Fei Chen

According to our database1, Fei Chen authored at least 38 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
RLWE-Based ID-DIA Protocols for Cloud Storage.
IEEE Access, 2019

Secure Cloud Storage Based on RLWE Problem.
IEEE Access, 2019

Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem.
IEEE Access, 2019

On Overcoming the Identified Limitations of a Usable PIN Entry Method.
IEEE Access, 2019

2018
User Differentiated Verifiable File Search on the Cloud.
IEEE Trans. Services Computing, 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Information Forensics and Security, 2018

An enhanced artificial bee colony algorithm with dual-population framework.
Swarm and Evolutionary Computation, 2018

A survey on application of machine learning for Internet of Things.
Int. J. Machine Learning & Cybernetics, 2018

Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud.
J. Parallel Distrib. Comput., 2018

An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies.
Inf. Sci., 2018

Efficient biometric identity-based encryption.
Inf. Sci., 2018

Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary Computation.
Complexity, 2018

A novel multi-objective co-evolutionary algorithm based on decomposition approach.
Appl. Soft Comput., 2018

Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data.
IEEE Access, 2018

Identity-Based Proofs of Storage with Enhanced Privacy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017

A secure cloud storage system based on discrete logarithm problem.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

2016
Secure Cloud Storage Meets with Secure Network Coding.
IEEE Trans. Computers, 2016

Processing secure, verifiable and efficient SQL over outsourced database.
Inf. Sci., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
I. J. Bifurcation and Chaos, 2016

A Review of Compressive Sensing in Information Security Field.
IEEE Access, 2016

Making Cloud Storage Integrity Checking Protocols Economically Smarter.
Proceedings of the Smart Computing and Communication, 2016

Bilateral-secure Signature by Key Evolving.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Cloud Storage Integrity Checking: Going from Theory to Practice.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Period distribution of generalized discrete Arnold cat map.
Theor. Comput. Sci., 2014

Highly Efficient Linear Regression Outsourcing to a Cloud.
IEEE Trans. Cloud Computing, 2014

Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks.
Sig. Proc.: Image Comm., 2014

Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud.
J. Parallel Distrib. Comput., 2014

Towards verifiable file search on the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

A verifiable PSO algorithm in cloud computing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$.
IEEE Trans. Information Theory, 2013

Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
Period Distribution of Generalized Discrete Arnold Cat Map for N=pe.
IEEE Trans. Information Theory, 2012

2011
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN.
Inf. Sci., 2011


  Loading...