Fei Chen
Title
Cited by
Cited by
Year
A Review of Compressive Sensing in Information Security Field
Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He
IEEE Access 4, 2507-2519, 2016
1552016
Embedding cryptographic features in compressive sensing
Y Zhang, J Zhou, F Chen, LY Zhang, KW Wong, X He, D Xiao
Neurocomputing 205, 472-480, 2016
1032016
Secure cloud storage meets with secure network coding
F Chen, T Xiang, Y Yang, SSM Chow
IEEE Transactions on Computers 65 (6), 1936-1948, 2016
942016
Secure cloud storage meets with secure network coding
F Chen, T Xiang, Y Yang, SSM Chow
INFOCOM, 2014 Proceedings IEEE, 673-681, 2014
942014
A survey on application of machine learning for Internet of Things
L Cui, S Yang, F Chen, Z Ming, N Lu, J Qin
International Journal of Machine Learning and Cybernetics 9 (8), 1399-1417, 2018
882018
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
F Chen, T Xiang, Y Yang
Journal of Parallel and Distributed Computing 74 (3), 2141-2151, 2014
692014
Period Distribution of the Generalized Discrete Arnold Cat Map for N=2^e
F Chen, KW Wong, X Liao, T Xiang
IEEE Transactions on Information Theory 59 (5), 3249-3255, 2013
572013
Highly Efficient Linear Regression Outsourcing to a Cloud
F Chen, T Xiang, X Lei, J Chen
IEEE Transactions on Cloud Computing 2 (4), 499 - 508, 2014
532014
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field
X Liao, F Chen, KW Wong
IEEE Transactions on Computers 59 (10), 1392-1401, 2010
522010
An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies
Q Lin, Y Ma, J Chen, Q Zhu, CAC Coello, KC Wong, F Chen
Information Sciences 430, 46-64, 2018
382018
Period distribution of generalized discrete arnold cat map for N=p^e
F Chen, KW Wong, X Liao, T Xiang
IEEE Transactions on Information Theory 58 (1), 445-452, 2012
372012
An enhanced artificial bee colony algorithm with dual-population framework
L Cui, G Li, Y Luo, F Chen, Z Ming, N Lu, J Lu
Swarm and Evolutionary Computation 43, 184-206, 2018
292018
A block compressive sensing based scalable encryption framework for protecting significant image regions
Y Zhang, J Zhou, F Chen, LY Zhang, D Xiao, B Chen, X Liao
International Journal of Bifurcation and Chaos 26 (11), 1650191, 2016
292016
Processing secure, verifiable and efficient SQL over outsourced database
T Xiang, X Li, F Chen, S Guo, Y Yang
Information Sciences 348, 163-178, 2016
262016
Period distribution of generalized discrete Arnold cat map
F Chen, K Wong, X Liao, T Xiang
Theoretical Computer Science 552, 13-25, 2014
242014
User Differentiated Verifiable File Search on the Cloud
F Chen, T Xiang, X Fu, W Yu
IEEE Transactions on Services Computing 11 (6), 948-961, 2018
202018
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud
T Xiang, X Li, F Chen, Y Yang, S Zhang
Journal of Parallel and Distributed Computing 112, 97-107, 2018
182018
Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation
J Zhou, H Duan, K Liang, Q Yan, F Chen, FR Yu, J Wu, J Chen
The Computer Journal 60 (8), 1210-1222, 2017
182017
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure
F Chen, T Xiang, Y Yang, C Wang, S Zhang
Computer Communications (INFOCOM), 2015 IEEE Conference on, 2389-2397, 2015
182015
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring Z N
F Chen, X Liao, T Xiang, H Zheng
Information Sciences 181 (22), 5110-5118, 2011
182011
The system can't perform the operation now. Try again later.
Articles 1–20