The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhong Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lifang Peng, Zhong Chen, Qi Li
    Model and method for evaluating creditability of C2C electronic trade. [Citation Graph (0, 0)][DBLP]
    ICEC, 2006, pp:244-249 [Conf]
  2. Zhen Cao, Jian-bin Hu, Zhong Chen, Maoxing Xu, Xia Zhou
    Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:160-164 [Conf]
  3. Yong Wu, Zhong Chen, Qi Jing, Yongcai Wang
    LENO: LEast Rotation Near-Optimal Cluster Head Rotation Strategy in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:195-201 [Conf]
  4. Yihua Philip Sheng, Zhong Chen, Shahram Rahimi, Srinivas Mandalapu
    A Light-weight Distributed Web Search Engine: Distributed Web Crawling Part. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2004, pp:197-200 [Conf]
  5. Yihua Philip Sheng, Wen-Chi Hou, Zhong Chen
    An Application of Knowledge Discovery Techniques on Stock Market. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2004, pp:83-86 [Conf]
  6. Zhong Chen, Ying Xu
    Multi-Scale Hierarchical Structure Prediction of Helical Transmembrane Proteins. [Citation Graph (0, 0)][DBLP]
    CSB, 2005, pp:203-207 [Conf]
  7. Zhong Chen, XianMing Zhang
    Monitoring of Tool Wear Using Feature Vector Selection and Linear Regression. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:1-6 [Conf]
  8. Huijun Sun, Tao Lin, Shuhui Cai, Zhong Chen
    Numerical Simulations of Contribution of Chemical Shift in Novel Magnetic Resonance Imaging. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:374-383 [Conf]
  9. Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang
    An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:129-144 [Conf]
  10. Peng Liu, Zhong Chen
    An Access Control Model for Web Services in Business Process. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:292-298 [Conf]
  11. Peng Liu, Jian-bin Hu, Zhong Chen
    A Formal Language for Access Control Policies in Distributed Environment. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2005, pp:766-769 [Conf]
  12. Zhong Chen, Ying Xu
    Structure Prediction of Helical Transmembrane Proteins at Two Length Scales. [Citation Graph (0, 0)][DBLP]
    J. Bioinformatics and Computational Biology, 2006, v:4, n:2, pp:317-334 [Journal]
  13. Shimin Wei, Guozhen Xiao, Zhong Chen
    A fast algorithm for determining the minimal polynomial where of a sequence with period 2pn over GF(q). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:10, pp:2754-2758 [Journal]
  14. Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen
    CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:203-215 [Conf]
  15. Jiyang Dong, Junying Zhang, Zhong Chen
    Neural Network Based Algorithm for Multi-Constrained Shortest Path Problem. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2007, pp:776-785 [Conf]
  16. Zhiyong Qiu, Jiyang Dong, Zhong Chen
    MR Image Registration Based on Pulse-Coupled Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2007, pp:914-922 [Conf]
  17. Zhi-Hong Tao, Cong-Hua Zhou, Zhong Chen, Li-Fu Wang
    Bounded Model Checking of CTL. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:1, pp:39-43 [Journal]

  18. Evaluating Network Security With Two-Layer Attack Graphs. [Citation Graph (, )][DBLP]

  19. How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. [Citation Graph (, )][DBLP]

  20. Identity-based encryption based on DHIES. [Citation Graph (, )][DBLP]

  21. When ABE Meets RSS. [Citation Graph (, )][DBLP]

  22. Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  23. Claper: Recommend classical papers to beginners. [Citation Graph (, )][DBLP]

  24. WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. [Citation Graph (, )][DBLP]

  25. Hash-Based Tag Ownership Transfer Protocol against Traceability. [Citation Graph (, )][DBLP]

  26. Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. [Citation Graph (, )][DBLP]

  27. Pseudo-randomness Inside Web Browsers. [Citation Graph (, )][DBLP]

  28. Neoteny learning rule of ART2 network and its function. [Citation Graph (, )][DBLP]

  29. Implementing Attribute-Based Encryption in Web Services. [Citation Graph (, )][DBLP]

  30. Hybrid Overlay Structure Based on Virtual Node. [Citation Graph (, )][DBLP]

  31. Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. [Citation Graph (, )][DBLP]

  32. Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. [Citation Graph (, )][DBLP]

  33. A holistic mechanism against file pollution in peer-to-peer networks. [Citation Graph (, )][DBLP]

  34. Securing key issuing in peer-to-peer networks. [Citation Graph (, )][DBLP]

  35. SWORDS: Improving Sensor Networks Immunity under Worm Attacks. [Citation Graph (, )][DBLP]

  36. SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  37. SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam. [Citation Graph (, )][DBLP]

  38. Automatic Construction and Optimization of Layered Network Attack Graph. [Citation Graph (, )][DBLP]

  39. Toxicity Study of Oral Vanadyl Sulfate by NMR-based Metabonomic. [Citation Graph (, )][DBLP]

  40. An Improved Scheme for Delegation Based on Usage Control. [Citation Graph (, )][DBLP]

  41. SpamClean: Towards Spam-Free Tagging Systems. [Citation Graph (, )][DBLP]

  42. A Game Theoretic Approach Based Access Control Mechanism. [Citation Graph (, )][DBLP]

  43. Efficient Identity-Based Key Issue with TPM. [Citation Graph (, )][DBLP]

  44. TSearch: A Self-learning Vertical Search Spider for Travel. [Citation Graph (, )][DBLP]

  45. Design of Interface Software for a Distributed System With Mixed Varied Intelligent Meters. [Citation Graph (, )][DBLP]

  46. The Evolution of ICT Markets: An Agent-Based Model on Complex Networks. [Citation Graph (, )][DBLP]

  47. Social Network as Double-Edged Sword to Exchange: Frictions and the Emerging of Intellectual Intermediary Service. [Citation Graph (, )][DBLP]

  48. A Firm-Growing Model and the Study of Communication Patterns' Effect on the Structure of Firm's Social Network. [Citation Graph (, )][DBLP]

  49. Filtering Spam in Social Tagging System with Dynamic Behavior Analysis. [Citation Graph (, )][DBLP]

  50. A New Method to Generate Attack Graphs. [Citation Graph (, )][DBLP]

  51. Deforesting Logical Form. [Citation Graph (, )][DBLP]

  52. A New Parallel Ant Colony Optimization Algorithm Based on Message Passing Interface. [Citation Graph (, )][DBLP]

  53. A penalty function method based on bilevel programming for solving inverse optimal value problems. [Citation Graph (, )][DBLP]

  54. Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy [Citation Graph (, )][DBLP]

Search in 0.855secs, Finished in 0.858secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002