Ju Chen

Orcid: 0000-0002-5243-2644

According to our database1, Ju Chen authored at least 22 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
PRO2SAT: Systematic Probabilistic Satisfiability logic in Discrete Hopfield Neural Network.
Adv. Eng. Softw., 2023

R-Fuzz at SBFT'2023.
Proceedings of the IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 2023

A Modified Fuzzy K-nearest Neighbor Using the Improved Sparrow Search Algorithm for Two-classes and Multi-classes Datasets.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

Estimation of Distribution Algorithm with Discrete Hopfield Neural Network for GRAN3SAT Analysis.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

Genetic algorithm in hopfield neural network with probabilistic 2 satisfiability.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

2022
Building an Efficient Concolic Executor
PhD thesis, 2022

YRAN2SAT: A novel flexible random satisfiability logical rule in discrete hopfield neural network.
Adv. Eng. Softw., 2022

SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

JIGSAW: Efficient and Scalable Path Constraints Fuzzing.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Authenticated key-value stores with hardware enclaves.
Proceedings of the Middleware '21: Proceedings of the 22nd International Middleware Conference: Industrial Track, Virtual Event / Québec City, Canada, December 6, 2021

2019
Authenticated LSM Trees with Minimal Trust.
Proceedings of the Security and Privacy in Communication Networks, 2019

Novel Approach for Multi-valued Truth Discovery.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, 2019

2018
Syndrome Differentiation and Treatment Algorithm Model in Traditional Chinese Medicine Based on Disease Cause, Location, Characteristics and Conditions.
IEEE Access, 2018

Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing.
Proceedings of the Security and Privacy in Communication Networks, 2018

Lightweight Blockchain Logging for Data-Intensive Applications.
Proceedings of the Financial Cryptography and Data Security, 2018

ChainFS: Blockchain-Secured Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Strongly Secure and Efficient Data Shuffle on Hardware Enclaves.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

2016
Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust.
IACR Cryptol. ePrint Arch., 2016

Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU.
Proceedings of the Information Security Practice and Experience, 2016

2015
An Identity Management Framework for Internet of Things.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

2014
Analytical modeling of oxide thickness variation of metals under high temperature solid-particle erosion.
Int. J. Model. Simul. Sci. Comput., 2014

2009
Design of shear strengths of corroded reinforced concrete beams.
Int. J. Model. Identif. Control., 2009


  Loading...