Zhenhua Chen

According to our database1, Zhenhua Chen authored at least 39 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An efficient XOR-based verifiable visual cryptographic scheme.
Multimedia Tools Appl., 2019

Domain-Specific Chinese Word Segmentation Based on Bi-Directional Long-Short Term Memory Model.
IEEE Access, 2019

SSEM: A Novel Self-Adaptive Stacking Ensemble Model for Classification.
IEEE Access, 2019

2018
GPU-Accelerated High-Throughput Online Stream Data Processing.
IEEE Trans. Big Data, 2018

Discovering Urban Traffic Congestion Propagation Patterns With Taxi Trajectory Data.
IEEE Access, 2018

A Parallel Platform for Fusion of Heterogeneous Stream Data.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
Joint estimation of location and signal parameters for an LFM emitter.
Signal Processing, 2017

Energy-efficient virtual network embedding in networks for cloud computing.
IJWGS, 2017

Topology control-based collaborative multicast routing algorithm with minimum energy consumption.
Int. J. Communication Systems, 2017

Addressing supply chain risks of microelectronic devices through computer vision.
Proceedings of the 2017 IEEE Applied Imagery Pattern Recognition Workshop, 2017

2016
The application of cholesky decomposition in valence bond calculation.
Journal of Computational Chemistry, 2016

A Joint Random Secret Sharing Scheme with Public Verifiability.
I. J. Network Security, 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurrency and Computation: Practice and Experience, 2016

Person Detection and Re-identification Across Multiple Images and Videos Obtained via Crowdsourcing.
Proceedings of the 10th International Conference on Distributed Smart Camera, 2016

2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Security and Communication Networks, 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Security and Communication Networks, 2015

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mobile Information Systems, 2015

Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks.
Journal of Systems and Software, 2015

A Virtual Network Reconfiguration Algorithm Oriented to Energy Consumption.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

G-Storm: GPU-enabled high-throughput online data processing in Storm.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

A Study of a Virtual Network Embedding Algorithm.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Comments on FHH Anonymous Multireceiver Encryption.
I. J. Network Security, 2014

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

T-Storm: Traffic-Aware Online Scheduling in Storm.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Virtual Network Embedding Model Minimizing Energy Consumption.
Proceedings of the Human Centered Computing - First International Conference, 2014

A self-adaptive group search optimizer with Elitist strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

A cross-job framework for MapReduce scheduling.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014

2013
Efficient and adaptively secure broadcast encryption systems.
Security and Communication Networks, 2013

An efficient algorithm for complete active space valence bond self-consistent field calculation.
Journal of Computational Chemistry, 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptology ePrint Archive, 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
I. J. Network Security, 2012

Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

A global and local condensation for lane tracking.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

2011
Joint time-frequency sparse estimation of large-scale network traffic.
Computer Networks, 2011

An approximation method of origin-destination flow traffic from link load counts.
Computers & Electrical Engineering, 2011

An Optimal Estimation of Origin-Destination Traffic in Large-Scale Backbone Network.
Proceedings of IEEE International Conference on Communications, 2011

2010
An accurate method to estimate traffic matrices from link loads for QoS provision.
Journal of Communications and Networks, 2010

An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...