Qi Chen

Orcid: 0000-0001-7386-8706

Affiliations:
  • Guangzhou University, Guangzhou, China


According to our database1, Qi Chen authored at least 29 papers between 2013 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
ByzTopia: Towards Practical Asynchronous BFT via Decoupling.
IEEE Trans. Computers, May, 2026

S<sup>3</sup>Cross: Blockchain-Based Cross-Domain Authentication With Self-Sovereign and Supervised Identity Management.
IEEE Trans. Netw. Serv. Manag., 2026

DR-Store: A Dynamic Reliable Coded Blockchain Architecture.
IEEE Trans. Netw. Sci. Eng., 2026

EbbFlow: Non-blocking join synchronization in dynamic asynchronous BFT.
Comput. Networks, 2026

2025
Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey.
CoRR, May, 2025

Security-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks.
IEEE Trans. Mob. Comput., March, 2025

Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding.
IACR Cryptol. ePrint Arch., 2025

2024
LRB: Locally Repairable Blockchain for IoT Integration.
IEEE Trans. Netw. Serv. Manag., December, 2024

Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols.
Cryptogr., March, 2024

Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset.
IEEE Trans. Inf. Forensics Secur., 2024

Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial.
IACR Cryptol. ePrint Arch., 2024

Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus.
Comput. Stand. Interfaces, 2024

A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning.
Comput. Stand. Interfaces, 2024

2023
A novel extended multimodal AI framework towards vulnerability detection in smart contracts.
Inf. Sci., July, 2023

Shuffle Differential Private Data Aggregation for Random Population.
IEEE Trans. Parallel Distributed Syst., May, 2023

HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation.
IT Prof., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT.
Inf. Sci., 2023

How to achieve bidirectional zero-knowledge authentication?
IACR Cryptol. ePrint Arch., 2023

2022
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses.
Secur. Commun. Networks, 2022

Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough.
Inf. Sci., 2022

Similarity-based integrity protection for deep learning systems.
Inf. Sci., 2022

Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud.
Int. J. Intell. Syst., 2022

2020
Compartmented Secret Sharing Schemes and Locally Repairable Codes.
IEEE Trans. Commun., 2020

2019
Efficient explicit constructions of compartmented secret sharing schemes.
Des. Codes Cryptogr., 2019

Efficient Explicit Constructions of Multipartite Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Locally Repairable Codes with Heterogeneous Locality Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

2013
A note on ramp secret sharing schemes from error-correcting codes.
Math. Comput. Model., 2013

Efficient integer span program for hierarchical threshold access structure.
Inf. Process. Lett., 2013


  Loading...