default search action
Fei Chen 0003
Person information
- affiliation: Shenzhen University, Department of Computer Science and Engineering, China
- affiliation (PhD 2014): Chinese University of Hong Kong, Department of Computer Science and Engineering, China
Other persons with the same name
- Fei Chen — disambiguation page
- Fei Chen 0001 — BloomReach Inc, Mountain View, CA, USA (and 1 more)
- Fei Chen 0002 — University of Wisconsin-Madison, Department of Computer Science, WI, USA
- Fei Chen 0004 — Yunnan University of Finance and Economics, Kunming, China
- Fei Chen 0005 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems, China
- Fei Chen 0006 — Tsinghua University, Institute of Microelectronics, Beijing, China
- Fei Chen 0007 — Chinese University of Hong Kong, China (and 2 more)
- Fei Chen 0008 — Northeastern University, State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China (and 3 more)
- Fei Chen 0009 — Zhejiang University, College of Computer Science and Technology, Hangzhou, China
- Fei Chen 0010 — Jiangnan University, School of Digital Media, Wuxi, China (and 1 more)
- Fei Chen 0011 — Southern University of Science and Technology, Department of Electrical and Electronic Engineering, Shenzhen, China (and 1 more)
- Fei Chen 0012 — Fuzhou University, College of Mathematics and Computer Science, China (and 1 more)
- Fei Chen 0013 — Huawei Noah's Ark Lab, Hong Kong (and 1 more)
- Fei Chen 0014 — Qingdao University, College of Computer Science and Technology, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Fei Chen, Jianquan Cai, Tao Xiang, Xiaofeng Liao:
Practical cloud storage auditing using serverless computing. Sci. China Inf. Sci. 67(3) (2024) - [j54]Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen:
StopGuess: A framework for public-key authenticated encryption with keyword search. Comput. Stand. Interfaces 88: 103805 (2024) - [j53]Fei Chen, Fengming Meng, Zhipeng Li, Li Li, Tao Xiang:
Public cloud object storage auditing: Design, implementation, and analysis. J. Parallel Distributed Comput. 189: 104870 (2024) - [j52]Shan Wang, Ming Yang, Shan Jiang, Fei Chen, Yue Zhang, Xinwen Fu:
BBS: A secure and autonomous blockchain-based big-data sharing system. J. Syst. Archit. 150: 103133 (2024) - 2023
- [j51]Adnan Tahir, Fei Chen, Abdulwahab Ali Almazroi, Nourah Fahad Janbi:
SWEP-RF: Accuracy sliding window-based ensemble pruning method for latent sector error prediction in cloud storage computing. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101672 (2023) - [j50]Laizhong Cui, Zhe Xiao, Fei Chen, Hua Dai, Jianqiang Li:
Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme. IEEE Trans. Cybern. 53(6): 3588-3598 (2023) - [j49]Fei Chen, Zixing Xiao, Tao Xiang, Junfeng Fan, Hong Linh Truong:
A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications. IEEE Trans. Dependable Secur. Comput. 20(3): 2221-2237 (2023) - [j48]Jiacheng Wang, Fei Chen, Yuxi Ma, Liansheng Wang, Zhaodong Fei, Jianwei Shuai, Xiangdong Tang, Qichao Zhou, Jing Qin:
XBound-Former: Toward Cross-Scale Boundary Modeling in Transformers. IEEE Trans. Medical Imaging 42(6): 1735-1745 (2023) - [c17]Jianquan Cai, Fei Chen, Tao Xiang:
Cloud Storage Auditing: From One Cloud to Dual, and More. CBD 2023: 86-91 - [c16]Fei Chen, Jiacheng Wang, Baptiste Magnier, Wei Xue, Shaohui Huang, Liansheng Wang:
G2LL: Global-To-Local Self-Supervised Learning for Label-Efficient Transformer-Based Skin Lesion Segmentation in Dermoscopy Images. ISBI 2023: 1-5 - 2022
- [j47]Fei Chen, Jiahao Wang, Jianqiang Li, Yang Xu, Cheng Zhang, Tao Xiang:
TrustBuilder: A non-repudiation scheme for IoT cloud applications. Comput. Secur. 116: 102664 (2022) - [j46]Fei Chen, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, Hong Linh Truong:
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. ACM Comput. Surv. 54(4): 75:1-75:36 (2022) - [j45]Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information. IEEE Internet Things J. 9(13): 10434-10445 (2022) - [j44]Fei Chen, Zhipeng Li, Changkun Jiang, Jianqiang Li:
