Zhenhua Chen

Orcid: 0000-0002-1020-7684

According to our database1, Zhenhua Chen authored at least 61 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Geometric Searchable Encryption Without False Positive And Its Applications.
Comput. J., September, 2023

A 94 GHz Pulse Doppler Solid-State Millimeter-Wave Cloud Radar.
Remote. Sens., June, 2023

Geometric Searchable Encryption for Privacy-Preserving Location-Based Services.
IEEE Trans. Serv. Comput., 2023

A Tensor-based Convolutional Neural Network for Small Dataset Classification.
CoRR, 2023

Exploring the National First-Class Specialty Construction of Pharmaceutical Engineering Under the Background of "New Engineering" Project.
Proceedings of the Modern Management Based on Big Data IV, 2023

Sparse Black-Box Multimodal Attack for Vision-Language Adversary Generation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

2022
Complementary set encryption for privacy-preserving data consolidation.
Inf. Sci., 2022

Semantically Stealthy Adversarial Attacks against Segmentation Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

A Convolutional Neural Network Based Infrared-Visible Image Fusion Method and its Application in Aerospace Measurement and Control.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
How to Accelerate Capsule Convolutions in Capsule Networks.
CoRR, 2021

Adversarial Attack in the Context of Self-driving.
CoRR, 2021

An E-Band Beam Sharpening Antenna Based on Monopulse Comparator.
IEEE Access, 2021

Crafting Adversarial Examples for Neural Machine Translation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Impact of extreme weather events on urban human flow: A perspective from location-based service data.
Comput. Environ. Urban Syst., 2020

Deep Neural Network-Based Detection and Verification of Microelectronic Images.
J. Hardw. Syst. Secur., 2020

Privacy-preserving polynomial interpolation and its applications on predictive analysis.
Inf. Sci., 2020

A Particle Filter Track-Before-Detect Method for Monopulse Radar in Space Aircraft Launch Site.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

2019
An efficient XOR-based verifiable visual cryptographic scheme.
Multim. Tools Appl., 2019

MEM: a new mixed ensemble model for identifying frauds.
Int. J. Inf. Commun. Technol., 2019

P-CapsNets: a General Form of Convolutional Neural Networks.
CoRR, 2019

Domain-Specific Chinese Word Segmentation Based on Bi-Directional Long-Short Term Memory Model.
IEEE Access, 2019

SSEM: A Novel Self-Adaptive Stacking Ensemble Model for Classification.
IEEE Access, 2019

2018
GPU-Accelerated High-Throughput Online Stream Data Processing.
IEEE Trans. Big Data, 2018

Generalized Capsule Networks with Trainable Routing Procedure.
CoRR, 2018

Discovering Urban Traffic Congestion Propagation Patterns With Taxi Trajectory Data.
IEEE Access, 2018

A Parallel Platform for Fusion of Heterogeneous Stream Data.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
Joint estimation of location and signal parameters for an LFM emitter.
Signal Process., 2017

Energy-efficient virtual network embedding in networks for cloud computing.
Int. J. Web Grid Serv., 2017

Topology control-based collaborative multicast routing algorithm with minimum energy consumption.
Int. J. Commun. Syst., 2017

Finite-length EXIT analyses for protograph LDPC codes over underwater acoustic channels.
Proceedings of the 2017 IEEE International Conference on Signal Processing, 2017

Addressing supply chain risks of microelectronic devices through computer vision.
Proceedings of the 2017 IEEE Applied Imagery Pattern Recognition Workshop, 2017

2016
The application of cholesky decomposition in valence bond calculation.
J. Comput. Chem., 2016

A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016

Person Detection and Re-identification Across Multiple Images and Videos Obtained via Crowdsourcing.
Proceedings of the 10th International Conference on Distributed Smart Camera, 2016

2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mob. Inf. Syst., 2015

Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks.
J. Syst. Softw., 2015

基本初等函数的保密云计算服务协议 (Secure Cloud Computing Service Protocols of Elementary Functions).
计算机科学, 2015

A Virtual Network Reconfiguration Algorithm Oriented to Energy Consumption.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

G-Storm: GPU-enabled high-throughput online data processing in Storm.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

A Study of a Virtual Network Embedding Algorithm.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Comments on FHH Anonymous Multireceiver Encryption.
Int. J. Netw. Secur., 2014

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

T-Storm: Traffic-Aware Online Scheduling in Storm.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Virtual Network Embedding Model Minimizing Energy Consumption.
Proceedings of the Human Centered Computing - First International Conference, 2014

A self-adaptive group search optimizer with Elitist strategy.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

A cross-job framework for MapReduce scheduling.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Efficient and adaptively secure broadcast encryption systems.
Secur. Commun. Networks, 2013

An efficient algorithm for complete active space valence bond self-consistent field calculation.
J. Comput. Chem., 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012

Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

A global and local condensation for lane tracking.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

2011
Joint time-frequency sparse estimation of large-scale network traffic.
Comput. Networks, 2011

An approximation method of origin-destination flow traffic from link load counts.
Comput. Electr. Eng., 2011

An Optimal Estimation of Origin-Destination Traffic in Large-Scale Backbone Network.
Proceedings of IEEE International Conference on Communications, 2011

2010
An accurate method to estimate traffic matrices from link loads for QoS provision.
J. Commun. Networks, 2010

An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...