default search action
Hefeng Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]You-Wei Wen, Kexin Li, Hefeng Chen:
Accelerated matrix completion algorithm using continuation strategy and randomized SVD. J. Comput. Appl. Math. 429: 115215 (2023) - [j17]Yanxiang Feng, Sida Ren, Xiaodong Ren, Hefeng Chen, Yikang Yang:
Small-Size Liveness-Enforcing Supervisor for Automated Manufacturing Systems Using the Theory of Transition Cover. IEEE Trans. Syst. Man Cybern. Syst. 53(4): 2222-2235 (2023) - [c5]Jing Huang, Hefeng Chen, Yibei Dong:
Color Image Scrambling Technique Based on Chinese Remainder Theorem and Arnold Transformation. EITCE 2023: 269-276 - 2022
- [j16]Qingxiao Guan, Kaimeng Chen, Hefeng Chen, Weiming Zhang, Nenghai Yu:
Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix. IEEE Trans. Circuits Syst. Video Technol. 32(9): 6002-6016 (2022) - [c4]Ting Han, Guorong Cai, Xinying Wang, Siyu Chen, Hefeng Chen, Yanhao Lin, Huan Xu, Chuanmu Li:
CAT: Using Cross Attention Transformation to Build Correlation of RGB-D for Road Detection. BigCom 2022: 314-321 - 2021
- [j15]Qingxiao Guan, Hefeng Chen, Weiming Zhang, Nenghai Yu:
Improving UNIWARD distortion function via isotropic construction and hierarchical merging. J. Vis. Commun. Image Represent. 81: 103333 (2021) - [j14]Hefeng Chen, Naiqi Wu, ZhiWu Li, Ting Qu:
Decision on Maximal Permissiveness of Linear Constraints via Structural Analysis of a Subclass of Petri Nets. IEEE Trans. Syst. Man Cybern. Syst. 51(7): 4347-4358 (2021) - 2020
- [j13]Xingwang Huang, Chaopeng Li, Hefeng Chen, Dong An:
Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies. Clust. Comput. 23(2): 1137-1147 (2020) - [j12]Dongwei Gao, Hefeng Chen, Chinchen Chang:
Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption. Int. J. Comput. Sci. Eng. 22(2/3): 270-279 (2020) - [j11]Hefeng Chen, Chin-Chen Chang, Kaimeng Chen:
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem. Int. J. Netw. Secur. 22(3): 521-531 (2020) - [j10]Yanxiang Feng, Keyi Xing, MengChu Zhou, Hefeng Chen, Feng Tian:
Polynomial-complexity robust deadlock controllers for a class of automated manufacturing systems with unreliable resources using Petri nets. Inf. Sci. 533: 181-199 (2020) - [j9]Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. Secur. Commun. Networks 2020: 6073721:1-6073721:8 (2020) - [c3]Wei Cai, Shengbing Xu, Jiongzhi Liu, Qingping Du, Hefeng Chen, Yinyun Lin:
An adaptive approach of Feature Selection applied to Semi-Supervised Fuzzy Clustering. EITCE 2020: 723-727
2010 – 2019
- 2019
- [j8]Hefeng Chen, Naiqi Wu, Zhiwu Li, Ting Qu, Hailian Xiao:
Liveness of Disjunctive and Strict Single-Type Automated Manufacturing System: An ROPN Approach. IEEE Access 7: 17760-17771 (2019) - [j7]Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang:
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares. IEEE Access 7: 118249-118258 (2019) - [j6]Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:
Lossy trapdoor functions based on the PLWE. Clust. Comput. 22(Supplement): 5647-5654 (2019) - [j5]Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:
A new method of generating hard random lattices with short bases. EURASIP J. Inf. Secur. 2019: 8 (2019) - [j4]Hefeng Chen, Chin-Chen Chang:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. Secur. Commun. Networks 2019: 2387358:1-2387358:7 (2019) - [j3]Lin Li, Chin-Chen Chang, Hefeng Chen:
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy. Secur. Commun. Networks 2019: 3031506:1-3031506:17 (2019) - [j2]Hefeng Chen, Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen:
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data. Secur. Commun. Networks 2019: 9060756:1-9060756:7 (2019) - [c2]Hefeng Chen, Naiqi Wu, Zhiwu Li:
Maximally Permissive Supervisor Synthesis Using Reachability and Structural Analysis of Petri Nets. ICNSC 2019: 230-235 - 2016
- [j1]Hefeng Chen, Naiqi Wu, MengChu Zhou:
A novel method for deadlock prevention of AMS by using resource-oriented Petri nets. Inf. Sci. 363: 178-189 (2016) - 2015
- [c1]Hefeng Chen, Naiqi Wu, Mengchu Zhou:
Resource-Oriented Petri Net-Based Approach to Deadlock Prevention of AMSs. SMC 2015: 515-520
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint