default search action
Zhenhua Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Zhenhua Chen, Ting Li, Junrui Xie, Ni Li, Jingjing Nie:
Kth min Threshold Encryption for Privacy-preserving Data Evaluation. Comput. J. 67(5): 1941-1950 (2024) - [j34]Jing Wu, Rixiang Ni, Zhenhua Chen, Feng Huang, Liqiong Chen:
FEFN: Feature Enhancement Feedforward Network for Lightweight Object Detection in Remote Sensing Images. Remote. Sens. 16(13): 2398 (2024) - [j33]Zhenhua Chen, Luqi Huang, Guomin Yang, Willy Susilo, Xingbing Fu, Xingxing Jia:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. IEEE Trans. Serv. Comput. 17(3): 789-803 (2024) - [c27]Zhenhua Chen, Xinze Zhang, Kun He:
Multi-Channel Convolutional Distilled Transformer for Automatic Modulation Classification. IJCNN 2024: 1-8 - [c26]Zhen Yu, Zhenhua Chen, Kun He:
Query-Efficient Textual Adversarial Example Generation for Black-Box Attacks. NAACL-HLT 2024: 556-569 - 2023
- [j32]Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo:
Geometric Searchable Encryption Without False Positive And Its Applications. Comput. J. 66(9): 2155-2168 (2023) - [j31]Hai Lin, Jie Wang, Zhenhua Chen, Junxiang Ge:
A 94 GHz Pulse Doppler Solid-State Millimeter-Wave Cloud Radar. Remote. Sens. 15(12): 3098 (2023) - [j30]Zhenhua Chen, Jingjing Nie, Li Zhan-Li, Willy Susilo, Chunpeng Ge:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. IEEE Trans. Serv. Comput. 16(4): 2672-2684 (2023) - [c25]Zhen Yu, Zhou Qin, Zhenhua Chen, Meihui Lian, Haojun Fu, Weigao Wen, Hui Xue, Kun He:
Sparse Black-Box Multimodal Attack for Vision-Language Adversary Generation. EMNLP (Findings) 2023: 5775-5784 - [c24]Wenchao Li, Sheng Liu, Hao Ding, Liang He, Zhenhua Chen, Qingliang Li, Kaichuang Xue:
A hyper-spectral Data Unsupervised Classification Method Combining Linear Projection and Gaussian Mixture Model. ICCIP 2023: 153-157 - [c23]Zhenhua Chen, Zekai Chen, Liangliang Zhou, Pengwu Zheng, Yuyu Xu:
Exploring the National First-Class Specialty Construction of Pharmaceutical Engineering Under the Background of "New Engineering" Project. MMBD 2023: 455-462 - [i6]Zhenhua Chen, David Crandall:
A Tensor-based Convolutional Neural Network for Small Dataset Classification. CoRR abs/2303.17061 (2023) - 2022
- [j29]Ni Li, Zhenhua Chen, Jingjing Nie, Xingbing Fu, Xingxing Jia:
Complementary set encryption for privacy-preserving data consolidation. Inf. Sci. 593: 271-288 (2022) - [c22]Liang Zhang, Zhenhua Chen, Jinqian Tao, Kangyi Zhang, Zhaodun Huang, Hao Ding:
A Convolutional Neural Network Based Infrared-Visible Image Fusion Method and its Application in Aerospace Measurement and Control. ICTAI 2022: 867-872 - [c21]Zhenhua Chen, Chuhua Wang, David Crandall:
Semantically Stealthy Adversarial Attacks against Segmentation Models. WACV 2022: 2846-2855 - 2021
- [j28]Zhenhua Chen, Peng Teng, Jianru Wang:
An E-Band Beam Sharpening Antenna Based on Monopulse Comparator. IEEE Access 9: 73262-73270 (2021) - [c20]Xinze Zhang, Junzhe Zhang, Zhenhua Chen, Kun He:
Crafting Adversarial Examples for Neural Machine Translation. ACL/IJCNLP (1) 2021: 1967-1977 - [c19]Wenchao Li, Gangyao Kuang, Zhenhua Chen, Jian Wang:
Separation of Multi-component Micro-Doppler Signals Based on HHT-GAMD. CISP-BMEI 2021: 1-6 - [i5]Zhenhua Chen, Chuhua Wang, David J. Crandall:
Adversarial Attack in the Context of Self-driving. CoRR abs/2104.01732 (2021) - [i4]Zhenhua Chen, Xiwen Li, Qian Lou, David J. Crandall:
How to Accelerate Capsule Convolutions in Capsule Networks. CoRR abs/2104.02621 (2021) - 2020
- [j27]Zhenhua Chen, Luqi Huang, Xiaonan Shi, Qiong Huang, Hao Wang, Xueqiao Liu:
Privacy-preserving polynomial interpolation and its applications on predictive analysis. Inf. Sci. 541: 259-270 (2020) - [j26]Md. Alimoor Reza, Zhenhua Chen, David J. Crandall:
Deep Neural Network-Based Detection and Verification of Microelectronic Images. J. Hardw. Syst. Secur. 4(1): 44-54 (2020) - [j25]Zhenhua Chen, Zhaoya Gong, Shan Yang, Qiwei Ma, Changcheng Kan:
Impact of extreme weather events on urban human flow: A perspective from location-based service data. Comput. Environ. Urban Syst. 83: 101520 (2020) - [c18]Jian Wang, Zhenhua Chen, Liang Zhang:
A Particle Filter Track-Before-Detect Method for Monopulse Radar in Space Aircraft Launch Site. SAM 2020: 1-5
2010 – 2019
- 2019
- [j24]Dangguo Shao, Na Zheng, Zhaoqiang Yang, Zhenhua Chen, Yan Xiang, Yantuan Xian, Zhengtao Yu:
Domain-Specific Chinese Word Segmentation Based on Bi-Directional Long-Short Term Memory Model. IEEE Access 7: 12993-13002 (2019) - [j23]Weili Jiang, Zhenhua Chen, Yan Xiang, Dangguo Shao, Lei Ma, Junpeng Zhang:
SSEM: A Novel Self-Adaptive Stacking Ensemble Model for Classification. IEEE Access 7: 120337-120349 (2019) - [j22]Zhenhua Chen, Weili Jiang, Lei Ma, Junpeng Zhang, Jinshan Hu, Yan Xiang, Dangguo Shao:
MEM: a new mixed ensemble model for identifying frauds. Int. J. Inf. Commun. Technol. 15(3): 294-303 (2019) - [j21]Xingxing Jia, Daoshun Wang, Qimeng Chu, Zhenhua Chen:
An efficient XOR-based verifiable visual cryptographic scheme. Multim. Tools Appl. 78(7): 8207-8223 (2019) - [i3]Zhenhua Chen, Xiwen Li, Chuhua Wang, David J. Crandall:
P-CapsNets: a General Form of Convolutional Neural Networks. CoRR abs/1912.08367 (2019) - 2018
- [j20]Zhenhua Chen, Yongjian Yang, Liping Huang, En Wang, Dawei Li:
Discovering Urban Traffic Congestion Propagation Patterns With Taxi Trajectory Data. IEEE Access 6: 69481-69491 (2018) - [j19]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua, Chonggang Wang:
GPU-Accelerated High-Throughput Online Stream Data Processing. IEEE Trans. Big Data 4(2): 191-202 (2018) - [c17]Shan Zhang, Jielong Xu, Sora Choi, Jian Tang, Pramod K. Varshney, Zhenhua Chen:
A Parallel Platform for Fusion of Heterogeneous Stream Data. FUSION 2018: 588-594 - [i2]Zhenhua Chen, David J. Crandall:
Generalized Capsule Networks with Trainable Routing Procedure. CoRR abs/1808.08692 (2018) - 2017
- [j18]Dingde Jiang, Zhengzheng Xu, Wenpan Li, Zhenhua Chen:
Topology control-based collaborative multicast routing algorithm with minimum energy consumption. Int. J. Commun. Syst. 30(1) (2017) - [j17]Xiang-Wei Zheng, Bin Hu, Dianjie Lu, Zhenhua Chen, Hong Liu:
Energy-efficient virtual network embedding in networks for cloud computing. Int. J. Web Grid Serv. 13(1): 75-93 (2017) - [j16]Wei Yi, Zhenhua Chen, Reza Hoseinnezhad, Rick S. Blum:
Joint estimation of location and signal parameters for an LFM emitter. Signal Process. 134: 100-112 (2017) - [c16]Zhenhua Chen, Tingyi Wanyan, Ramya Rao, Benjamin Cutilli, James Sowinski, David J. Crandall, Robert Templeman:
Addressing supply chain risks of microelectronic devices through computer vision. AIPR 2017: 1-8 - [c15]Zhenhua Chen, Xiaomei Xu, Yougan Chen:
Finite-length EXIT analyses for protograph LDPC codes over underwater acoustic channels. ICSPCC 2017: 1-6 - 2016
- [j15]Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou:
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr. Comput. Pract. Exp. 28(10): 2858-2876 (2016) - [j14]Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:
A Joint Random Secret Sharing Scheme with Public Verifiability. Int. J. Netw. Secur. 18(5): 917-925 (2016) - [j13]Xiping Gong, Zhenhua Chen, Wei Wu:
The application of cholesky decomposition in valence bond calculation. J. Comput. Chem. 37(23): 2157-2162 (2016) - [c14]Yu Zheng, Zhenhua Jimmy Chen, Senem Velipasalar, Jian Tang:
Person Detection and Re-identification Across Multiple Images and Videos Obtained via Crowdsourcing. ICDSC 2016: 178-183 - 2015
- [j12]Xin Liu, Shundong Li, Zhenhua Chen:
