Chaoyue Tan

Orcid: 0000-0002-9442-4298

According to our database1, Chaoyue Tan authored at least 21 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2021
2022
2023
2024
0
5
10
6
3
1
1
2
7
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimization model for vehicular network data queries in edge environments.
J. Cloud Comput., December, 2024

Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model.
J. Cloud Comput., December, 2024

Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption.
J. Cloud Comput., December, 2024

Cross-chain asset trading scheme for notaries based on edge cloud storage.
J. Cloud Comput., December, 2024

A high-capacity slicing PBFT protocol based on reputation evaluation model.
Wirel. Networks, November, 2024

Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption.
Inf. Process. Manag., 2024

Targeted Universal Adversarial Attack Based on Fourier Transform.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Slicing PBFT Consensus Algorithm Based on VRF.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
J. Cloud Comput., December, 2023

Energy trading scheme based on consortium blockchain and game theory.
Comput. Stand. Interfaces, 2023

A mobile energy trading scheme based on Lightning Network.
Concurr. Comput. Pract. Exp., 2023

A High Capacity Combined Carrier Steganography Without Embedding Image.
Proceedings of the IEEE Intl Conf on Dependable, 2023

CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Robust Object Detection Based on a Comparative Learning Perspective.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Adversarial Attack Method Based on Dual- frequency Domain Transformation.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Communication-Efficient Federated Learning with Sparsity and Quantization.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Blockchain of Blockchains Structure Based on Asset Trading Scheme.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
A designated verifier multi-signature scheme in multi-clouds.
J. Cloud Comput., 2022

A Security Transaction Model Based on HTLC.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
On the algebraic structures of the space of interval-valued intuitionistic fuzzy numbers.
CoRR, 2021


  Loading...