
Zhong Chen 0001
Person information
- affiliation: Peking University, School of Electronics Engineering and Computer Science, Beijing, China
Other persons with the same name
- Zhong Chen — disambiguation page
- Zhong Chen 0002
— South China University of Technology, School of Mechanical & Automotive Engineering, Guangzhou, China
- Zhong Chen 0003
— Xavier University of Louisiana, New Orleans, LA, USA (and 1 more)
- Zhong Chen 0004
— Nanyang Technological University, School of Materials Science and Engineering, Singapore
- Zhong Chen 0005
— Xiamen University, Department of Communication Engineering, Fujian Key Laboratory of Plasma and Magnetic Resonance, China
- Zhong Chen 0006
— Sun Yat-sen University, School of Chemistry, Guangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j27]Lei Shi
, Zhong Chen, Xiaohua Ding, Qiang Ma:
A new stable collocation method for solving a class of nonlinear fractional delay differential equations. Numer. Algorithms 85(4): 1123-1153 (2020) - [c109]Xian Chu, Huiping Sun, Zhong Chen:
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. Financial Cryptography Workshops 2020: 166-176
2010 – 2019
- 2019
- [j26]Ziqian Meng
, Zhong Chen, Zhi Guan:
Peer-to-peer file sharing in next generation eXpressive Internet Architecture. CCF Trans. Netw. 1(1-4): 28-36 (2019) - [c108]Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352 - 2018
- [c107]Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. ICETE (2) 2018: 554-561 - 2017
- [c106]Ziqian Meng, Zhong Chen, Zhi Guan:
Seamless service migration for human-centered computing in future Internet architecture. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - 2016
- [c105]Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan:
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68 - 2015
- [j25]Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen:
SCRHM: A Secure Continuous Remote Health Monitoring System. Int. J. Distributed Sens. Networks 11: 392439:1-392439:12 (2015) - [c104]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140 - [c103]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328 - [c102]Hongwei Meng, Chuck Song, Zhong Chen, Ziqian Meng:
Design of network mobility support in eXpressive Internet Architecture. ICCVE 2015: 169-174 - [c101]Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song:
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility. ICICS 2015: 269-281 - [c100]Qiuxiang Dong, Zhi Guan, Zhong Chen:
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305 - [c99]Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 - [c98]Huiping Sun, Ke Wang, Xu Li, Nan Qin, Zhong Chen:
PassApp: My App is My Password! MobileHCI 2015: 306-315 - [c97]Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676 - [c96]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879 - [c95]Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347 - [c94]Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan:
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 - 2014
- [j24]Cong Sun
, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma:
Automated enforcement for relaxed information release with reference points. Sci. China Inf. Sci. 57(11): 1-19 (2014) - [j23]Song Luo, Zhong Chen:
Hierarchical identity-based encryption without key delegation in decryption. Int. J. Grid Util. Comput. 5(2): 71-79 (2014) - [j22]Zhiguang Qin, Hu Xiong, Guobin Zhu, Zhong Chen:
Certificate-free ad hoc anonymous authentication. Inf. Sci. 268: 447-457 (2014) - [c93]Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen:
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60 - [c92]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 - [c91]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 - [c90]Liangwen Yu, Yonggang Wang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Edges Protection in Multiple Releases of Social Network Data. WAIM 2014: 669-680 - 2013
- [j21]Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li
:
Efficient communication scheme with confidentiality and privacy for vehicular networks. Comput. Electr. Eng. 39(6): 1717-1725 (2013) - [j20]Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013) - [j19]Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li
:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) - [j18]Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) - [j17]Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2): 927-932 (2013) - [j16]Huayou Si, Zhong Chen, Yong Deng, Lian Yu:
Semantic web services publication and OCT-based discovery in structured P2P network. Serv. Oriented Comput. Appl. 7(3): 169-180 (2013) - [c89]Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen:
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 - [c88]Tao Yang, Wei Xin, Liangwen Yu, Yong Yang, Jian-bin Hu, Zhong Chen:
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. APWeb 2013: 583-594 - [c87]Liu Yang, Minghui Qiu, Swapna Gottipati, Feida Zhu
, Jing Jiang, Huiping Sun, Zhong Chen:
CQArank: jointly model topics and expertise in community question answering. CIKM 2013: 99-108 - [c86]Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen:
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287 - [c85]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 - [c84]Liangwen Yu, Tao Yang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Sensitive Edges Protection in Social Networks. WAIM 2013: 564-569 - [c83]Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen:
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740 - [c82]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 - 2012
- [j15]Hu Xiong, Zhong Chen, Fagen Li:
Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3): 573-581 (2012) - [j14]Hu Xiong, Zhong Chen, Fagen Li
:
Bidder-anonymous English auction protocol based on revocable ring signature. Expert Syst. Appl. 39(8): 7062-7066 (2012) - [j13]Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. Int. J. Netw. Secur. 14(5): 297-300 (2012) - [j12]Suke Li, Zhi Guan, Liyong Tang, Zhong Chen:
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012) - [j11]Hu Xiong, Zhong Chen, Fagen Li
:
Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3-4): 1213-1221 (2012) - [j10]Hu Xiong, Zhong Chen, Fagen Li
:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. Secur. Commun. Networks 5(12): 1441-1451 (2012) - [j9]Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen:
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. ACM Trans. Sens. Networks 8(2): 14:1-14:19 (2012) - [c81]Yongming Jin, Wei Xin, Huiping Sun, Zhong Chen:
PUF-Based RFID Authentication Protocol against Secret Key Leakage. APWeb 2012: 318-329 - [c80]Huayou Si, Zhong Chen, Yun Zhao, Yong Deng:
P2P-Based Publication and Sharing of Axioms in OWL Ontologies for SPARQL Query Processing in Distributed Environment. APWeb 2012: 586-593 - [c79]Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen:
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. FSKD 2012: 2232-2236 - [c78]Tao Yang, Liyong Tang, Lingbo Kong, Zhong Chen:
On key issuing privacy in distributed online social networks. FSKD 2012: 2497-2501 - [c77]Wei Xin, Cong Tang, Tao Yang, Huiping Sun, Zhong Chen:
Towards privacy-preserving RFID-based location-based services. FSKD 2012: 2827-2831 - [c76]Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen:
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239 - [c75]Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen:
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407 - [c74]Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen:
Privacy Protection in Social Networks Using l-Diversity. ICICS 2012: 435-444 - [c73]Ying Chen, Qingni Shen, Pengfei Sun, Yangwei Li, Zhong Chen, Sihan Qing:
Reliable Migration Module in Trusted Cloud Based on Security Level - Design and Implementation. IPDPS Workshops 2012: 2230-2236 - [c72]Wei Xin, Huiping Sun, Zhao Wang, Zhi Guan, Zhong Chen:
A RFID Path-Checking Protocol Based on Ordered Multisignatures. RFIDSec Asia 2012: 33-44 - [c71]Huayou Si, Zhong Chen, Yong Deng:
P2P-based Publication and Location of Web Ontology for Knowledge Sharing in Virtual Communities. SEKE 2012: 617-621 - [c70]Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen:
iSac: Intimacy Based Access Control for Social Network Sites. UIC/ATC 2012: 517-524 - [c69]Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen:
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System. UIC/ATC 2012: 525-532 - [c68]Tao Yang, Lingbo Kong, Liangwen Yu, Jian-bin Hu, Zhong Chen:
