Liquan Chen

Orcid: 0000-0002-7202-4939

According to our database1, Liquan Chen authored at least 71 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance.
IEEE Trans. Ind. Informatics, March, 2024

IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism.
IEEE Internet Things J., January, 2024

Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach.
IEEE Trans. Inf. Forensics Secur., 2024

2023
The Detection and Control Factor Analysis of Active Landslides in Guizhou Province, China, Using Sentinel-1 SAR Imagery.
Remote. Sens., December, 2023

DFE-IP: Delegatable functional encryption for inner product.
Inf. Sci., November, 2023

3D-unified spatial-temporal graph for group activity recognition.
Neurocomputing, November, 2023

Quantum multi-party fair exchange protocol based on three-particle GHZ states.
Quantum Inf. Process., September, 2023

Similarity-based deduplication and secure auditing in IoT decentralized storage.
J. Syst. Archit., September, 2023

A Novel Method of Teaching Quality Monitoring and Evaluation from the Perspective of Educational Balance.
Int. J. Emerg. Technol. Learn., July, 2023

Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data.
IEEE Trans. Netw. Serv. Manag., June, 2023

A Game Theory Study of Big Data Analytics in Internet of Things.
IEEE Trans. Netw. Serv. Manag., June, 2023

Retrieving the Kinematic Process of Repeated-Mining-Induced Landslides by Fusing SAR/InSAR Displacement, Logistic Model, and Probability Integral Method.
Remote. Sens., June, 2023

Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing.
Comput. Secur., May, 2023

BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT.
J. Inf. Secur. Appl., March, 2023

A quantum key distribution routing scheme for hybrid-trusted QKD network system.
Quantum Inf. Process., January, 2023

Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records.
IEEE Trans. Serv. Comput., 2023

Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation.
IEEE Trans. Inf. Forensics Secur., 2023

RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriers.
Ad Hoc Networks, 2023

A Key Generation Scheme for IoV Communication Based on Neural Network Autoencoders.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

Machine Learning Assisted Physical Layer Secret Key Generation in the One-Time-Pad Encryption Scheme.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter Wave Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Joint Design of Quantizer and Phase Shift Matrix in RIS-Assisted Physical Layer Key Generation.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Time Slot Allocation for RIS-Assisted Physical Layer Key Generation in OTP.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Angular-domain Secret Key Generation for RIS-aided mmWave MIMO systems.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Locally Differentially Private Frequency Estimation Based on Convolution Framework.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

LN-PCA: Differential Privacy Protection of Medical Data Based on Principal Component Analysis Adding Laplace Noise.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

Machine Learning-Based Secret Key Generation for IRS-Assisted Multi-Antenna Systems.
Proceedings of the IEEE International Conference on Communications, 2023

Precoding Design for Key Generation in Near-Field Extremely Large-Scale MIMO Communications.
Proceedings of the IEEE Globecom Workshops 2023, 2023

An Efficient Byzantine Fault-Tolerant Consensus Mechanism Based on Aggregate Threshold Ring Signature.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks.
IEEE Trans. Netw. Serv. Manag., 2022

A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system.
Signal Process., 2022

Deep Learning Method of Landslide Inventory Map with Imbalanced Samples in Optical Remote Sensing.
Remote. Sens., 2022

A channel coding information hiding algorithm for images based on uniform cyclic shift.
Multim. Tools Appl., 2022

Image encryption algorithm based on lattice hash function and privacy protection.
Multim. Tools Appl., 2022

CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis.
J. Vis. Commun. Image Represent., 2022

Lightweight ID-based broadcast signcryption for cloud-fog-assisted IoT.
J. Syst. Archit., 2022

Software development and design of network security system based on log data.
J. Electronic Imaging, 2022

Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments.
IEEE Commun. Lett., 2022

APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking.
Entropy, 2022

DDKA-QKDN: Dynamic On-Demand Key Allocation Scheme for Quantum Internet of Things Secured by QKD Network.
Entropy, 2022

An Image Encryption Scheme Based on Logistic Quantum Chaos.
Entropy, 2022

Smart Grid Data Aggregation Scheme Based on Local Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022

Auxiliary Graph based QKD Key Provisioning for End-to-End Security Service in Optical Networks.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2022

CD-DAA-MD: A Cross-domain DAA Scheme with Mimic Defense for Internet of Vehicles.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

VulMiningBGS: Detection of overflow vulnerabilities based on graph similarity.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System.
Secur. Commun. Networks, 2021

ADA-QKDN: a new quantum key distribution network routing scheme based on application demand adaptation.
Quantum Inf. Process., 2021

Correction to: Secure convergence of artificial intelligence and internet of things for cryptographic cipher-a decision support system.
Multim. Tools Appl., 2021

Secure convergence of artificial intelligence and internet of things for cryptographic cipher- a decision support system.
Multim. Tools Appl., 2021

Rewarding and Efficient Data Sharing in EHR System with Coalition Blockchain Assistance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

ERGA: An Effective Region Gradient Algorithm for Adversarial Example Generation.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

A Privacy-Preserving Logistics Information System with Traceability.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
Pre-Event Deformation and Failure Mechanism Analysis of the Pusa Landslide, China with Multi-Sensor SAR Imagery.
Remote. Sens., 2020

Reversible data hiding in encrypted images for coding channel based on adaptive steganography.
IET Image Process., 2020

Hazard recognition and reliability analysis of CTCS-3 on-board subsystem.
Comput. Commun., 2020

A Novel Model of Mimic Defense Based on Minimal L-Order Error Probability.
IEEE Access, 2020

A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic Clustering.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Ground Deformation Revealed by Sentinel-1 MSBAS-InSAR Time-Series over Karamay Oilfield, China.
Remote. Sens., 2019

Insar Application to Baige Landslide Event, China, From Fast Rescue to Catchment Investigation.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Gearbox Fault Diagnosis Based on VMD and Acoustic Emission Technology.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

2018
Continuous-Time Flows for Efficient Inference and Density Estimation.
Proceedings of the 35th International Conference on Machine Learning, 2018

2017
A Public Key Compression Scheme for Fully Homomorphic Encryption Based on Quadratic Parameters With Correction.
IEEE Access, 2017

Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Information Hiding Capacities in Different Multiple Antennas Systems.
J. Inf. Hiding Multim. Signal Process., 2016

Joint Clustering and Routing Design for Reliable and Efficient Data Collection in Large-Scale Wireless Sensor Networks.
IEEE Internet Things J., 2016

Striped-Flooding: Improve Scalability and Energy Efficiency of Flooding Algorithm in Wireless Sensor and Actor Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

2015
Balancing Energy Consumption with Hybrid Clustering and Routing Strategy in Wireless Sensor Networks.
Sensors, 2015

DARC: A Distributed and Adaptive Routing Protocol in Cluster-Based Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption.
Proceedings of the International Conference on Identification, 2014

2011
Researches and Simulations of Information Hiding in Alamouti Transmission System.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2004
A Scheme for MAC Isolation to Realize Effective Management in Public Wireless LAN.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004


  Loading...