Chao Liu, Jianbo Gao, Yue Li, Huihui Wang, Zhong Chen:
Studying gas exceptions in blockchain-based cloud applications. J. Cloud Comput. 9: 35 (2020)
Zhenhao Wu, Jiashuo Zhang, Jianbo Gao, Yue Li, Qingshan Li, Zhi Guan, Zhong Chen:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications. ICSME 2020: 826-829
Wentian Yan, Jianbo Gao, Zhenhao Wu, Yue Li, Zhi Guan, Qingshan Li, Zhong Chen:
EShield: protect smart contracts against reverse engineering. ISSTA 2020: 553-556
XiuFeng Xu:
Towards automated migration for blockchain-based decentralized application. ICSE (Companion Volume) 2020: 155-157
Yeming Lin, Jianbo Gao, Tong Li, Jingguo Ge, Bingzhen Wu:
Mining DApp Repositories: Towards In-Depth Comprehension and Accurate Classification. SEKE 2020: 544-549
Ji Wang, Qi Jing, Jianbo Gao, Xuanwei Qiu:
SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning. WCNC 2020: 1-5
Chao Liu, Jianbo Gao, Yue Li, Zhong Chen:
Understanding Out of Gas Exceptions on Ethereum. BlockSys 2019: 505-519
Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352
Jianbo Gao, Han Liu, Chao Liu, Qingshan Li, Zhi Guan, Zhong Chen:
EasyFlow: keep ethereum away from overflow. ICSE (Companion Volume) 2019: 23-26
Jianbo Gao, Han Liu, Yue Li, Chao Liu, Zhiqiang Yang, Qingshan Li, Zhi Guan, Zhong Chen:
Towards automated testing of blockchain-based decentralized applications. ICPC 2019: 294-299
Jianbo Gao:
Guided, automated testing of blockchain-based decentralized applications. ICSE (Companion Volume) 2019: 138-140
Yue Li:
Finding concurrency exploits on smart contracts. ICSE (Companion Volume) 2019: 144-146
Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. ICETE (2) 2018: 554-561
Ziqian Meng, Zhong Chen, Zhi Guan:
Seamless service migration for human-centered computing in future Internet architecture. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7
Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan:
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key. CFI 2016: 62-68
Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Making Tagging Systems Resistant to Tricky Spam Attacks. UIC/ATC/ScalCom 2015: 871-879
Zhou Li, Cong Tang, Jian-bin Hu, Zhong Chen:
Vulnerabilities Scoring Approach for Cloud SaaS. UIC/ATC/ScalCom 2015: 1339-1347
Qiuxiang Dong, Zhi Guan, Kunlun Gao, Zhong Chen:
SCRHM: A Secure Continuous Remote Health Monitoring System. IJDSN 11: 392439:1-392439:12 (2015)
Qiuxiang Dong, Zhi Guan, Zhong Chen:
Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy. APWeb 2015: 129-140
Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
Appearance similarity evaluation for Android applications. ICACI 2015: 323-328
Qiuxiang Dong, Zhi Guan, Zhong Chen:
Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach. ICPADS 2015: 298-305
Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468
Jiawei Zhu, Zhengang Wu, Zhi Guan, Zhong Chen:
API Sequences Based Malware Detection for Android. UIC/ATC/ScalCom 2015: 673-676
Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan:
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308
Liangwen Yu, Yonggang Wang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Edges Protection in Multiple Releases of Social Network Data. WAIM 2014: 669-680
Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen:
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. ICICS 2014: 49-60
Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532
Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258
Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. I. J. Network Security 15(4): 317-320 (2013)
Tao Yang, Wei Xin, Liangwen Yu, Yong Yang, Jian-bin Hu, Zhong Chen:
MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET. APWeb 2013: 583-594
Liangwen Yu, Tao Yang, Zhengang Wu, Jiawei Zhu, Jian-bin Hu, Zhong Chen:
Sensitive Edges Protection in Social Networks. WAIM 2013: 564-569
Hu Xiong, Zhi Guan, Zhong Chen, Fagen Li:
An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219: 225-235 (2013)
Hu Xiong, Yanan Chen, Zhi Guan, Zhong Chen:
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf. Sci. 235: 329-340 (2013)
Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen:
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549
Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen:
Accelerating AES in JavaScript with WebGL. ICICS 2013: 275-287
Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326
