![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Zhong Chen 0001
Person information
- affiliation: Peking University, School of Electronics Engineering and Computer Science, Beijing, China
Other persons with the same name
- Zhong Chen — disambiguation page
- Zhong Chen 0002
— South China University of Technology, School of Mechanical & Automotive Engineering, Guangzhou, China
- Zhong Chen 0003
— Xavier University of Louisiana, New Orleans, LA, USA (and 1 more)
- Zhong Chen 0004
— Nanyang Technological University, School of Materials Science and Engineering, Singapore
- Zhong Chen 0005
— Xiamen University, Department of Communication Engineering, Fujian Key Laboratory of Plasma and Magnetic Resonance, China
- Zhong Chen 0006
— Sun Yat-sen University, School of Chemistry, Guangzhou, China
- Zhong Chen 0007
— East China Normal University, Shanghai, China
Refine list
![note](https://dblp.dagstuhl.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j41]Xihan Zhang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Hao Hu, Zhong Chen:
A sharding blockchain-based UAV system for search and rescue missions. Frontiers Comput. Sci. 19(3): 193805 (2025) - 2024
- [j40]Kang Liu, Yang Lu, Shiyi Tan, Wei Liang, Huiping Sun, Zhong Chen:
CFAuditChain: Audit BlockChain Based On Cuckoo Filter. Comput. J. 67(6): 2208-2218 (2024) - [j39]Che Wang, Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Junjie Xia, Feng Gao, Zhi Guan, Zhong Chen:
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack. Frontiers Comput. Sci. 18(5): 185348 (2024) - [j38]Yue Li, Han Liu, Jianbo Gao, Jiashuo Zhang, Zhi Guan, Zhong Chen:
Accelerating block lifecycle on blockchain via hardware transactional memory. J. Parallel Distributed Comput. 184: 104779 (2024) - [j37]Lipeng Wang
, Mingsheng Hu, Zhijuan Jia
, Zhi Guan, Zhong Chen
:
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud. IEEE Trans. Inf. Forensics Secur. 19: 4572-4584 (2024) - [c145]Jiashuo Zhang
, Jiachi Chen
, Zhiyuan Wan
, Ting Chen
, Jianbo Gao
, Zhong Chen
:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. ICSE 2024: 164:1-164:13 - [c144]Ke Wang, L. Yue, Jianbo Gao, Che Wang, Zhi Guan, Zhong Chen:
RollupNet: Trustless State Channels for Real-Time Cross Rollup Contract Execution. INFOCOM (Workshops) 2024: 1-2 - [c143]Ziming Chen, Yue Li, Jianbo Gao, Jiashuo Zhang, Ke Wang, Jian-bin Hu, Zhi Guan, Zhong Chen:
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes. ISSRE 2024: 570-581 - [c142]Che Wang
, Yue Li
, Jianbo Gao
, Ke Wang
, Jiashuo Zhang
, Zhi Guan
, Zhong Chen
:
SolaSim: Clone Detection for Solana Smart Contracts via Program Representation. ICPC 2024: 258-269 - [c141]Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen:
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts. ASE 2024: 2350-2353 - [c140]Ke Wang
, Yue Li
, Che Wang
, Jianbo Gao
, Zhi Guan
, Zhong Chen
:
XGuard: Detecting Inconsistency Behaviors of Crosschain Bridges. SIGSOFT FSE Companion 2024: 612-616 - [c139]Libin Xia, Jiashuo Zhang, Che Wang, Zezhong Tan, Jianbo Gao, Zhi Guan, Zhong Chen:
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts. SANER 2024: 976-980 - [i18]Jiashuo Zhang, Yiming Shen, Jiachi Chen, Jianzhong Su, Yanlin Wang, Ting Chen, Jianbo Gao, Zhong Chen:
Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts. CoRR abs/2408.04939 (2024) - [i17]Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen:
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts. CoRR abs/2409.09661 (2024) - 2023
- [j36]Abba Garba
, David J. Khoury
, Patrick Balian, Samir Haddad
, Jinane Sayah, Zhong Chen, Zhi Guan, Hani Hamdan, Jinan Charafeddine
, Khalid Al Mutib:
LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications. IEEE Access 11: 28370-28383 (2023) - [j35]Zhenhao Wu, Jianbo Gao, Jiashuo Zhang, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
DFHelper: Help clients to participate in federated learning tasks. Appl. Intell. 53(10): 12749-12773 (2023) - [j34]Lipeng Wang
, Zhi Guan, Zhong Chen, Mingsheng Hu:
Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management. IEEE Internet Things J. 10(23): 20955-20968 (2023) - [j33]Lipeng Wang
, Zhi Guan, Zhong Chen, Mingsheng Hu:
