Zhide Chen
Orcid: 0000-0002-6130-9066
According to our database1,
Zhide Chen
authored at least 46 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model.
IEEE Open J. Comput. Soc., 2024
Future Gener. Comput. Syst., 2024
Unlabeled Action Quality Assessment Based on Multi-dimensional Adaptive Constrained Dynamic Time Warping.
CoRR, 2024
RTSeg-net: A lightweight network for real-time segmentation of fetal head and pubic symphysis from intrapartum ultrasound images.
Comput. Biol. Medicine, 2024
2023
Align-Yolact: a one-stage semantic segmentation network for real-time object detection.
J. Ambient Intell. Humaniz. Comput., February, 2023
A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network.
Future Internet, 2023
2021
J. Ambient Intell. Humaniz. Comput., 2021
BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing.
Int. J. Distributed Sens. Networks, 2021
2019
Int. J. Comput. Intell. Syst., 2019
Substitute Seed Nodes Mining Algorithms for Influence Maximization in Multi-Social Networks.
Future Internet, 2019
2018
Comput. Electr. Eng., 2018
2016
Sensors, 2016
Human continuous activity recognition based on energy-efficient schemes considering cloud security technology.
Secur. Commun. Networks, 2016
Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks.
Int. J. Commun. Syst., 2016
IET Commun., 2016
2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015
An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors.
Int. J. Distributed Sens. Networks, 2015
Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
J. Comput. Syst. Sci., 2014
J. Appl. Math., 2014
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014
Proceedings of the International Conference on Audio, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
2011
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game.
Comput. Math. Appl., 2011
2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2008
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International Workshop on Security, 2007
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004