2009 | ||
---|---|---|
32 | EE | Zhuhua Cai, Ruichuan Chen, Jianqiao Feng, Cong Tang, Zhong Chen, Jian-bin Hu: A holistic mechanism against file pollution in peer-to-peer networks. SAC 2009: 28-34 |
31 | EE | Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen: Securing key issuing in peer-to-peer networks. SAC 2009: 84-85 |
2008 | ||
30 | EE | Yong Liu, Zhong Chen, Yu Chen: How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. AINA Workshops 2008: 608-614 |
29 | EE | Xiaoxia Dai, Jiyang Dong, Zhong Chen, Qiqing Zhang: Toxicity Study of Oral Vanadyl Sulfate by NMR-based Metabonomic. BMEI (2) 2008: 883-887 |
28 | EE | Ruichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen: Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. Euro-Par 2008: 601-610 |
27 | EE | Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan: WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. ICDCS 2008: 689-696 |
26 | EE | Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan: Pseudo-randomness Inside Web Browsers. ICICS 2008: 267-278 |
25 | EE | Ming Zhao, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen: A Game Theoretic Approach Based Access Control Mechanism. ICYCS 2008: 1464-1469 |
24 | EE | Zhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan: Efficient Identity-Based Key Issue with TPM. ICYCS 2008: 2354-2359 |
23 | EE | Suke Li, Zhong Chen, Liyong Tang, Zhao Wang: TSearch: A Self-learning Vertical Search Spider for Travel. ICYCS 2008: 348-353 |
22 | EE | Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenjia Guo, Liyong Tang, Zhong Chen: Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. Peer-to-Peer Computing 2008: 22-29 |
21 | EE | Zhong Chen, Zhi-jie Chen: The exact solution of system of linear operator equations in reproducing kernel spaces. Applied Mathematics and Computation 203(1): 56-61 (2008) |
2007 | ||
20 | EE | Yong Wu, Zhong Chen, Qi Jing, Yongcai Wang: LENO: LEast Rotation Near-Optimal Cluster Head Rotation Strategy in Wireless Sensor Networks. AINA 2007: 195-201 |
19 | EE | Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen: CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. ATC 2007: 203-215 |
18 | EE | Ruichuan Chen, Wenjia Guo, Liyong Tang, Jian-bin Hu, Zhong Chen: Hybrid Overlay Structure Based on Virtual Node. ISCC 2007: 1091-1098 |
17 | EE | Jiyang Dong, Junying Zhang, Zhong Chen: Neural Network Based Algorithm for Multi-Constrained Shortest Path Problem. ISNN (1) 2007: 776-785 |
16 | EE | Zhiyong Qiu, Jiyang Dong, Zhong Chen: MR Image Registration Based on Pulse-Coupled Neural Networks. ISNN (3) 2007: 914-922 |
15 | EE | Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang: An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ISPEC 2007: 129-144 |
14 | EE | Zhi-Hong Tao, Cong-Hua Zhou, Zhong Chen, Li-Fu Wang: Bounded Model Checking of CTL. J. Comput. Sci. Technol. 22(1): 39-43 (2007) |
2006 | ||
13 | EE | Zhen Cao, Jian-bin Hu, Zhong Chen, Maoxing Xu, Xia Zhou: Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks. AINA (2) 2006: 160-164 |
12 | EE | Zhenyao Zheng, Jiyang Dong, Zhong Chen, Zhikai Cao, Qingyin Jiang: Design of Interface Software for a Distributed System With Mixed Varied Intelligent Meters. ICARCV 2006: 1-4 |
11 | EE | Lifang Peng, Zhong Chen, Qi Li: Model and method for evaluating creditability of C2C electronic trade. ICEC 2006: 244-249 |
10 | EE | Huijun Sun, Tao Lin, Shuhui Cai, Zhong Chen: Numerical Simulations of Contribution of Chemical Shift in Novel Magnetic Resonance Imaging. ICNC (2) 2006: 374-383 |
9 | EE | Zhong Chen, Ying Xu: Structure Prediction of Helical Transmembrane Proteins at Two Length Scales. J. Bioinformatics and Computational Biology 4(2): 317-334 (2006) |
2005 | ||
8 | EE | Zhong Chen, Ying Xu: Multi-Scale Hierarchical Structure Prediction of Helical Transmembrane Proteins. CSB 2005: 203-207 |
7 | EE | Zhong Chen, XianMing Zhang: Monitoring of Tool Wear Using Feature Vector Selection and Linear Regression. ICNC (2) 2005: 1-6 |
6 | EE | Peng Liu, Jian-bin Hu, Zhong Chen: A Formal Language for Access Control Policies in Distributed Environment. Web Intelligence 2005: 766-769 |
5 | EE | Minggen Cui, Zhong Chen: All solutions of system of ill-posed operator equations of the first kind. Applied Mathematics and Computation 165(3): 749-758 (2005) |
2004 | ||
4 | Yihua Philip Sheng, Zhong Chen, Shahram Rahimi, Srinivas Mandalapu: A Light-weight Distributed Web Search Engine: Distributed Web Crawling Part. Computers and Their Applications 2004: 197-200 | |
3 | Yihua Philip Sheng, Wen-Chi Hou, Zhong Chen: An Application of Knowledge Discovery Techniques on Stock Market. Computers and Their Applications 2004: 83-86 | |
2 | EE | Peng Liu, Zhong Chen: An Access Control Model for Web Services in Business Process. Web Intelligence 2004: 292-298 |
2002 | ||
1 | Shimin Wei, Guozhen Xiao, Zhong Chen: A fast algorithm for determining the minimal polynomial where of a sequence with period 2pn over GF(q). IEEE Transactions on Information Theory 48(10): 2754-2758 (2002) |