The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qingfeng Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yi-Ping Phoebe Chen, Qingfeng Chen
    Analyzing Inconsistency Toward Enhancing Integration of Biological Molecular Databases. [Citation Graph (0, 0)][DBLP]
    APBC, 2006, pp:197-206 [Conf]
  2. Qingfeng Chen, Yi-Ping Phoebe Chen, Shichao Zhang, Chengqi Zhang
    Detecting Collusion Attacks in Security Protocols. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:297-306 [Conf]
  3. Qingfeng Chen, Chengqi Zhang, Shichao Zhang
    A Verification Model for Electronic Transaction Protocols. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:824-833 [Conf]
  4. Qingfeng Chen, Chengqi Zhang, Shichao Zhang, Chunsheng Li
    Verifying the Purchase Request in SET Protocol. [Citation Graph (0, 0)][DBLP]
    APWeb, 2003, pp:263-274 [Conf]
  5. Qingfeng Chen, Yi-Ping Phoebe Chen
    Analyzing Security Protocols Using Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2005, pp:245-253 [Conf]
  6. Kaile Su, Xudong Luo, Huaiqing Wang, Chengqi Zhang, Shichao Zhang, Qingfeng Chen
    A Logical Framework for Knowledge Sharing in Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    COCOON, 2001, pp:561-570 [Conf]
  7. Qingfeng Chen, Yi-Ping Phoebe Chen, Chengqi Zhang, Shichao Zhang
    A Framework for Merging Inconsistent Beliefs in Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    DEEC, 2005, pp:119-124 [Conf]
  8. Qingfeng Chen, Chengqi Zhang, Shichao Zhang
    Verifying the Payment Authorization in SET Protocol. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:914-918 [Conf]
  9. Qingfeng Chen, Shichao Zhang
    Dealing with Inconsistent Secure Messages. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2004, pp:33-42 [Conf]
  10. Qingfeng Chen, Yi-Ping Phoebe Chen, Chengqi Zhang, Lianggang Li
    Mining Frequent Itemsets for Protein Kinase Regulation. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2006, pp:222-230 [Conf]
  11. Qingfeng Chen, Chengqi Zhang, Shichao Zhang
    ENDL: A Logical Framework for Verifying Secure Transaction Protocols. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2005, v:7, n:1, pp:84-109 [Journal]
  12. Qingfeng Chen, Yi-Ping Phoebe Chen, Chengqi Zhang
    Detecting inconsistency in biological molecular databases using ontologies. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2007, v:15, n:2, pp:275-296 [Journal]

  13. Identifying Dependency Between Secure Messages for Protocol Analysis. [Citation Graph (, )][DBLP]


  14. Learning Dependency Model for AMP-Activated Protein Kinase Regulation. [Citation Graph (, )][DBLP]


  15. Mining frequent patterns for AMP-activated protein kinase regulation on skeletal muscle. [Citation Graph (, )][DBLP]


  16. Acquiring knowledge from inconsistent data sources through weighting. [Citation Graph (, )][DBLP]


Search in 0.060secs, Finished in 0.061secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002