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs. WAIM 2012: 352-362 - 2011
- [j8]Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li
:
On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2): 129-135 (2011) - [j7]Hu Xiong, Zhong Chen, Zhiguang Qin:
Efficient three-party authenticated key agreement protocol in certificateless cryptography. Int. J. Comput. Math. 88(13): 2707-2716 (2011) - [j6]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
Sorcery: Overcoming deceptive votes in P2P content sharing systems. Peer Peer Netw. Appl. 4(2): 178-191 (2011) - [c67]Cong Sun
, Liyong Tang, Zhong Chen:
Enforcing Relaxed Declassifications with Reference Points. ACIS-ICIS 2011: 76-81 - [c66]Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 - [c65]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen:
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381 - [c64]Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen:
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. CISIS 2011: 238-245 - [c63]Yu Chen, Song Luo, Zhong Chen:
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model. DBSec 2011: 263-270 - [c62]Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen:
A Novel Commutative Blinding Identity Based Encryption Scheme. FPS 2011: 73-89 - [c61]Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen:
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature. FSKD 2011: 2217-2221 - [c60]Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing:
A Variant of Boyen-Waters Anonymous IBE Scheme. ICICS 2011: 42-56 - [c59]Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen:
Lightweight RFID Mutual Authentication Protocol against Feasible Problems. ICICS 2011: 69-77 - [c58]Cong Sun
, Ennan Zhai, Zhong Chen, Jianfeng Ma:
A Multi-compositional Enforcement on Information Flow Security. ICICS 2011: 345-359 - [c57]Song Luo, Qingni Shen, Zhong Chen:
Fully Secure Unidirectional Identity-Based Proxy Re-encryption. ICISC 2011: 109-126 - [c56]Hu Xiong, Qianhong Wu, Zhong Chen:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation. INCoS 2011: 92-99 - [c55]Longzhi Du, Yonggang Wang, Jian-bin Hu, Zhong Chen:
Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior. ISPA 2011: 270-275 - [c54]Zhi Guan, Hu Xiong, Suke Li, Zhong Chen:
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 - [c53]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54 - [c52]Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70 - [c51]Hu Xiong, Qianhong Wu, Zhong Chen:
Toward Pairing-Free Certificateless Authenticated Key Exchanges. ISC 2011: 79-94 - [c50]Cong Sun
, Liyong Tang, Zhong Chen:
Enforcing Reactive Noninterference with Reachability Analysis. ITNG 2011: 321-326 - [i8]Ruichuan Chen, Eng Keong Lua, Zhuhua Cai, Jon Crowcroft, Zhong Chen:
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service. CoRR abs/1108.1343 (2011) - [i7]Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen:
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms. CoRR abs/1108.1350 (2011) - [i6]Cong Sun
, Liyong Tang, Zhong Chen:
A New Enforcement on Declassification with Reachability Analysis. CoRR abs/1108.4172 (2011) - [i5]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptol. ePrint Arch. 2011: 90 (2011) - 2010
- [j5]Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu:
Filtering false data via authentic consensus in vehicle ad hoc networks. Int. J. Auton. Adapt. Commun. Syst. 3(2): 217-235 (2010) - [j4]Dihui Bao, Yelu Chen, Huiping Sun, Zhong Chen:
Supermarket Service Modeling and Evaluation. Int. J. Serv. Sci. Manag. Eng. Technol. 1(2): 33-50 (2010) - [j3]Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. J. Comput. Sci. Technol. 25(2): 375-387 (2010) - [j2]Nike Gui, Jian-bin Hu, Zhong Chen:
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. J. Networks 5(5): 535-542 (2010) - [c49]Suke Li, Jinmei Hao, Zhong Chen:
Generating Tags for Service Reviews. ADMA (2) 2010: 463-474 - [c48]Huiping Sun, Junde Song, Zhong Chen:
Survey of Authentication in Mobile IPv6 Network. CCNC 2010: 1-4 - [c47]Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:
Identity-based encryption based on DHIES. AsiaCCS 2010: 82-88 - [c46]Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:
When ABE Meets RSS. DBSec 2010: 319-326 - [c45]Song Luo, Jian-bin Hu, Zhong Chen:
New construction of identity-based proxy re-encryption. Digital Rights Management Workshop 2010: 47-50 - [c44]Yonggang Wang, Ennan Zhai, Jian-bin Hu, Zhong Chen:
Claper: Recommend classical papers to beginners. FSKD 2010: 2777-2781 - [c43]Suke Li, Zhong Chen:
Social Services Computing: Concepts, Research Challenges, and Directions. GreenCom/CPSCom 2010: 840-845 - [c42]Yong Deng, Zhonghai Wu, Cong Tang, Huayou Si, Hu Xiong, Zhong Chen:
A Hybrid Movie Recommender Based on Ontology and Neural Networks. GreenCom/CPSCom 2010: 846-851 - [c41]Anmin Xie, Cong Tang, Nike Gui, Zhuhua Cai, Jian-bin Hu, Zhong Chen:
An Adjacency Matrixes-Based Model for Network Security Analysis. ICC 2010: 1-5 - [c40]Song Luo, Jian-bin Hu, Zhong Chen:
Ciphertext Policy Attribute-Based Proxy Re-encryption. ICICS 2010: 401-415 - [c39]Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jian-bin Hu, Zhong Chen:
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability. ICPADS 2010: 139-146 - [c38]Song Luo, Jian-bin Hu, Zhong Chen:
Implementing Attribute-Based Encryption in Web Services. ICWS 2010: 658-659 - [c37]Suke Li, Jinmei Hao, Zhong Chen:
Tagging online service reviews. NLPKE 2010: 1-4 - [c36]Suke Li, Jinmei Hao, Zhong Chen:
Graph-based service quality evaluation through mining Web reviews. NLPKE 2010: 1-8 - [c35]Cong Sun
, Liyong Tang, Zhong Chen:
Secure Information Flow in Java via Reachability Analysis of Pushdown System. QSIC 2010: 142-150 - [c34]Yulin Ni, Huayou Si, Weiping Li, Zhong Chen:
PDUS: P2P-Based Distributed UDDI Service Discovery Approach. ICSS 2010: 3-8 - [c33]Huayou Si, Yulin Ni, Zhong Chen, Lian Yu, Yun Zhao:
An Approach to Semantic Web Services Publication and Discovery Based on OWL Ontology Inference. SOSE 2010: 129-136 - [c32]Nike Gui, Ennan Zhai, Jian-bin Hu, Zhong Chen:
SWORDS: Improving Sensor Networks Immunity under Worm Attacks. WAIM 2010: 86-96 - [c31]Jinmei Hao, Suke Li, Zhong Chen:
Extracting Service Aspects from Web Reviews. WISM 2010: 320-327 - [i4]Hu Xiong, Jian-bin Hu, Tao Yang, Wei Xin, Zhong Chen:
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy. CoRR abs/1008.5015 (2010) - [i3]Hu Xiong, Zhong Chen:
Privacy-Preserving English Auction Protocol with Round Efficiency. CoRR abs/1010.5642 (2010) - [i2]Cong Sun
, Liyong Tang, Zhong Chen:
Secure Information Flow by Model Checking Pushdown System. CoRR abs/1012.3100 (2010) - [i1]Song Luo, Jian-bin Hu, Zhong Chen:
New Construction of Identity-based Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2010: 444 (2010)
2000 – 2009
- 2009
- [c30]Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen:
Evaluating Network Security With Two-Layer Attack Graphs. ACSAC 2009: 127-136 - [c29]Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong Chen:
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis. ASONAM 2009: 95-100 - [c28]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
SpamClean: Towards Spam-Free Tagging Systems. CSE (4) 2009: 429-435 - [c27]Suke Li, Liyong Tang, Jian-bin Hu, Zhong Chen:
Automatic Data Extraction from Web Discussion Forums. FCST 2009: 219-225 - [c26]Ennan Zhai, Ruichuan Chen, Eng Keong Lua, Long Zhang, Huiping Sun, Zhuhua Cai, Sihan Qing, Zhong Chen:
SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam. GLOBECOM 2009: 1-6 - [c25]Yongming Jin, Huiping Sun, Zhong Chen:
Hash-Based Tag Ownership Transfer Protocol against Traceability. ICEBE 2009: 487-492 - [c24]Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen:
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. ICICS 2009: 226-240 - [c23]Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen:
SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. ICNS 2009: 296-302 - [c22]Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua, Huiping Sun, Sihan Qing, Liyong Tang, Zhong Chen:
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. Peer-to-Peer Computing 2009: 11-20 - [c21]Zhuhua Cai, Ruichuan Chen, Jianqiao Feng, Cong Tang, Zhong Chen, Jian-bin Hu:
A holistic mechanism against file pollution in peer-to-peer networks. SAC 2009: 28-34 - [c20]Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen:
Securing key issuing in peer-to-peer networks. SAC 2009: 84-85 - [c19]