default search action
Chi Chen 0001
Person information
- affiliation: Chinese Academy of Sciences, CAS, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Chi Chen (aka: Chen Chi) — disambiguation page
- Chi Chen 0002 — Wuhan University, Wuhan, China
- Chi Chen 0003 — Changchun Institute of Optics, Fine Mechanics and Physics, Chinese Academy of Sciences, Changchun, China
- Chi Chen 0004 — Rutgers University, New Brunswick, NJ, USA (and 2 more)
- Chi Chen 0005 — Tsinghua University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen:
Dynamic group fuzzy extractor. Cybersecur. 7(1): 25 (2024) - 2023
- [j5]Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen:
Cancelable biometric schemes for Euclidean metric and Cosine metric. Cybersecur. 6(1): 4 (2023) - [c15]Yucheng Ma, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen:
General Constructions of Fuzzy Extractors for Continuous Sources. Inscrypt (1) 2023: 163-182 - 2022
- [c14]Kaini Chen, Peisong Shen, Kewei Lv, Chi Chen:
Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study. ICICS 2022: 128-147 - [c13]Feng Zhu, Peisong Shen, Kaini Chen, Yucheng Ma, Chi Chen:
A Secure and Practical Sample-then-lock Scheme for Iris Recognition. ICPR 2022: 833-839 - [c12]Jing Yu, Shuguang Yuan, Yulin Yuan, Yafan Li, Chi Chen:
A k-Anonymity-Based Robust Watermarking Scheme for Relational Database. SciSec 2022: 557-573 - [c11]Shuguang Yuan, Chi Chen, Ke Yang, Tengfei Yang, Jing Yu:
An Attribute-attack-proof Watermarking Technique for Relational Database. TrustCom 2022: 1136-1143 - 2020
- [c10]Shuguang Yuan, Jing Yu, Peisong Shen, Chi Chen:
Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational Database. DASFAA (1) 2020: 54-71
2010 – 2019
- 2019
- [c9]Feng Zhu, Peisong Shen, Chi Chen:
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait. SecureComm (2) 2019: 259-272 - 2018
- [c8]Yuting Yang, Peisong Shen, Chi Chen:
A Robust Iris Segmentation Using Fully Convolutional Network with Dilated Convolutions. ISM 2018: 9-16 - 2017
- [c7]Tengfei Yang, Peisong Shen, Xue Tian, Chi Chen:
A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes. ICDCS Workshops 2017: 238-245 - [c6]Xue Tian, Peisong Shen, Tengfei Yang, Chi Chen, Jiankun Hu:
A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data. MONAMI 2017: 66-78 - [c5]Peisong Shen, Chi Chen, Xiaojie Zhu:
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption. SecureComm 2017: 128-146 - 2016
- [j4]Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu, Song Guo, Zahir Tari, Albert Y. Zomaya:
An Efficient Privacy-Preserving Ranked Keyword Search Method. IEEE Trans. Parallel Distributed Syst. 27(4): 951-963 (2016) - 2015
- [j3]Xuexiu Chen, Chi Chen, Yuan Tao, Jiankun Hu:
A Cloud Security Assessment System Based on Classifying and Grading. IEEE Cloud Comput. 2(2): 58-67 (2015) - [j2]Huawei Zhao, Chi Chen, Jiankun Hu, Jing Qin:
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption. Int. J. Distributed Sens. Networks 11: 764919:1-764919:11 (2015) - [j1]Chi Chen, Xiaojie Zhu, Peisong Shen, Jing Yu, Hong Zou, Jiankun Hu:
SOLS: A scheme for outsourced location based service. J. Netw. Comput. Appl. 56: 158-165 (2015) - [c4]Peisong Shen, Chi Chen, Xue Tian, Jing Tian:
A similarity evaluation algorithm and its application in multi-keyword search on encrypted cloud data. MILCOM 2015: 1218-1223 - 2014
- [c3]M. Hamedi-Hamzehkolaie, Reza Sanei, Chi Chen, Xue Tian, Masoud Khalil Nezhad:
Bee-based IP traceback. FSKD 2014: 968-972 - [c2]Chi Chen, Chaogang Wang, Tengfei Yang, Dongdai Lin, Song Wang, Jiankun Hu:
Optional multi-biometric cryptosystem based on fuzzy extractor. FSKD 2014: 989-994 - [c1]Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu:
A hierarchical clustering method for big data oriented ciphertext search. INFOCOM Workshops 2014: 559-564
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint