Fei Chen

Orcid: 0000-0001-8132-539X

Affiliations:
  • Shenzhen University, Department of Computer Science and Engineering, China
  • Chinese University of Hong Kong, Department of Computer Science and Engineering, China (PhD 2014)


According to our database1, Fei Chen authored at least 72 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
StopGuess: A framework for public-key authenticated encryption with keyword search.
Comput. Stand. Interfaces, March, 2024

A Two-Stage Approach for Fair Data Trading Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

BBS: A secure and autonomous blockchain-based big-data sharing system.
J. Syst. Archit., 2024

Public cloud object storage auditing: Design, implementation, and analysis.
J. Parallel Distributed Comput., 2024

Practical cloud storage auditing using serverless computing.
Sci. China Inf. Sci., 2024

2023
SWEP-RF: Accuracy sliding window-based ensemble pruning method for latent sector error prediction in cloud storage computing.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

XBound-Former: Toward Cross-Scale Boundary Modeling in Transformers.
IEEE Trans. Medical Imaging, June, 2023

Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme.
IEEE Trans. Cybern., June, 2023

A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications.
IEEE Trans. Dependable Secur. Comput., 2023

G2LL: Global-To-Local Self-Supervised Learning for Label-Efficient Transformer-Based Skin Lesion Segmentation in Dermoscopy Images.
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023

Cloud Storage Auditing: From One Cloud to Dual, and More.
Proceedings of the Eleventh International Conference on Advanced Cloud and Big Data, 2023

2022
Cloud Object Storage Synchronization: Design, Analysis, and Implementation.
IEEE Trans. Parallel Distributed Syst., 2022

An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

Verifiable Cloud Data Access: Design, Analysis, and Implementation.
IEEE Syst. J., 2022

Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information.
IEEE Internet Things J., 2022

IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022

TrustBuilder: A non-repudiation scheme for IoT cloud applications.
Comput. Secur., 2022

Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
A Compressive Integrity Auditing Protocol for Secure Cloud Storage.
IEEE/ACM Trans. Netw., 2021

Improving Vaccine Safety Using Blockchain.
ACM Trans. Internet Techn., 2021

Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021

Towards Dynamic Verifiable Pattern Matching.
IEEE Trans. Big Data, 2021

On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021

A Mobile Computing Based Attendance System and Students' Attitude Study.
Proceedings of the 2021 IEEE International Conference on Engineering, 2021

Detection of IoT Devices That Mine Cryptocurrency.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
Towards Usable Cloud Storage Auditing.
IEEE Trans. Parallel Distributed Syst., 2020

A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems.
Sensors, 2020

Blockchain for Internet of things applications: A review and open issues.
J. Netw. Comput. Appl., 2020

Secure and efficient outsourcing computation on large-scale linear regressions.
Inf. Sci., 2020

A Novel Angular-Guided Particle Swarm Optimizer for Many-Objective Optimization Problems.
Complex., 2020

2019
Secure and efficient parallel hash function construction and its application on cloud audit.
Soft Comput., 2019

A secure hash function based on feedback iterative structure.
Enterp. Inf. Syst., 2019

RLWE-Based ID-DIA Protocols for Cloud Storage.
IEEE Access, 2019

Secure Cloud Storage Based on RLWE Problem.
IEEE Access, 2019

Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem.
IEEE Access, 2019

On Overcoming the Identified Limitations of a Usable PIN Entry Method.
IEEE Access, 2019

2018
User Differentiated Verifiable File Search on the Cloud.
IEEE Trans. Serv. Comput., 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Inf. Forensics Secur., 2018

An enhanced artificial bee colony algorithm with dual-population framework.
Swarm Evol. Comput., 2018

A survey on application of machine learning for Internet of Things.
Int. J. Mach. Learn. Cybern., 2018

Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distributed Comput., 2018

An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies.
Inf. Sci., 2018

Efficient biometric identity-based encryption.
Inf. Sci., 2018

Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary Computation.
Complex., 2018

A novel multi-objective co-evolutionary algorithm based on decomposition approach.
Appl. Soft Comput., 2018

Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data.
IEEE Access, 2018

Identity-Based Proofs of Storage with Enhanced Privacy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Research on the Hash Function Structures and its Application.
Wirel. Pers. Commun., 2017

Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017

A secure cloud storage system based on discrete logarithm problem.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

2016
Secure Cloud Storage Meets with Secure Network Coding.
IEEE Trans. Computers, 2016

Processing secure, verifiable and efficient SQL over outsourced database.
Inf. Sci., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016

A Review of Compressive Sensing in Information Security Field.
IEEE Access, 2016

Making Cloud Storage Integrity Checking Protocols Economically Smarter.
Proceedings of the Smart Computing and Communication, 2016

Bilateral-secure Signature by Key Evolving.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Cloud Storage Integrity Checking: Going from Theory to Practice.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Period distribution of generalized discrete Arnold cat map.
Theor. Comput. Sci., 2014

Highly Efficient Linear Regression Outsourcing to a Cloud.
IEEE Trans. Cloud Comput., 2014

Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Signal Process. Image Commun., 2014

Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distributed Comput., 2014

Towards verifiable file search on the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A verifiable PSO algorithm in cloud computing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$.
IEEE Trans. Inf. Theory, 2013

Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
Period Distribution of Generalized Discrete Arnold Cat Map for N=p<sup>e</sup>.
IEEE Trans. Inf. Theory, 2012

2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z<sub>N</sub>.
Inf. Sci., 2011

2010
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$.
IEEE Trans. Computers, 2010


  Loading...