Qi Chen

Orcid: 0000-0001-7386-8706

Affiliations:
  • Guangzhou University, Guangzhou, China


According to our database1, Qi Chen authored at least 22 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey.
CoRR, May, 2025

Security-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks.
IEEE Trans. Mob. Comput., March, 2025

2024
LRB: Locally Repairable Blockchain for IoT Integration.
IEEE Trans. Netw. Serv. Manag., December, 2024

Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset.
IEEE Trans. Inf. Forensics Secur., 2024

Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus.
Comput. Stand. Interfaces, 2024

A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning.
Comput. Stand. Interfaces, 2024

2023
A novel extended multimodal AI framework towards vulnerability detection in smart contracts.
Inf. Sci., July, 2023

Shuffle Differential Private Data Aggregation for Random Population.
IEEE Trans. Parallel Distributed Syst., May, 2023

HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation.
IT Prof., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT.
Inf. Sci., 2023

How to achieve bidirectional zero-knowledge authentication?
IACR Cryptol. ePrint Arch., 2023

2022
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes.
IEEE Trans. Inf. Theory, 2022

A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses.
Secur. Commun. Networks, 2022

Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough.
Inf. Sci., 2022

Similarity-based integrity protection for deep learning systems.
Inf. Sci., 2022

Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud.
Int. J. Intell. Syst., 2022

2020
Compartmented Secret Sharing Schemes and Locally Repairable Codes.
IEEE Trans. Commun., 2020

2019
Efficient explicit constructions of compartmented secret sharing schemes.
Des. Codes Cryptogr., 2019

2018
Locally Repairable Codes with Heterogeneous Locality Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

2013
A note on ramp secret sharing schemes from error-correcting codes.
Math. Comput. Model., 2013

Efficient integer span program for hierarchical threshold access structure.
Inf. Process. Lett., 2013


  Loading...