sChain: An Efficient and Secure Solution for Improving Blockchain Storage. IEEE Trans. Inf. Forensics Secur. 18: 3662-3676 (2023) - [c138]Ke Wang
, Jianbo Gao
, Qiao Wang
, Jiashuo Zhang
, Yue Li
, Zhi Guan
, Zhong Chen
:
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. ACSAC 2023: 216-228 - [c137]Ya Han
, Jianbo Gao
, Zhi Guan
, Zhong Chen
, Lifeng Ren
:
Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology. BIOTC 2023: 15-22 - [c136]Libin Xia, Jiashuo Zhang, Xihan Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications. DAPPS 2023: 151-157 - [c135]Ya Han
, Jianbo Gao
, Zhi Guan
, Zhong Chen
, Lifeng Ren
:
Intelligent New Energy Vehicle Battery Swap Scheme based on Blockchain Technology. ICBCT 2023: 57-63 - [c134]Jiashuo Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen:
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts. ICSE Companion 2023: 31-35 - [c133]Xiaofei Xu, Quan Z. Sheng
, Boualem Benatallah, Zhong Chen, Robert Gazda, Abdulmotaleb El-Saddik, Munindar P. Singh:
Metaverse Services: The Way of Services Towards the Future. ICWS 2023: 179-185 - [c132]Jiakun Hao, Jianbo Gao, Peng Xiang, Jiashuo Zhang, Ziming Chen, Hao Hu, Zhong Chen:
TDID: Transparent and Efficient Decentralized Identity Management with Blockchain. SMC 2023: 1752-1759 - [i16]Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. CoRR abs/2312.09685 (2023) - 2022
- [j32]Zhenhao Wu
, Jianbo Gao, Qingshan Li, Zhi Guan, Zhong Chen:
Make aspect-based sentiment classification go further: step into the long-document-level. Appl. Intell. 52(8): 8428-8447 (2022) - [c131]Meilin Lv, Kangjian Wei, Henry Kao, Huiping Sun, Zhong Chen:
ESUM: an efficient UTXO schedule model. ICBC 2022: 1-3 - [c130]Jianbo Gao
, Jiashuo Zhang
, Yue Li
, Jiakun Hao
, Ke Wang
, Zhi Guan
, Zhong Chen
:
PShard: A Practical Sharding Protocol for Enterprise Blockchain. ICBTA 2022: 110-116 - [c129]Jianbo Gao
, Jiashuo Zhang
, Yue Li
, Jiakun Hao
, Ke Wang
, Zhi Guan
, Zhong Chen
:
ChainDB: Ensuring Integrity of Querying Off-Chain Data on Blockchain. ICBTA 2022: 175-181 - [c128]Shiyi Tan, Yang Lu, Kang Liu, Huiping Sun, Zhong Chen:
DPLogChain: A Dynamic Packaging LogChain based on Random Witness. ICC 2022: 19-24 - [c127]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Yue Li, Zhi Guan, Zhong Chen:
TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment. ICC 2022: 1004-1009 - [c126]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. ASE 2022: 171:1-171:4 - [c125]Yu Dong, Yue Li, Dongqi Cui, Jianbo Gao, Zhi Guan, Zhong Chen:
Smifier: A Smart Contract Verifier for Composite Transactions. SEKE 2022: 507-512 - [i15]Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. CoRR abs/2208.07119 (2022) - 2021
- [j31]Abba Garba, Ashutosh Dhar Dwivedi
, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq
, M. Anwar Hasan, Zhong Chen:
Correction to: A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14(4): 1869 (2021) - [j30]Abba Garba, Ashutosh Dhar Dwivedi
, Mohsin Kamal, Gautam Srivastava
, Muhammad Tariq
, M. Anwar Hasan, Zhong Chen:
A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14(5): 2665-2680 (2021) - [j29]Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava
:
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme. IEEE Trans. Netw. Sci. Eng. 8(2): 1698-1710 (2021) - [c124]Ying Lan, Jianbo Gao, Yue Li, Ke Wang, Yuesheng Zhu, Zhong Chen:
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware. ICBTA 2021: 17-23 - [c123]Yue Li, Han Liu, Yuanliang Chen, Jianbo Gao, Zhenhao Wu, Zhi Guan, Zhong Chen:
FASTBLOCK: Accelerating Blockchains via Hardware Transactional Memory. ICDCS 2021: 250-260 - [c122]Ye Zou, Huiping Sun, Zhong Chen:
Associated Lattice-BERT for Spoken Language Understanding. ICONIP (6) 2021: 579-586 - [c121]Yanan Liu, Huiping Sun, Xu Song, Zhong Chen:
OverlapShard: Overlap-based Sharding Mechanism. ISCC 2021: 1-7 - [i14]Jiashuo Zhang, Jianbo Gao, Ke Wang, Zhenhao Wu, Ying Lan, Zhi Guan, Zhong Chen:
TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment. CoRR abs/2102.01970 (2021) - [i13]Ying Lan, Jianbo Gao, Ke Wang, Jiashuo Zhang, Zhenhao Wu, Yuesheng Zhu, Zhong Chen:
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware. CoRR abs/2103.13809 (2021) - 2020
- [j28]Chao Liu
, Jianbo Gao, Yue Li, Huihui Wang
, Zhong Chen:
