Chao Liu, Jianbo Gao, Yue Li, Huihui Wang, Zhong Chen:
Studying gas exceptions in blockchain-based cloud applications. J. Cloud Comput. 9: 35 (2020)

Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. ICSME 2020: 826-829

Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:
EShield: protect smart contracts against reverse engineering. ISSTA 2020: 553-556

XiuFeng Xu:
Towards automated migration for blockchain-based decentralized application. ICSE (Companion Volume) 2020: 155-157

Yeming Lin, Jianbo Gao, Tong Li, Jingguo Ge, Bingzhen Wu:
Mining DApp Repositories: Towards In-Depth Comprehension and Accurate Classification. SEKE 2020: 544-549

Ji Wang, Qi Jing, Jianbo Gao, Xuanwei Qiu:
SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning. WCNC 2020: 1-5

Chao Liu, Jianbo Gao, Yue Li, Zhong Chen:
Understanding Out of Gas Exceptions on Ethereum. BlockSys 2019: 505-519

Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352

Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EasyFlow: keep ethereum away from overflow. ICSE (Companion Volume) 2019: 23-26

Jianbo Gao, Han Liu, Yue Li, Chao Liu, Zhiqiang Yang, Qingshan Li, Zhi Guan, Zhong Chen:
Towards automated testing of blockchain-based decentralized applications. ICPC 2019: 294-299

Jianbo Gao:
Guided, automated testing of blockchain-based decentralized applications. ICSE (Companion Volume) 2019: 138-140

Yue Li:
Finding concurrency exploits on smart contracts. ICSE (Companion Volume) 2019: 144-146

Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. ICETE (2) 2018: 554-561

Ziqian Meng, Zhong Chen, Zhi Guan:
Seamless service migration for human-centered computing in future Internet architecture. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7

Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan: 
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68 

Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen: 
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879 

Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen: 
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347 

Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen: 
SCRHM: A Secure Continuous Remote Health Monitoring System. IJDSN 11: 392439:1-392439:12 (2015)

Qiuxiang Dong, Zhi Guan, Zhong Chen: 
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140 

Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen: 
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328 

Qiuxiang Dong, Zhi Guan, Zhong Chen: 
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305 

Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen: 
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 

Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen: 
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676 

Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan: 
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 

Liangwen Yu, Yonggang Wang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen: 
Edges Protection in Multiple Releases of Social Network Data. WAIM 2014: 669-680 

Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen: 
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60 

Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen: 
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 

Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen: 
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 

Hu Xiong, Jian-bin Hu, Zhong Chen: 
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. I. J. Network Security 15(4): 317-320 (2013) 

Tao Yang, Wei Xin, Liangwen Yu, Yong Yang, Jian-bin Hu, Zhong Chen: 
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. APWeb 2013: 583-594 

Liangwen Yu, Tao Yang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen: 
Sensitive Edges Protection in Social Networks. WAIM 2013: 564-569 

Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li: 
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) 

Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen: 
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) 

Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen: 
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 

Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen: 
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287 

Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen: 
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 

Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen: 
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740 

Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen: 
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 

Jian-bin Hu, Hu Xiong, Zhong Chen: 
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. I. J. Network Security 14(5): 297-300 (2012) 

Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen: 
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. FSKD 2012: 2232-2236 

Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen: 
Privacy Protection in Social Networks Using l-Diversity. ICICS 2012: 435-444 

Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen: 
iSac: Intimacy Based Access Control for Social Network Sites. UIC/ATC 2012: 517-524 

Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen: 
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System. UIC/ATC 2012: 525-532 

Tao Yang, Lingbo Kong, Liangwen Yu, Jian-bin Hu, Zhong Chen: 
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.WAIM 2012: 352-362 

Suke Li, Zhi Guan, Liyong Tang, Zhong Chen: 
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012) 

Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen: 
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. TOSN 8(2): 14:1-14:19 (2012) 

Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen: 
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239 

Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen: 
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407 

Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li: 
On the security of an identity based multi-proxy signature scheme. Computers & Electrical Engineering 37(2): 129-135 (2011) 

Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen: 
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 

Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen: 
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381 

Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen: 
A Novel Commutative Blinding Identity Based Encryption Scheme. FPS 2011: 73-89 

Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen: 
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.FSKD 2011: 2217-2221 

Longzhi Du, Yonggang Wang, Jian-bin Hu, Zhong Chen: 
Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior. ISPA 2011: 270-275 

Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen: 
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70 

Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen: 
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. CISIS 2011: 238-245 

Zhi Guan, Hu Xiong, Suke Li, Zhong Chen: 
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 

Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu: 
Filtering false data via authentic consensus in vehicle ad hoc networks. IJAACS 3(2): 217-235 (2010) 

Nike Gui, Jian-bin Hu, Zhong Chen: 
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. JNW 5(5): 535-542 (2010) 

Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen: 
When ABE Meets RSS. DBSec 2010: 319-326 

Song Luo, Jian-bin Hu, Zhong Chen: 
New construction of identity-based proxy re-encryption. Digital Rights Management Workshop 2010: 47-50 

Yonggang Wang, Ennan Zhai, Jian-bin Hu, Zhong Chen: 
Claper: Recommend classical papers to beginners. FSKD 2010: 2777-2781 

Anmin Xie, Cong Tang, Nike Gui, Zhuhua Cai, Jian-bin Hu, Zhong Chen: 
An Adjacency Matrixes-Based Model for Network Security Analysis. ICC 2010: 1-5 

Song Luo, Jian-bin Hu, Zhong Chen: 
Ciphertext Policy Attribute-Based Proxy Re-encryption. ICICS 2010: 401-415 

Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jian-bin Hu, Zhong Chen: 
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability. ICPADS 2010: 139-146 

Song Luo, Jian-bin Hu, Zhong Chen: 
Implementing Attribute-Based Encryption in Web Services. ICWS 2010: 658-659 

Nike Gui, Ennan Zhai, Jian-bin Hu, Zhong Chen: 
SWORDS: Improving Sensor Networks Immunity under Worm Attacks. WAIM 2010: 86-96 

Song Luo, Jian-bin Hu, Zhong Chen: 
New Construction of Identity-based Proxy Re-encryption. IACR Cryptology ePrint Archive 2010: 444 (2010) 

Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang: 
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. J. Comput. Sci. Technol. 25(2): 375-387 (2010) 

Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen: 
Identity-based encryption based on DHIES. ASIACCS 2010: 82-88