2009 |
32 | EE | Zhuhua Cai,
Ruichuan Chen,
Jianqiao Feng,
Cong Tang,
Zhong Chen,
Jian-bin Hu:
A holistic mechanism against file pollution in peer-to-peer networks.
SAC 2009: 28-34 |
31 | EE | Cong Tang,
Ruichuan Chen,
Zhuhua Cai,
Anmin Xie,
Jian-bin Hu,
Liyong Tang,
Zhong Chen:
Securing key issuing in peer-to-peer networks.
SAC 2009: 84-85 |
2008 |
30 | EE | Yong Liu,
Zhong Chen,
Yu Chen:
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor.
AINA Workshops 2008: 608-614 |
29 | EE | Xiaoxia Dai,
Jiyang Dong,
Zhong Chen,
Qiqing Zhang:
Toxicity Study of Oral Vanadyl Sulfate by NMR-based Metabonomic.
BMEI (2) 2008: 883-887 |
28 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Euro-Par 2008: 601-610 |
27 | EE | Zhi Guan,
Zhen Cao,
Xuan Zhao,
Ruichuan Chen,
Zhong Chen,
Xianghao Nan:
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications.
ICDCS 2008: 689-696 |
26 | EE | Zhi Guan,
Long Zhang,
Zhong Chen,
Xianghao Nan:
Pseudo-randomness Inside Web Browsers.
ICICS 2008: 267-278 |
25 | EE | Ming Zhao,
Jinqiang Ren,
Huiping Sun,
Suming Li,
Zhong Chen:
A Game Theoretic Approach Based Access Control Mechanism.
ICYCS 2008: 1464-1469 |
24 | EE | Zhi Guan,
Huiping Sun,
Zhong Chen,
Xianghao Nan:
Efficient Identity-Based Key Issue with TPM.
ICYCS 2008: 2354-2359 |
23 | EE | Suke Li,
Zhong Chen,
Liyong Tang,
Zhao Wang:
TSearch: A Self-learning Vertical Search Spider for Travel.
ICYCS 2008: 348-353 |
22 | EE | Ruichuan Chen,
Eng Keong Lua,
Jon Crowcroft,
Wenjia Guo,
Liyong Tang,
Zhong Chen:
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Peer-to-Peer Computing 2008: 22-29 |
21 | EE | Zhong Chen,
Zhi-jie Chen:
The exact solution of system of linear operator equations in reproducing kernel spaces.
Applied Mathematics and Computation 203(1): 56-61 (2008) |
2007 |
20 | EE | Yong Wu,
Zhong Chen,
Qi Jing,
Yongcai Wang:
LENO: LEast Rotation Near-Optimal Cluster Head Rotation Strategy in Wireless Sensor Networks.
AINA 2007: 195-201 |
19 | EE | Ruichuan Chen,
Xuan Zhao,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
ATC 2007: 203-215 |
18 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Hybrid Overlay Structure Based on Virtual Node.
ISCC 2007: 1091-1098 |
17 | EE | Jiyang Dong,
Junying Zhang,
Zhong Chen:
Neural Network Based Algorithm for Multi-Constrained Shortest Path Problem.
ISNN (1) 2007: 776-785 |
16 | EE | Zhiyong Qiu,
Jiyang Dong,
Zhong Chen:
MR Image Registration Based on Pulse-Coupled Neural Networks.
ISNN (3) 2007: 914-922 |
15 | EE | Zhen Cao,
Zhi Guan,
Zhong Chen,
Jian-bin Hu,
Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
ISPEC 2007: 129-144 |
14 | EE | Zhi-Hong Tao,
Cong-Hua Zhou,
Zhong Chen,
Li-Fu Wang:
Bounded Model Checking of CTL.
J. Comput. Sci. Technol. 22(1): 39-43 (2007) |
2006 |
13 | EE | Zhen Cao,
Jian-bin Hu,
Zhong Chen,
Maoxing Xu,
Xia Zhou:
Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks.
AINA (2) 2006: 160-164 |
12 | EE | Zhenyao Zheng,
Jiyang Dong,
Zhong Chen,
Zhikai Cao,
Qingyin Jiang:
Design of Interface Software for a Distributed System With Mixed Varied Intelligent Meters.
ICARCV 2006: 1-4 |
11 | EE | Lifang Peng,
Zhong Chen,
Qi Li:
Model and method for evaluating creditability of C2C electronic trade.
ICEC 2006: 244-249 |
10 | EE | Huijun Sun,
Tao Lin,
Shuhui Cai,
Zhong Chen:
Numerical Simulations of Contribution of Chemical Shift in Novel Magnetic Resonance Imaging.
ICNC (2) 2006: 374-383 |
9 | EE | Zhong Chen,
Ying Xu:
Structure Prediction of Helical Transmembrane Proteins at Two Length Scales.
J. Bioinformatics and Computational Biology 4(2): 317-334 (2006) |
2005 |
8 | EE | Zhong Chen,
Ying Xu:
Multi-Scale Hierarchical Structure Prediction of Helical Transmembrane Proteins.
CSB 2005: 203-207 |
7 | EE | Zhong Chen,
XianMing Zhang:
Monitoring of Tool Wear Using Feature Vector Selection and Linear Regression.
ICNC (2) 2005: 1-6 |
6 | EE | Peng Liu,
Jian-bin Hu,
Zhong Chen:
A Formal Language for Access Control Policies in Distributed Environment.
Web Intelligence 2005: 766-769 |
5 | EE | Minggen Cui,
Zhong Chen:
All solutions of system of ill-posed operator equations of the first kind.
Applied Mathematics and Computation 165(3): 749-758 (2005) |
2004 |
4 | | Yihua Philip Sheng,
Zhong Chen,
Shahram Rahimi,
Srinivas Mandalapu:
A Light-weight Distributed Web Search Engine: Distributed Web Crawling Part.
Computers and Their Applications 2004: 197-200 |
3 | | Yihua Philip Sheng,
Wen-Chi Hou,
Zhong Chen:
An Application of Knowledge Discovery Techniques on Stock Market.
Computers and Their Applications 2004: 83-86 |
2 | EE | Peng Liu,
Zhong Chen:
An Access Control Model for Web Services in Business Process.
Web Intelligence 2004: 292-298 |
2002 |
1 | | Shimin Wei,
Guozhen Xiao,
Zhong Chen:
A fast algorithm for determining the minimal polynomial where of a sequence with period 2pn over GF(q).
IEEE Transactions on Information Theory 48(10): 2754-2758 (2002) |