Jiahui Chen

Orcid: 0000-0001-7128-9778

Affiliations:
  • Guangdong University of Technology, Guangzhou, China
  • National University of Singapore, Singapore (former)


According to our database1, Jiahui Chen authored at least 46 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Anomaly Rule Detection in Sequence Data.
IEEE Trans. Knowl. Data Eng., December, 2023

DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack.
IEEE Internet Things J., January, 2023

Targeted High-Utility Itemset Querying.
IEEE Trans. Artif. Intell., 2023

Web3: The Next Internet Revolution.
CoRR, 2023

Mining Rare Utility Patterns within Target Items.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Smart System: Joint Utility and Frequency for Pattern Classification.
ACM Trans. Manag. Inf. Syst., December, 2022

Negative pattern discovery with individual support.
Knowl. Based Syst., 2022

Comments on "A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud".
J. Syst. Archit., 2022

On-shelf utility mining from transaction database.
Eng. Appl. Artif. Intell., 2022

A Generic Algorithm for Top-K On-Shelf Utility Mining.
CoRR, 2022

Itemset Utility Maximization with Correlation Measure.
CoRR, 2022

Temporal Fuzzy Utility Maximization with Remaining Measure.
CoRR, 2022

Static Detection of File Access Control Vulnerabilities on Windows System.
Concurr. Comput. Pract. Exp., 2022

Security Issues of Novel RSA Variant.
IEEE Access, 2022

Discovering Top-k Profitable Patterns for Smart Manufacturing.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Fast RFM Model for Customer Segmentation.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Fast Weighted Sequential Pattern Mining.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

Fuzzy Utility Mining on Temporal Data.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Fast Mining RFM Patterns for Behavioral Analytics.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Targeted Mining of Rare High-Utility Patterns.
Proceedings of the IEEE International Conference on Big Data, 2022

Metaverse in Education: Vision, Opportunities, and Challenges.
Proceedings of the IEEE International Conference on Big Data, 2022

Flexibly Mining Better Patterns.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid.
Wirel. Commun. Mob. Comput., 2021

A secure blockchain-based group key agreement protocol for IoT.
J. Supercomput., 2021

Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating.
Secur. Commun. Networks, 2021

On the construction of a post-quantum blockchain for smart city.
J. Inf. Secur. Appl., 2021

TargetUM: Targeted High-Utility Itemset Querying.
CoRR, 2021

FUIM: Fuzzy Utility Itemset Mining.
CoRR, 2021

THUE: Discovering Top-K High Utility Episodes.
CoRR, 2021

TOPIC: Top-k High-Utility Itemset Discovering.
CoRR, 2021

A jumping mining attack and solution.
Appl. Intell., 2021

On the Construction of a Post-Quantum Blockchain.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Joint Utility and Frequency for Pattern Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

NSPIS: Mining Negative Sequential Patterns with Individual Support.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
A new encryption scheme for multivariate quadratic systems.
Theor. Comput. Sci., 2020

A Novel Location Privacy-Preserving Approach Based on Blockchain.
Sensors, 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications.
IEEE Access, 2020

TopHUI: Top-k high-utility itemset mining with negative utility.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

OSUMI: On-Shelf Utility Mining from Itemset-based Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
基于可撤销外包属性加密的二维码加密 (Two-dimensional Code Encryption Based on Revocable Outsourced Attribute Encryption).
计算机科学, 2019

Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems.
Comput. J., 2019

MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2017
Online/offline signature based on UOV in wireless sensor networks.
Wirel. Networks, 2017

HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere.
KSII Trans. Internet Inf. Syst., 2017

2013
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.
IACR Cryptol. ePrint Arch., 2013


  Loading...