiong, Zhong Chen:
Privacy-Preserving English Auction Protocol with Round Efficiency. CoRR abs/1010.5642 (2010) - [i2]Cong Sun, Liyong Tang, Zhong Chen:
Secure Information Flow by Model Checking Pushdown System. CoRR abs/1012.3100 (2010) - [i1]Song Luo, Jian-bin Hu, Zhong Chen:
New Construction of Identity-based Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2010: 444 (2010)
2000 – 2009
- 2009
- [c30]Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen:
Evaluating Network Security With Two-Layer Attack Graphs. ACSAC 2009: 127-136 - [c29]Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong Chen:
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis. ASONAM 2009: 95-100 - [c28]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
SpamClean: Towards Spam-Free Tagging Systems. CSE (4) 2009: 429-435 - [c27]Suke Li, Liyong Tang, Jian-bin Hu, Zhong Chen:
Automatic Data Extraction from Web Discussion Forums. FCST 2009: 219-225 - [c26]Ennan Zhai, Ruichuan Chen, Eng Keong Lua, Long Zhang, Huiping Sun, Zhuhua Cai, Sihan Qing, Zhong Chen:
SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam. GLOBECOM 2009: 1-6 - [c25]Yongming Jin, Huiping Sun, Zhong Chen:
Hash-Based Tag Ownership Transfer Protocol against Traceability. ICEBE 2009: 487-492 - [c24]Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen:
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. ICICS 2009: 226-240 - [c23]Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen:
SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. ICNS 2009: 296-302 - [c22]Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua, Huiping Sun, Sihan Qing, Liyong Tang, Zhong Chen:
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. Peer-to-Peer Computing 2009: 11-20 - [c21]Zhuhua Cai, Ruichuan Chen, Jianqiao Feng, Cong Tang, Zhong Chen, Jian-bin Hu:
A holistic mechanism against file pollution in peer-to-peer networks. SAC 2009: 28-34 - [c20]Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen:
Securing key issuing in peer-to-peer networks. SAC 2009: 84-85 - [c19]Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen, Jian-bin Hu:
A New Method to Generate Attack Graphs. SSIRI 2009: 401-406 - 2008
- [j1]Zhen Cao, Jian-bin Hu, Zhong Chen, Maoxing Xu, Xia Zhou:
FBSR: feedback-based secure routing protocol for wireless sensor networks. Int. J. Pervasive Comput. Commun. 4(1): 61-76 (2008) - [c18]Yong Liu, Zhong Chen, Yu Chen:
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. AINA Workshops 2008: 608-614 - [c17]Yonggang Wang, Nike Gui, Jian-bin Hu, Zhong Chen:
Automatic Construction and Optimization of Layered Network Attack Graph. TeNe 2008: 135-138 - [c16]Ruichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen:
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. Euro-Par 2008: 601-610 - [c15]Yongming Jin, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:
An Improved Scheme for Delegation Based on Usage Control. FGCN (1) 2008: 74-78 - [c14]Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan:
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. ICDCS 2008: 689-696 - [c13]Yan Li, Ming Zhao, Huiping Sun, Zhong Chen:
A Trust and Risk Framework to Enhance Reliable Interaction in E-Commerce. ICEBE 2008: 475-480 - [c12]Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan:
Pseudo-randomness Inside Web Browsers. ICICS 2008: 267-278 - [c11]Suke Li, Zhong Chen, Liyong Tang, Zhao Wang:
TSearch: A Self-learning Vertical Search Spider for Travel. ICYCS 2008: 348-353 - [c10]Ming Zhao, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:
A Game Theoretic Approach Based Access Control Mechanism. ICYCS 2008: 1464-1469 - [c9]Zhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan:
Efficient Identity-Based Key Issue with TPM. ICYCS 2008: 2354-2359 - [c8]Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenjia Guo, Liyong Tang, Zhong Chen:
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. Peer-to-Peer Computing 2008: 22-29 - 2007
- [c7]Yong Wu, Zhong Chen, Qi Jing, Yongcai Wang:
LENO: LEast Rotation Near-Optimal Cluster Head Rotation Strategy in Wireless Sensor Networks. AINA 2007: 195-201 - [c6]Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen:
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. ATC 2007: 203-215 - [c5]Ruichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen:
Hybrid Overlay Structure Based on Virtual Node. ISCC 2007: 1091-1098 - [c4]Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ISPEC 2007: 129-144 - 2006
- [c3]Zhen Cao, Jian-bin Hu, Zhong Chen, Maoxing Xu, Xia Zhou:
Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks. AINA (2) 2006: 160-164 - [c2]Qi Jing, Jian-bin Hu, Zhong Chen:
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks. MASS 2006: 827-832 - 2005
- [c1]Peng Liu, Jian-bin Hu, Zhong Chen:
A Formal Language for Access Control Policies in Distributed Environment. Web Intelligence 2005: 766-769
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint