


Остановите войну!
for scientists:


default search action
Liqun Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Liqun Chen 0001 — Duke University, Durham, NC, USA
- Liqun Chen 0002
— University of Surrey, Surrey Centre for Cyber Security, Guildford, UK (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Bin Zhang, Xiaofang Zhang, Wenan Jiang
, Hu Ding, Liqun Chen, Qinsheng Bi:
Bursting oscillations induced by multiple coexisting attractors in a modified 3D van der Pol-Duffing system. Commun. Nonlinear Sci. Numer. Simul. 116: 106806 (2023) - [c9]Liqun Chen, Wenjing Shen, Zhengwei Ma, Franz Raps, Shupeng Zhang:
Interactive Teaching Reform for "Principles of Automatic Control" Course Based on Professional Cases. EDUCON 2023: 1-5 - [i13]Qian Jiang, Changyou Chen, Han Zhao, Liqun Chen, Qing Ping, Son Dinh Tran, Yi Xu, Belinda Zeng, Trishul Chilimbi:
Understanding and Constructing Latent Modality Structures in Multi-modal Representation Learning. CoRR abs/2303.05952 (2023) - 2022
- [j18]Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. Comput. J. 65(9): 2430-2438 (2022) - [j17]Fuzheng Xiao
, Liqun Chen:
Attitude Control of Spherical Liquid-Filled Spacecraft Based on High-Order Fully Actuated System Approaches. J. Syst. Sci. Complex. 35(2): 471-480 (2022) - [j16]Shuning Cao, Houzhang Fang
, Liqun Chen, Wei Zhang
, Yi Chang
, Luxin Yan
:
Robust Blind Deblurring Under Stripe Noise for Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 60: 1-17 (2022) - [j15]Liqun Chen, Yi Chang
, Luxin Yan
:
On-Orbit Real-Time Variational Image Destriping: FPGA Architecture and Implementation. IEEE Trans. Geosci. Remote. Sens. 60: 1-12 (2022) - [j14]Liqun Chen
, Han-Xiong Li
, Shengli Xie
:
Modified High-Order SVD for Spatiotemporal Modeling of Distributed Parameter Systems. IEEE Trans. Ind. Electron. 69(4): 4296-4304 (2022) - [j13]Zhang Chen
, Liqun Chen
, Wenjing Shen
, Kangkang Xu
:
Remaining Useful Life Prediction of Lithium-Ion Battery via a Sequence Decomposition and Deep Learning Integrated Approach. IEEE Trans. Veh. Technol. 71(2): 1466-1479 (2022) - [c8]Jiali Duan, Liqun Chen, Son Tran, Jinyu Yang, Yi Xu, Belinda Zeng, Trishul Chilimbi:
Multi-modal Alignment using Representation Codebook. CVPR 2022: 15630-15639 - [c7]Jinyu Yang, Jiali Duan, Son Tran, Yi Xu, Sampath Chanda, Liqun Chen, Belinda Zeng, Trishul Chilimbi, Junzhou Huang:
Vision-Language Pre-Training with Triple Contrastive Learning. CVPR 2022: 15650-15659 - [c6]Long Meng, Liqun Chen:
A Blockchain-Based Long-Term Time-Stamping Scheme. ESORICS (1) 2022: 3-24 - [c5]Shilv Cai, Zhijun Zhang, Liqun Chen, Luxin Yan, Sheng Zhong, Xu Zou:
High-Fidelity Variable-Rate Image Compression via Invertible Activation Transformation. ACM Multimedia 2022: 2021-2031 - [c4]Changyou Chen, Jianyi Zhang, Yi Xu, Liqun Chen, Jiali Duan, Yiran Chen, Son Tran, Belinda Zeng, Trishul Chilimbi:
Why do We Need Large Batchsizes in Contrastive Learning? A Gradient-Bias Perspective. NeurIPS 2022 - [i12]Jinyu Yang, Jiali Duan, Son Tran, Yi Xu, Sampath Chanda, Liqun Chen, Belinda Zeng, Trishul Chilimbi, Junzhou Huang:
Vision-Language Pre-Training with Triple Contrastive Learning. CoRR abs/2202.10401 (2022) - [i11]Jiali Duan, Liqun Chen, Son Tran, Jinyu Yang, Yi Xu, Belinda Zeng, Trishul Chilimbi:
Multi-modal Alignment using Representation Codebook. CoRR abs/2203.00048 (2022) - [i10]Shilv Cai, Zhijun Zhang, Liqun Chen, Luxin Yan, Sheng Zhong, Xu Zou:
High-Fidelity Variable-Rate Image Compression via Invertible Activation Transformation. CoRR abs/2209.05054 (2022) - [i9]Long Meng, Liqun Chen:
A Blockchain-based Long-term Time-Stamping Scheme. IACR Cryptol. ePrint Arch. 2022: 319 (2022) - 2021
- [j12]Jianneng Chen, Xianbing Bian, Liqun Chen, Tianlong Chen, Zhiwei Chen, Chennan Yu:
Design and testing of a production line mechanism for continuous cutting and coring of broccoli. Comput. Electron. Agric. 191: 106505 (2021) - [c3]Dianqi Li, Yizhe Zhang, Hao Peng, Liqun Chen, Chris Brockett, Ming-Ting Sun, Bill Dolan:
Contextualized Perturbation for Textual Adversarial Attack. NAACL-HLT 2021: 5053-5069 - [i8]Yanjie Wang, Xu Zou, Zhijun Zhang, Wenhui Xu, Liqun Chen, Sheng Zhong, Luxin Yan, Guodong Wang:
Learning Oriented Remote Sensing Object Detection via Naive Geometric Computing. CoRR abs/2112.00504 (2021) - [i7]Stephen Holmes, Liqun Chen:
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies. IACR Cryptol. ePrint Arch. 2021: 967 (2021) - [i6]Long Meng, Liqun Chen:
Analysis of Client-side Security for Long-term Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1411 (2021) - [i5]Long Meng, Liqun Chen:
Reviewing ISO/IEC Standard for Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1429 (2021) - [i4]Long Meng, Liqun Chen:
An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography. IACR Cryptol. ePrint Arch. 2021: 1606 (2021) - 2020
- [j11]Xi Jun Lin, Lin Sun, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen:
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model. Comput. J. 63(8): 1259-1262 (2020) - [j10]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [i3]Dianqi Li, Yizhe Zhang, Hao Peng, Liqun Chen, Chris Brockett, Ming-Ting Sun, Bill Dolan:
Contextualized Perturbation for Textual Adversarial Attack. CoRR abs/2009.07502 (2020)
2010 – 2019
- 2019
- [j9]Yang Zhang, Tianyuan Liu, Liqun Chen, Jinxurong Yang, Jiayi Yin, Yuncong Zhang, Zhixi Yun
, Hao Xu, Lin Ning, Feng-Biao Guo
, Yongshuai Jiang, Hao Lin, Dong Wang, Yan Huang, Jian Huang
:
RIscoper: a tool for RNA-RNA interaction extraction from the literature. Bioinform. 35(17): 3199-3202 (2019) - [j8]Haitao Li
, Hu Ding
, Liqun Chen:
Chaos Threshold of a Multistable Piezoelectric Energy Harvester Subjected to Wake-Galloping. Int. J. Bifurc. Chaos 29(12): 1950162:1-1950162:13 (2019) - [j7]Liqun Chen, Luxin Yan
, Hongshi Sang, Tianxu Zhang:
High-Throughput Architecture for Both Lossless and Near-lossless Compression Modes of LOCO-I Algorithm. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3754-3764 (2019) - 2018
- [e10]Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu:
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings. Lecture Notes in Computer Science 10631, Springer 2018, ISBN 978-3-319-89499-7 [contents] - [e9]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [e8]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - 2016
- [j6]Hongfei Wu
, Kai Sun, Liqun Chen, Lei Zhu, Yan Xing:
High Step-Up/Step-Down Soft-Switching Bidirectional DC-DC Converter With Coupled-Inductor and Voltage Matching Control for Energy Storage Systems. IEEE Trans. Ind. Electron. 63(5): 2892-2903 (2016) - [e7]Feng Bao, Liqun Chen, Robert H. Deng
, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - 2015
- [c2]Liqun Chen:
Keynote speaker 1: Global harmonization of cryptographic standards. WorldCIS 2015: 11 - [e6]Liqun Chen, Shin'ichiro Matsuo:
Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Lecture Notes in Computer Science 9497, Springer 2015, ISBN 978-3-319-27151-4 [contents] - 2014
- [b1]Graeme Proudler, Liqun Chen, Chris Dalton:
Trusted Computing Platforms - TPM2.0 in Context. Springer 2014, ISBN 978-3-319-08743-6, pp. 1-360 - 2012
- [j5]Qishao Lu, Liqun Chen, Marian Wiercigroch
:
Editorial. Int. J. Bifurc. Chaos 22(5) (2012) - [j4]Liqun Chen, Jiangtao Li:
VLR group signatures with indisputable exculpability and efficient revocation. Int. J. Inf. Priv. Secur. Integr. 1(2/3): 129-159 (2012) - [e5]Liqun Chen, Moti Yung, Liehuang Zhu:
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7222, Springer 2012, ISBN 978-3-642-32297-6 [contents] - 2011
- [e4]Liqun Chen:
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. Lecture Notes in Computer Science 7089, Springer 2011, ISBN 978-3-642-25515-1 [contents] - [e3]Liqun Chen, Moti Yung:
Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6802, Springer 2011, ISBN 978-3-642-25282-2 [contents] - 2010
- [e2]Liqun Chen, Moti Yung:
Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6163, Springer 2010, ISBN 978-3-642-14596-4 [contents]
2000 – 2009
- 2008
- [j3]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [j2]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. Univers. Comput. Sci. 14(3): 416-440 (2008) - [e1]Liqun Chen, Yi Mu, Willy Susilo
:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4 [contents] - 2007
- [i2]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2007: 209 (2007) - 2006
- [j1]James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang:
Application of full-system simulation in exploratory system design and development. IBM J. Res. Dev. 50(2-3): 321-332 (2006) - 2005
- [i1]Qiang Tang, Liqun Chen:
Weaknesses in two group Diffie-Hellman key exchange protocols. IACR Cryptol. ePrint Arch. 2005: 197 (2005) - 2000
- [c1]Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler:
Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-06-03 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint