Lidong Chen

Orcid: 0000-0002-0509-3010

According to our database1, Lidong Chen authored at least 35 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Location and path planning for urban emergency rescue by a hybrid clustering and ant colony algorithm approach.
Appl. Soft Comput., November, 2023

2021
A Visual and VAE Based Hierarchical Indoor Localization Method.
Sensors, 2021

An Intelligent Vehicle Oriented EMC Fault Shooting Method Based on Semi-supervised Learning.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

2020
New mission and opportunity for mathematics researchers: Cryptography in the quantum era.
Adv. Math. Commun., 2020

An intellegent vehicle oriented EMC reverse diagnostic model based on SVM.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2020

2019
Post-quantum cryptography and 5G security: tutorial.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A LSTM Based Bus Arrival Time Prediction Method.
Proceedings of the 2019 IEEE SmartWorld, 2019

Multi-level Scene Modeling and Matching for Smartphone-Based Indoor Localization.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2019

2018
Semi-virtual Test for ICVs in Automotive EMC Laboratary.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

EMC Test for Connected Vehicles and Communication Terminals.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

A Priority and Fairness Mixed Compaction Scheduling Mechanism for LSM-tree Based KV-Stores.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?
IEEE Secur. Priv., 2017

Large-field 3D imaging using an array of gradually-changed FOV cameras.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

2016
Dynamic Request Redirection and Resource Provisioning for Cloud-Based Video Services under Heterogeneous Environment.
IEEE Trans. Parallel Distributed Syst., 2016

Secure Multicast Group Management and Key Distribution in IEEE 802.21.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2014
An approach for fast and parallel video processing on Apache Hadoop clusters.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

2013
A new Standard for securing media independent handover: IEEE 802.21A.
IEEE Wirel. Commun., 2013

An Agent-Based Emergent Task Allocation Algorithm in Clouds.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Cross-selection kernel regression for super-resolution fusion of complementary panoramic images.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

2010
An inconvenient truth about tunneled authentications.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Validating the performance of a 32nm CMOS high speed serial link receiver with adaptive equalization and baud-rate clock data recovery.
Proceedings of the 2011 IEEE International Test Conference, 2010

A 78mW 11.8Gb/s serial link transceiver with adaptive RX equalization and baud-rate CDR in 32nm CMOS.
Proceedings of the IEEE International Solid-State Circuits Conference, 2010

Computer-Aided Design System Development of Fixed Water Distribution of Pipe Irrigation System.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Design and research on monitoring and alarming system for mine.
Proceedings of the Third International Workshop on Advanced Computational Intelligence, 2010

2009
A Scalable 3.6-to-5.2mW 5-to-10Gb/s 4-tap DFE in 32nm CMOS.
Proceedings of the IEEE International Solid-State Circuits Conference, 2009

2008
Using the EAP framework for fast media independent handover authentication.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Security challenges in seamless mobility: how to "handover" the keys?
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

2007
Where EAP security claims fail.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

1995
On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity.
Proceedings of the Advances in Cryptology, 1995

Access with Pseudonyms.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
New Group Signature Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

Parallel Divertibility of Proofs of Knowledge (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

Oblivious Signatures.
Proceedings of the Computer Security, 1994

Witness hiding proofs and applications.
PhD thesis, 1994

1992
Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992


  Loading...