2016

Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan: 
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68 
 

2015

Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen: 
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879 

Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen: 
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347 

Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen: 
SCRHM: A Secure Continuous Remote Health Monitoring System. IJDSN 11: 392439:1-392439:12 (2015)

Qiuxiang Dong, Zhi Guan, Zhong Chen: 
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140 

Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen: 
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328 

Qiuxiang Dong, Zhi Guan, Zhong Chen: 
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305 

Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen: 
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 

Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen: 
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676 

Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan: 
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 
 

2014

Liangwen Yu, Yonggang Wang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen: 
Edges Protection in Multiple Releases of Social Network Data. WAIM 2014: 669-680 

Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen: 
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60 

Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen: 
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 

Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen: 
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 
 

2013

Hu Xiong, Jian-bin Hu, Zhong Chen: 
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. I. J. Network Security 15(4): 317-320 (2013) 

Tao Yang, Wei Xin, Liangwen Yu, Yong Yang, Jian-bin Hu, Zhong Chen: 
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. APWeb 2013: 583-594 

Liangwen Yu, Tao Yang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen: 
Sensitive Edges Protection in Social Networks. WAIM 2013: 564-569 

Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li: 
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013) 

Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen: 
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013) 

Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen: 
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 

Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen: 
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287 

Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen: 
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 

Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen: 
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740 

Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen: 
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 
 

2012

Jian-bin Hu, Hu Xiong, Zhong Chen: 
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. I. J. Network Security 14(5): 297-300 (2012) 

Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen: 
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. FSKD 2012: 2232-2236 

Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen: 
Privacy Protection in Social Networks Using l-Diversity. ICICS 2012: 435-444 

Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen: 
iSac: Intimacy Based Access Control for Social Network Sites. UIC/ATC 2012: 517-524 

Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen: 
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System. UIC/ATC 2012: 525-532 

Tao Yang, Lingbo Kong, Liangwen Yu, Jian-bin Hu, Zhong Chen: 
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.WAIM 2012: 352-362 

Suke Li, Zhi Guan, Liyong Tang, Zhong Chen: 
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012) 

Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen: 
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. TOSN 8(2): 14:1-14:19 (2012) 

Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen: 
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239 

Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen: 
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407 
 

2011

Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li: 
On the security of an identity based multi-proxy signature scheme. Computers & Electrical Engineering 37(2): 129-135 (2011) 

Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen: 
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541 

Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen: 
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381 

Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen: 
A Novel Commutative Blinding Identity Based Encryption Scheme. FPS 2011: 73-89 

Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen: 
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.FSKD 2011: 2217-2221 

Longzhi Du, Yonggang Wang, Jian-bin Hu, Zhong Chen: 
Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior. ISPA 2011: 270-275 

Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen: 
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70 

Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen: 
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. CISIS 2011: 238-245 

Zhi Guan, Hu Xiong, Suke Li, Zhong Chen: 
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281 
 

2010

Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu: 
Filtering false data via authentic consensus in vehicle ad hoc networks. IJAACS 3(2): 217-235 (2010) 

Nike Gui, Jian-bin Hu, Zhong Chen: 
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. JNW 5(5): 535-542 (2010) 

Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen: 
When ABE Meets RSS. DBSec 2010: 319-326 

Song Luo, Jian-bin Hu, Zhong Chen: 
New construction of identity-based proxy re-encryption. Digital Rights Management Workshop 2010: 47-50 

Yonggang Wang, Ennan Zhai, Jian-bin Hu, Zhong Chen: 
Claper: Recommend classical papers to beginners. FSKD 2010: 2777-2781 

Anmin Xie, Cong Tang, Nike Gui, Zhuhua Cai, Jian-bin Hu, Zhong Chen: 
An Adjacency Matrixes-Based Model for Network Security Analysis. ICC 2010: 1-5 

Song Luo, Jian-bin Hu, Zhong Chen: 
Ciphertext Policy Attribute-Based Proxy Re-encryption. ICICS 2010: 401-415 

Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jian-bin Hu, Zhong Chen: 
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability. ICPADS 2010: 139-146 

Song Luo, Jian-bin Hu, Zhong Chen: 
Implementing Attribute-Based Encryption in Web Services. ICWS 2010: 658-659 

Nike Gui, Ennan Zhai, Jian-bin Hu, Zhong Chen: 
SWORDS: Improving Sensor Networks Immunity under Worm Attacks. WAIM 2010: 86-96 

Hu Xiong, Jian-bin Hu, Tao Yang, Wei Xin, Zhong Chen: 
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy. CoRR abs/1008.5015 (2010) 

Song Luo, Jian-bin Hu, Zhong Chen: 
New Construction of Identity-based Proxy Re-encryption. IACR Cryptology ePrint Archive 2010: 444 (2010) 

Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang: 
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. J. Comput. Sci. Technol. 25(2): 375-387 (2010) 

Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen: 
Identity-based encryption based on DHIES. ASIACCS 2010: 82-88