Qiuxiang Dong, Zhi Guan, Liang Wu, Zhong Chen:
Fuzzy Keyword Search over Encrypted Data in the Public Key Setting. WAIM 2013: 729-740
Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208
Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. I. J. Network Security 14(5): 297-300 (2012)
Tao Yang, Lingbo Kong, Wei Xin, Jian-bin Hu, Zhong Chen:
Resisting relay attacks on vehicular Passive Keyless Entry and start systems. FSKD 2012: 2232-2236
Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen:
Privacy Protection in Social Networks Using l-Diversity. ICICS 2012: 435-444
Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen:
iSac: Intimacy Based Access Control for Social Network Sites. UIC/ATC 2012: 517-524
Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen:
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System. UIC/ATC 2012: 525-532
Tao Yang, Lingbo Kong, Liangwen Yu, Jian-bin Hu, Zhong Chen:
RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs.WAIM 2012: 352-362
Suke Li, Zhi Guan, Liyong Tang, Zhong Chen:
Exploiting Consumer Reviews for Product Feature Ranking. J. Comput. Sci. Technol. 27(3): 635-649 (2012)
Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen:
Information-theoretic modeling of false data filtering schemes in wireless sensor networks. TOSN 8(2): 14:1-14:19 (2012)
Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen:
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239
Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen:
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407
Hu Xiong, Jian-bin Hu, Zhong Chen, Fagen Li:
On the security of an identity based multi-proxy signature scheme. Computers & Electrical Engineering 37(2): 129-135 (2011)
Cong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen:
Need for Symmetry: Addressing Privacy Risks in Online Social Networks. AINA 2011: 534-541
Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen:
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings. APWeb 2011: 376-381
Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen:
A Novel Commutative Blinding Identity Based Encryption Scheme. FPS 2011: 73-89
Tao Yang, Hu Xiong, Jian-bin Hu, Yonggang Wang, Wei Xin, Yong Deng, Zhong Chen:
A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.FSKD 2011: 2217-2221
Longzhi Du, Yonggang Wang, Jian-bin Hu, Zhong Chen:
Sitab: Combating Spam in Tagging Systems via Users' Implicit Tagging Behavior. ISPA 2011: 270-275
Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70
Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen:
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. CISIS 2011: 238-245
Zhi Guan, Hu Xiong, Suke Li, Zhong Chen:
Mobile Browser as a Second Factor for Web Authentication. ISPA 2011: 276-281
Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu:
Filtering false data via authentic consensus in vehicle ad hoc networks. IJAACS 3(2): 217-235 (2010)
Nike Gui, Jian-bin Hu, Zhong Chen:
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks. JNW 5(5): 535-542 (2010)
Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:
When ABE Meets RSS. DBSec 2010: 319-326
Song Luo, Jian-bin Hu, Zhong Chen:
New construction of identity-based proxy re-encryption. Digital Rights Management Workshop 2010: 47-50
Yonggang Wang, Ennan Zhai, Jian-bin Hu, Zhong Chen:
Claper: Recommend classical papers to beginners. FSKD 2010: 2777-2781
Anmin Xie, Cong Tang, Nike Gui, Zhuhua Cai, Jian-bin Hu, Zhong Chen:
An Adjacency Matrixes-Based Model for Network Security Analysis. ICC 2010: 1-5
Song Luo, Jian-bin Hu, Zhong Chen:
Ciphertext Policy Attribute-Based Proxy Re-encryption. ICICS 2010: 401-415
Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jian-bin Hu, Zhong Chen:
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability. ICPADS 2010: 139-146
Song Luo, Jian-bin Hu, Zhong Chen:
Implementing Attribute-Based Encryption in Web Services. ICWS 2010: 658-659
Nike Gui, Ennan Zhai, Jian-bin Hu, Zhong Chen:
SWORDS: Improving Sensor Networks Immunity under Worm Attacks. WAIM 2010: 86-96
Song Luo, Jian-bin Hu, Zhong Chen:
New Construction of Identity-based Proxy Re-encryption. IACR Cryptology ePrint Archive 2010: 444 (2010)
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols. J. Comput. Sci. Technol. 25(2): 375-387 (2010)
Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:
Identity-based encryption based on DHIES. ASIACCS 2010: 82-88