| 2008 |
| 13 | EE | Yu Qing Chen,
Kathy J. Horadam,
Wei-Hung Liu:
Relative difference sets fixed by inversion (III) - Cocycle theoretical approach.
Discrete Mathematics 308(13): 2764-2775 (2008) |
| 2007 |
| 12 | EE | K. T. Arasu,
Yu Qing Chen,
John F. Dillon,
Xiaoyu Liu,
Kevin J. Player:
Abelian difference sets of order n dividing lambda.
Des. Codes Cryptography 44(1-3): 307-319 (2007) |
| 2006 |
| 11 | EE | K. T. Arasu,
Yu Qing Chen,
Alexander Pott:
On abelian (22m+1(2m-1+1), 2m(2m+1), 2m)-difference sets.
J. Comb. Theory, Ser. A 113(6): 1120-1137 (2006) |
| 2005 |
| 10 | EE | Yu Qing Chen,
Yeol Je Cho,
Donal O'Regan:
On perturbations of accretive mappings.
Appl. Math. Lett. 18(7): 775-781 (2005) |
| 9 | EE | Yu Qing Chen,
Cai Heng Li:
Relative difference sets fixed by inversion and Cayley graphs.
J. Comb. Theory, Ser. A 111(1): 165-173 (2005) |
| 8 | EE | Wei-Hung Liu,
Yu Qing Chen,
Kathy J. Horadam:
Relative difference sets fixed by inversion (ii) - character theoretical approach.
J. Comb. Theory, Ser. A 111(2): 175-189 (2005) |
| 2001 |
| 7 | | K. T. Arasu,
Yu Qing Chen:
A Difference Set in.
Des. Codes Cryptography 23(3): 317-324 (2001) |
| 1999 |
| 6 | | Yu Qing Chen:
On a Family of Covering Extended Building Sets.
Des. Codes Cryptography 17(1-3): 69-72 (1999) |
| 1998 |
| 5 | | Yu Qing Chen:
A Construction of Difference Sets.
Des. Codes Cryptography 13(3): 247-250 (1998) |
| 4 | EE | Yu Qing Chen:
On Hamiltonicity of Vertex-Transitive Graphs and Digraphs of Orderp4.
J. Comb. Theory, Ser. B 72(1): 110-121 (1998) |
| 1996 |
| 3 | EE | Yu Qing Chen,
Dwijendra K. Ray-Chaudhuri,
Qing Xiang:
Constructions of Partial Difference Sets and Relative Difference Sets Using Galois Rings II.
J. Comb. Theory, Ser. A 76(2): 179-196 (1996) |
| 1995 |
| 2 | | Qing Xiang,
Yu Qing Chen:
On the Size of the Multiplier Groups of Cyclic Difference Sets.
J. Comb. Theory, Ser. A 69(1): 168-169 (1995) |
| 1994 |
| 1 | | Yu Qing Chen,
Qing Xiang,
Surinder K. Sehgal:
An Exponent Bound on Skew Hadamard Abelian Difference Sets.
Des. Codes Cryptography 4(4): 313-317 (1994) |