Zhide Chen

According to our database1, Zhide Chen authored at least 39 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Distracted driving recognition method based on deep convolutional neural network.
J. Ambient Intell. Humaniz. Comput., 2021

2019
A Ship Target Location and Mask Generation Algorithms Base on Mask RCNN.
Int. J. Comput. Intell. Syst., 2019

Substitute Seed Nodes Mining Algorithms for Influence Maximization in Multi-Social Networks.
Future Internet, 2019

2018
Identity-based non-repudiable dynamic provable data possession in cloud storage.
Comput. Electr. Eng., 2018

2016
Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks.
Sensors, 2016

Human continuous activity recognition based on energy-efficient schemes considering cloud security technology.
Secur. Commun. Networks, 2016

Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks.
Int. J. Commun. Syst., 2016

Self-healing and energy-efficient restoration in machine-to-machine networks.
IET Commun., 2016

Worm propagation model in mobile network.
Concurr. Comput. Pract. Exp., 2016

2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network.
Inf., 2015

An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors.
Int. J. Distributed Sens. Networks, 2015

Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014

Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism.
J. Appl. Math., 2014

Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014

Dominant Bidding Strategy in Mobile App Advertising Auction.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

Optimal aggregation platform mechanism for mobile App auction.
Proceedings of the International Conference on Audio, 2014

2013
A Supermodular Game Framework for Power Control of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Random Access Control for M2M in LTE System.
Int. J. Distributed Sens. Networks, 2013

2011
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game.
Comput. Math. Appl., 2011

2010
How to Construct a Divisible Online/Offline Signature.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

RFID System Security Using Identity-Based Cryptography.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Service Price Discrimination in Wireless Network.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Online/Offline Verification of Short Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2008
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008

On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Identity-Based Online/Offline Encryption.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007

Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007

Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Anti-Collusion Anonymous Credentials Scheme.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2004
Quantum m-out-of-n oblivious transfer.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

General Public Key m-Out-of-n Oblivious Transfer.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...