Zhong Chen
Orcid: 0000-0002-5785-2912Affiliations:
- Peking University, School of Electronics Engineering and Computer Science, Beijing, China
According to our database1,
Zhong Chen
authored at least 195 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack.
Frontiers Comput. Sci., October, 2024
J. Parallel Distributed Comput., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
CoRR, 2024
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Appl. Intell., May, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management.
IEEE Internet Things J., 2023
LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications.
IEEE Access, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023
DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023
Privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Make aspect-based sentiment classification go further: step into the long-document-level.
Appl. Intell., 2022
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
2021
LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme.
IEEE Trans. Netw. Sci. Eng., 2021
Peer-to-Peer Netw. Appl., 2021
Peer-to-Peer Netw. Appl., 2021
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware.
CoRR, 2021
TBFT: Understandable and Efficient Byzantine Fault Tolerance using Trusted Execution Environment.
CoRR, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021
2020
A new stable collocation method for solving a class of nonlinear fractional delay differential equations.
Numer. Algorithms, 2020
J. Cloud Comput., 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
CCF Trans. Netw., 2019
Proceedings of the 27th International Conference on Program Comprehension, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Aspect Based Hierarchical System: A Fine-grained Sentiment Analysis System in Edge Computing.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
2017
Seamless service migration for human-centered computing in future Internet architecture.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
2016
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016
2015
Int. J. Distributed Sens. Networks, 2015
The Scale-free Network of Passwords : Visualization and Estimation of Empirical Passwords.
CoRR, 2015
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015
Proceedings of the Information Security Practice and Experience, 2015
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the International Conference on Connected Vehicles and Expo, 2015
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
2014
Int. J. Grid Util. Comput., 2014
Sci. China Inf. Sci., 2014
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services.
Proceedings of the Web-Age Information Management, 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Serv. Oriented Comput. Appl., 2013
New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013
Inf. Sci., 2013
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.
Inf. Sci., 2013
Int. J. Netw. Secur., 2013
Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Proceedings of the Web-Age Information Management, 2013
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
2012
Information-theoretic modeling of false data filtering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2012
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012
Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012
J. Comput. Sci. Technol., 2012
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.
Int. J. Netw. Secur., 2012
Expert Syst. Appl., 2012
Comput. Electr. Eng., 2012
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
P2P-based Publication and Location of Web Ontology for Knowledge Sharing in Virtual Communities.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
Proceedings of the Radio Frequency Identification System Security, 2012
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
P2P-Based Publication and Sharing of Axioms in OWL Ontologies for SPARQL Query Processing in Distributed Environment.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
Peer-to-Peer Netw. Appl., 2011
Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
IACR Cryptol. ePrint Arch., 2011
Comput. Electr. Eng., 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the Information Security, 14th International Conference, 2011
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011
2010
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks.
J. Networks, 2010
J. Comput. Sci. Technol., 2010
Int. J. Serv. Sci. Manag. Eng. Technol., 2010
Int. J. Auton. Adapt. Commun. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
CoRR, 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
An Approach to Semantic Web Services Publication and Discovery Based on OWL Ontology Inference.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
Proceedings of the International Conference on Service Sciences, 2010
Proceedings of the 10th International Conference on Quality Software, 2010
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010
The design and implementation of an approach to publish and discover Semantic Web Services.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Proceedings P2P 2009, 2009
Proceedings of the Fifth International Conference on Networking and Services, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Int. J. Pervasive Comput. Commun., 2008
Proceedings of the Proceedings P2P'08, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Proceedings of the Euro-Par 2008, 2008
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
LENO: LEast Rotation Near-Optimal Cluster Head Rotation Strategy in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005