基本初等函数的保密云计算服务协议 (Secure Cloud Computing Service Protocols of Elementary Functions). 计算机科学 42(10): 159 (2015) - [j11]Dingde Jiang, Zhengzheng Xu, Wenpan Li, Zhenhua Chen:
Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks. J. Syst. Softw. 104: 152-165 (2015) - [j10]Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu:
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mob. Inf. Syst. 2015: 637458:1-637458:8 (2015) - [j9]Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. Secur. Commun. Networks 8(8): 1485-1493 (2015) - [j8]Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu:
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. Secur. Commun. Networks 8(18): 3592-3601 (2015) - [c13]Zhenhua Chen, Xiang-wei Zheng, Dianjie Lu:
A Study of a Virtual Network Embedding Algorithm. CIT/IUCC/DASC/PICom 2015: 814-818 - [c12]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua:
G-Storm: GPU-enabled high-throughput online data processing in Storm. IEEE BigData 2015: 307-312 - [c11]Zhenhua Chen, Xiang-wei Zheng, Xi-bin Chen:
A Virtual Network Reconfiguration Algorithm Oriented to Energy Consumption. BWCCA 2015: 605-609 - 2014
- [j7]Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang:
Comments on FHH Anonymous Multireceiver Encryption. Int. J. Netw. Secur. 16(5): 397-400 (2014) - [c10]Xuejie Xiao, Jian Tang, Zhenhua Chen, Jielong Xu, Chonggang Wang:
A cross-job framework for MapReduce scheduling. IEEE BigData 2014: 135-140 - [c9]Xiangwei Zheng, Dianjie Lu, Zhenhua Chen:
A self-adaptive group search optimizer with Elitist strategy. IEEE Congress on Evolutionary Computation 2014: 2033-2039 - [c8]Xiangwei Zheng, Zhenhua Chen, Dianjie Lu, Hong Liu:
Virtual Network Embedding Model Minimizing Energy Consumption. HCC 2014: 646-655 - [c7]Jielong Xu, Zhenhua Chen, Jian Tang, Sen Su:
T-Storm: Traffic-Aware Online Scheduling in Storm. ICDCS 2014: 535-544 - [c6]Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu:
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. NSS 2014: 82-95 - 2013
- [j6]Jinshuai Song, Zhenhua Chen, Sason Shaik, Wei Wu:
An efficient algorithm for complete active space valence bond self-consistent field calculation. J. Comput. Chem. 34(1): 38-48 (2013) - [j5]Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. Secur. Commun. Networks 6(8): 1044-1052 (2013) - [c5]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. ISPEC 2013: 75-90 - [i1]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. IACR Cryptol. ePrint Arch. 2013: 247 (2013) - 2012
- [j4]Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen:
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy. Int. J. Netw. Secur. 14(5): 270-279 (2012) - [c4]Wentao Yao, Zhidong Deng, Zhenhua Chen:
A global and local condensation for lane tracking. ITSC 2012: 276-281 - [c3]Zhenhua Chen, Chunying Wu, Daoshun Wang, Shundong Li:
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor. PAISI 2012: 176-189 - 2011
- [j3]Dingde Jiang, Zhengzheng Xu, Hongwei Xu, Yang Han, Zhenhua Chen, Zhen Yuan:
An approximation method of origin-destination flow traffic from link load counts. Comput. Electr. Eng. 37(6): 1106-1121 (2011) - [j2]Dingde Jiang, Zhengzheng Xu, Zhenhua Chen, Yang Han, Hongwei Xu:
Joint time-frequency sparse estimation of large-scale network traffic. Comput. Networks 55(15): 3533-3547 (2011) - [c2]Dingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen, Hongwei Xu:
An Optimal Estimation of Origin-Destination Traffic in Large-Scale Backbone Network. ICC 2011: 1-5 - 2010
- [j1]Xingwei Wang, Dingde Jiang, Zhengzheng Xu, Zhenhua Chen:
An accurate method to estimate traffic matrices from link loads for QoS provision. J. Commun. Networks 12(6): 624-631 (2010) - [c1]Dingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen:
An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks. CIS 2010: 586-590
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint