Chi Chen

Orcid: 0000-0001-5491-0542

Affiliations:
  • Chinese Academy of Sciences, CAS, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China


According to our database1, Chi Chen authored at least 21 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic group fuzzy extractor.
Cybersecur., December, 2024

2023
Cancelable biometric schemes for Euclidean metric and Cosine metric.
Cybersecur., December, 2023

General Constructions of Fuzzy Extractors for Continuous Sources.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
An Attribute-attack-proof Watermarking Technique for Relational Database.
Proceedings of the IEEE International Conference on Trust, 2022

A k-Anonymity-Based Robust Watermarking Scheme for Relational Database.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

A Secure and Practical Sample-then-lock Scheme for Iris Recognition.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2020
Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational Database.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
A Robust Iris Segmentation Using Fully Convolutional Network with Dilated Convolutions.
Proceedings of the 2018 IEEE International Symposium on Multimedia, 2018

2017
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
An Efficient Privacy-Preserving Ranked Keyword Search Method.
IEEE Trans. Parallel Distributed Syst., 2016

2015
SOLS: A scheme for outsourced location based service.
J. Netw. Comput. Appl., 2015

Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
Int. J. Distributed Sens. Networks, 2015

A Cloud Security Assessment System Based on Classifying and Grading.
IEEE Cloud Comput., 2015

A similarity evaluation algorithm and its application in multi-keyword search on encrypted cloud data.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
A hierarchical clustering method for big data oriented ciphertext search.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Bee-based IP traceback.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Optional multi-biometric cryptosystem based on fuzzy extractor.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014


  Loading...