Studying gas exceptions in blockchain-based cloud applications. J. Cloud Comput. 9: 35 (2020) - [j27]Lei Shi
, Zhong Chen, Xiaohua Ding, Qiang Ma:
A new stable collocation method for solving a class of nonlinear fractional delay differential equations. Numer. Algorithms 85(4): 1123-1153 (2020) - [c120]Xian Chu, Huiping Sun, Zhong Chen:
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. Financial Cryptography Workshops 2020: 166-176 - [c119]Abba Garba, Qinwen Hu, Zhong Chen, Muhammad Rizwan Asghar
:
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management. HPCC/DSS/SmartCity 2020: 824-829 - [c118]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. ICSME 2020: 826-829 - [c117]Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:
EShield: protect smart contracts against reverse engineering. ISSTA 2020: 553-556 - [i12]Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. CoRR abs/2006.01476 (2020)
2010 – 2019
- 2019
- [j26]Ziqian Meng
, Zhong Chen, Zhi Guan:
Peer-to-peer file sharing in next generation eXpressive Internet Architecture. CCF Trans. Netw. 1(1-4): 28-36 (2019) - [c116]Chao Liu, Jianbo Gao, Yue Li, Zhong Chen:
Understanding Out of Gas Exceptions on Ethereum. BlockSys 2019: 505-519 - [c115]Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche
:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352 - [c114]Zhenhao Wu, G. Wu, Kejing Yang, Yunfei Lan, Zhong Chen, Ernst Bekkering, Naixue Xiong
:
Aspect Based Hierarchical System: A Fine-grained Sentiment Analysis System in Edge Computing. ICPS 2019: 731-736 - [c113]Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EasyFlow: keep ethereum away from overflow. ICSE (Companion Volume) 2019: 23-26 - [c112]Jianbo Gao, Han Liu, Yue Li, Chao Liu, Zhiqiang Yang, Qingshan Li, Zhi Guan, Zhong Chen:
Towards automated testing of blockchain-based decentralized applications. ICPC 2019: 294-299 - [i11]Jiashuo Zhang, Jianbo Gao, Zhenhao Wu, Wentian Yan, Qize Wu, Qingshan Li, Zhong Chen:
Performance Analysis of the Libra Blockchain: An Experimental Study. CoRR abs/1912.05241 (2019) - 2018
- [c111]Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. ICETE (2) 2018: 554-561 - [c110]Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:
ReGuard: finding reentrancy bugs in smart contracts. ICSE (Companion Volume) 2018: 65-68 - [i10]Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EASYFLOW: Keep Ethereum Away From Overflow. CoRR abs/1811.03814 (2018) - 2017
- [c109]Xiujia Guo, Zhao Wang, Zhong Chen:
Exploring the Network of Real-World Passwords: Visualization and Estimation. SecureComm 2017: 147-166 - [c108]Ziqian Meng, Zhong Chen, Zhi Guan:
Seamless service migration for human-centered computing in future Internet architecture. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - 2016
- [c107]Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan:
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68 - 2015
- [j25]Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen:
SCRHM: A Secure Continuous Remote Health Monitoring System. Int. J. Distributed Sens. Networks 11: 392439:1-392439:12 (2015) - [c106]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140 - [c105]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328 - [c104]Hongwei Meng, Chuck Song, Zhong Chen, Ziqian Meng:
Design of network mobility support in eXpressive Internet Architecture. ICCVE 2015: 169-174 - [c103]Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song:
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility. ICICS 2015: 269-281 - [c102]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305 - [c101]Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 - [c100]Huiping Sun, Ke Wang, Xu Li, Nan Qin, Zhong Chen:
PassApp: My App is My Password! MobileHCI 2015: 306-315 - [c99]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676 - [c98]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879 - [c97]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347 - [c96]Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan:
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 - [i9]Xiujia Guo, Haibo Chen, Xuqin Liu, Xiangyu Xu, Zhong Chen:
The Scale-free Network of Passwords : Visualization and Estimation of Empirical Passwords. CoRR abs/1511.08324 (2015) - 2014
