Hefeng Chen

Orcid: 0000-0002-7272-0563

According to our database1, Hefeng Chen authored at least 23 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Small-Size Liveness-Enforcing Supervisor for Automated Manufacturing Systems Using the Theory of Transition Cover.
IEEE Trans. Syst. Man Cybern. Syst., April, 2023

Accelerated matrix completion algorithm using continuation strategy and randomized SVD.
J. Comput. Appl. Math., 2023

Color Image Scrambling Technique Based on Chinese Remainder Theorem and Arnold Transformation.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

2022
Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix.
IEEE Trans. Circuits Syst. Video Technol., 2022

CAT: Using Cross Attention Transformation to Build Correlation of RGB-D for Road Detection.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
Decision on Maximal Permissiveness of Linear Constraints via Structural Analysis of a Subclass of Petri Nets.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Improving UNIWARD distortion function via isotropic construction and hierarchical merging.
J. Vis. Commun. Image Represent., 2021

2020
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem.
Secur. Commun. Networks, 2020

Polynomial-complexity robust deadlock controllers for a class of automated manufacturing systems with unreliable resources using Petri nets.
Inf. Sci., 2020

Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem.
Int. J. Netw. Secur., 2020

Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption.
Int. J. Comput. Sci. Eng., 2020

Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies.
Clust. Comput., 2020

An adaptive approach of Feature Selection applied to Semi-Supervised Fuzzy Clustering.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

2019
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.
Secur. Commun. Networks, 2019

Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.
Secur. Commun. Networks, 2019

A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem.
Secur. Commun. Networks, 2019

A new method of generating hard random lattices with short bases.
EURASIP J. Inf. Secur., 2019

Lossy trapdoor functions based on the PLWE.
Clust. Comput., 2019

A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares.
IEEE Access, 2019

Liveness of Disjunctive and Strict Single-Type Automated Manufacturing System: An ROPN Approach.
IEEE Access, 2019

Maximally Permissive Supervisor Synthesis Using Reachability and Structural Analysis of Petri Nets.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

2016
A novel method for deadlock prevention of AMS by using resource-oriented Petri nets.
Inf. Sci., 2016

2015
Resource-Oriented Petri Net-Based Approach to Deadlock Prevention of AMSs.
Proceedings of the 2015 IEEE International Conference on Systems, 2015


  Loading...