Chen Chen

Orcid: 0000-0002-3462-209X

Affiliations:
  • ETH Zürich, Network Security Lab, Zurich, Switzerland
  • Carnegie Mellon University, Pittsburgh, PA, USA


According to our database1, Chen Chen authored at least 14 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A robust VVC video encryption scheme based on the dynamical chaotification model.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

A Robust Selective Encryption Scheme for H.265/HEVC Video.
IEEE Access, 2023

A Novel Selective Encryption Scheme for H.266/VVC Video.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
Proof of Learning: Towards a Practical Blockchain Consensus Mechanism Using Directed Guiding Gradients (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2020
An improved image encryption algorithm with finite computing precision.
Signal Process., 2020

2018
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer.
Proc. Priv. Enhancing Technol., 2017

2016
Modeling Data-Plane Power Consumption of Future Internet Architectures.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
On Building Onion Routing into Future Internet Architectures.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

ECO-DNS: Expected Consistency Optimization for DNS.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

HORNET: High-speed Onion Routing at the Network Layer.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
cTPM: A Cloud TPM for Cross-Device Trusted Applications.
login Usenix Mag., 2014

2013
Towards verifiable resource accounting for outsourced computation.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

2011
Flooding-resilient broadcast authentication for VANETs.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011


  Loading...