| 2009 |
| 7 | EE | Cong Tang,
Ruichuan Chen,
Zhuhua Cai,
Anmin Xie,
Jian-bin Hu,
Liyong Tang,
Zhong Chen:
Securing key issuing in peer-to-peer networks.
SAC 2009: 84-85 |
| 2008 |
| 6 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Euro-Par 2008: 601-610 |
| 5 | EE | Suke Li,
Zhong Chen,
Liyong Tang,
Zhao Wang:
TSearch: A Self-learning Vertical Search Spider for Travel.
ICYCS 2008: 348-353 |
| 4 | EE | Ruichuan Chen,
Eng Keong Lua,
Jon Crowcroft,
Wenjia Guo,
Liyong Tang,
Zhong Chen:
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Peer-to-Peer Computing 2008: 22-29 |
| 2007 |
| 3 | EE | Ruichuan Chen,
Xuan Zhao,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
ATC 2007: 203-215 |
| 2 | EE | Ruichuan Chen,
Wenjia Guo,
Liyong Tang,
Jian-bin Hu,
Zhong Chen:
Hybrid Overlay Structure Based on Virtual Node.
ISCC 2007: 1091-1098 |
| 1 | EE | Zhen Cao,
Zhi Guan,
Zhong Chen,
Jian-bin Hu,
Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
ISPEC 2007: 129-144 |