Fei Chen
Orcid: 0000-0001-8132-539XAffiliations:
- Shenzhen University, Department of Computer Science and Engineering, China
- Chinese University of Hong Kong, Department of Computer Science and Engineering, China (PhD 2014)
According to our database1,
Fei Chen
authored at least 72 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Stand. Interfaces, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
J. Syst. Archit., 2024
J. Parallel Distributed Comput., 2024
Sci. China Inf. Sci., 2024
2023
SWEP-RF: Accuracy sliding window-based ensemble pruning method for latent sector error prediction in cloud storage computing.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
IEEE Trans. Medical Imaging, June, 2023
IEEE Trans. Cybern., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
G2LL: Global-To-Local Self-Supervised Learning for Label-Efficient Transformer-Based Skin Lesion Segmentation in Dermoscopy Images.
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Syst. J., 2022
Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information.
IEEE Internet Things J., 2022
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022
Comput. Secur., 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
IEEE/ACM Trans. Netw., 2021
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021
Proceedings of the 2021 IEEE International Conference on Engineering, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
2020
Sensors, 2020
J. Netw. Comput. Appl., 2020
Inf. Sci., 2020
A Novel Angular-Guided Particle Swarm Optimizer for Many-Objective Optimization Problems.
Complex., 2020
2019
Secure and efficient parallel hash function construction and its application on cloud audit.
Soft Comput., 2019
Enterp. Inf. Syst., 2019
IEEE Access, 2019
IEEE Access, 2019
2018
IEEE Trans. Serv. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Swarm Evol. Comput., 2018
Int. J. Mach. Learn. Cybern., 2018
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distributed Comput., 2018
An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies.
Inf. Sci., 2018
Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary Computation.
Complex., 2018
Appl. Soft Comput., 2018
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Wirel. Pers. Commun., 2017
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
2016
Inf. Sci., 2016
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016
Proceedings of the Smart Computing and Communication, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Theor. Comput. Sci., 2014
IEEE Trans. Cloud Comput., 2014
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Signal Process. Image Commun., 2014
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distributed Comput., 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Congress on Evolutionary Computation, 2014
2013
IEEE Trans. Inf. Theory, 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
2012
IEEE Trans. Inf. Theory, 2012
2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z<sub>N</sub>.
Inf. Sci., 2011
2010
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$.
IEEE Trans. Computers, 2010