- [j24]Cong Sun
, Ning Xi, Sheng Gao
, Zhong Chen, Jianfeng Ma:
Automated enforcement for relaxed information release with reference points. Sci. China Inf. Sci. 57(11): 1-19 (2014) - [j23]Song Luo, Zhong Chen:
Hierarchical identity-based encryption without key delegation in decryption. Int. J. Grid Util. Comput. 5(2): 71-79 (2014) - [j22]Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. Inf. Sci. 268: 447-457 (2014) - [c95]Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen:
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60 - [c94]Qing-Shan Li, Xiaolin Xu, Zhong Chen:
PUF-Based RFID Ownership Transfer Protocol in an Open Environment. PDCAT 2014: 131-137 - [c93]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 - [c92]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 - [c91]Liangwen Yu, Yonggang Wang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Edges Protection in Multiple Releases of Social Network Data. WAIM 2014: 669-680 - 2013
- [j21]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li
:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j20]Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013) - [j19]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li
:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j18]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - [j17]Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2): 927-932 (2013) - [j16]Huayou Si, Zhong Chen, Yong Deng, Lian Yu:
Semantic web services publication and OCT-based discovery in structured P2P network. Serv. Oriented Comput. Appl. 7(3): 169-180 (2013) - [c90]Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen:
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 - [c89]Tao Yang, Wei Xin, Liangwen Yu, Yong Yang, Jian-bin Hu, Zhong Chen:
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. APWeb 2013: 583-594 - [c88]Liu Yang, Minghui Qiu, Swapna Gottipati, Feida Zhu
, Jing Jiang, Huiping Sun, Zhong Chen:
CQArank: jointly model topics and expertise in community question answering. CIKM 2013: 99-108 - [c87]Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen:
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287 - [c86]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 - [c85]Liangwen Yu, Tao Yang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Sensitive Edges Protection in Social Networks. WAIM 2013: 564-569 - [c84]Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen:
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740 - [c83]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 - 2012
- [j15]Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3): 573-581 (2012) - [j14]Hu Xiong, Zhong Chen, Fagen Li
:
Bidder-anonymous English auction protocol based on revocable ring signature. Expert Syst. Appl. 39(8): 7062-7066 (2012) - [j13]Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. Int. J. Netw. Secur. 14(5): 297-300 (2012) - [j12]Suke Li, Zhi Guan, Liyong Tang, Zhong Chen:
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012) - [j11]Hu Xiong, Zhong Chen, Fagen Li
:
Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3-4): 1213-1221 (2012) - [j10]Hu Xiong, Zhong Chen, Fagen Li
:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. Secur. Commun. Networks 5(12): 1441-1451 (2012) - [j9]Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen:
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. ACM Trans. Sens. Networks 8(2): 14:1-14:19 (2012) - [c82]Yongming Jin, Wei Xin, Huiping Sun, Zhong Chen:
PUF-Based RFID Authentication Protocol against Secret Key Leakage. APWeb 2012: 318-329 - [c81]Huayou Si, Zhong Chen, Yun Zhao, Yong Deng:
P2P-Based Publication and Sharing of Axioms in OWL Ontologies for SPARQL Query Processing in Distributed Environment. APWeb 2012: 586-593 - [c80]Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen:
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. FSKD 2012: 2232-2236 - [c79]Tao Yang, Liyong Tang, Lingbo Kong, Zhong Chen:
On key issuing privacy in distributed online social networks. FSKD 2012: 2497-2501 - [c78]Wei Xin, Cong Tang, Tao Yang, Huiping Sun, Zhong Chen:
Towards privacy-preserving RFID-based location-based services. FSKD 2012: 2827-2831 - [c77]