Verifiable Cloud Data Access: Design, Analysis, and Implementation. IEEE Syst. J. 16(1): 1135-1146 (2022) - [j43]Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 1359-1371 (2022) - [j42]Fei Chen, Zhipeng Li, Changkun Jiang, Tao Xiang, Yuanyuan Yang:
Cloud Object Storage Synchronization: Design, Analysis, and Implementation. IEEE Trans. Parallel Distributed Syst. 33(10): 4295-4310 (2022) - [c15]Fei Chen, Jiahao Wang, Changkun Jiang, Tao Xiang, Yuanyuan Yang:
Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper. INFOCOM 2022: 1958-1967 - [i1]Jiacheng Wang, Fei Chen, Yuxi Ma, Liansheng Wang, Zhaodong Fei, Jianwei Shuai, Xiangdong Tang, Qichao Zhou, Jing Qin:
XBound-Former: Toward Cross-scale Boundary Modeling in Transformers. CoRR abs/2206.00806 (2022) - 2021
- [j41]Nilesh Chakraborty, Jian-Qiang Li, Samrat Mondal, Chengwen Luo, Huihui Wang, Mamoun Alazab, Fei Chen, Yi Pan:
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things. IEEE Internet Things J. 8(5): 3255-3267 (2021) - [j40]Fei Chen, Donghong Wang, Qiuzhen Lin, Jianyong Chen, Zhong Ming, Wei Yu, Jing Qin:
Towards Dynamic Verifiable Pattern Matching. IEEE Trans. Big Data 7(2): 421-435 (2021) - [j39]Yushu Zhang, Jiantao Zhou, Yong Xiang, Leo Yu Zhang, Fei Chen, Shaoning Pang, Xiaofeng Liao:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds. IEEE Trans. Big Data 7(4): 717-728 (2021) - [j38]Laizhong Cui, Zhe Xiao, Jiahao Wang, Fei Chen, Yi Pan, Hua Dai, Jing Qin:
Improving Vaccine Safety Using Blockchain. ACM Trans. Internet Techn. 21(2): 38:1-38:24 (2021) - [j37]Yang Yang, Yanjiao Chen, Fei Chen:
A Compressive Integrity Auditing Protocol for Secure Cloud Storage. IEEE/ACM Trans. Netw. 29(3): 1197-1209 (2021) - [c14]Wei Zheng, Liangbo Hou, Junming Yu, Fei Chen:
Detection of IoT Devices That Mine Cryptocurrency. ISSRE Workshops 2021: 266-271 - [c13]Fei Chen, Jianqiang Li, Zhiqiang Wang:
A Mobile Computing Based Attendance System and Students' Attitude Study. TALE 2021: 359-366 - 2020
- [j36]Fei Chen, Shuhuan Wu, Fang Liu, Junkai Ji, Qiuzhen Lin:
A Novel Angular-Guided Particle Swarm Optimizer for Many-Objective Optimization Problems. Complex. 2020: 6238206:1-6238206:18 (2020) - [j35]Yang Yang, Ping Xiong, Qing Huang, Fei Chen:
Secure and efficient outsourcing computation on large-scale linear regressions. Inf. Sci. 522: 134-147 (2020) - [j34]Fei Chen, Zhe Xiao, Laizhong Cui, Qiuzhen Lin, Jianqiang Li, Shui Yu:
Blockchain for Internet of things applications: A review and open issues. J. Netw. Comput. Appl. 172: 102839 (2020) - [j33]Adnan Tahir, Fei Chen, Habib Ullah Khan, Zhong Ming, Arshad Ahmad, Shah Nazir, Muhammad Shafiq:
A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems. Sensors 20(18): 5392 (2020) - [j32]Fei Chen, Fengming Meng, Tao Xiang, Hua Dai, Jianqiang Li, Jing Qin:
Towards Usable Cloud Storage Auditing. IEEE Trans. Parallel Distributed Syst. 31(11): 2605-2617 (2020)
2010 – 2019
- 2019
- [j31]Yang Yang, Qing Huang, Fei Chen:
Secure Cloud Storage Based on RLWE Problem. IEEE Access 7: 27604-27614 (2019) - [j30]Yang Yang, Ying Sun, Qing Huang, Wenshan Yin, Fei Chen:
RLWE-Based ID-DIA Protocols for Cloud Storage. IEEE Access 7: 55732-55743 (2019) - [j29]Nilesh Chakraborty, Jianqiang Li, Samrat Mondal, Fei Chen, Yi Pan:
On Overcoming the Identified Limitations of a Usable PIN Entry Method. IEEE Access 7: 124366-124378 (2019) - [j28]Miaomiao Tian, Shibei Ye, Hong Zhong, Fei Chen, Chuang Gao, Jie Chen:
Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem. IEEE Access 7: 129071-129081 (2019) - [j27]Yijun Yang, Fei Chen, Jianyong Chen, Yong Zhang, Kai-Leung Yung:
A secure hash function based on feedback iterative structure. Enterp. Inf. Syst. 13(3): 281-302 (2019) - [j26]Yijun Yang, Fei Chen, Zhiwei Sun, Shulan Wang, Jianqiang Li, Jianyong Chen, Zhong Ming:
Secure and efficient parallel hash function construction and its application on cloud audit. Soft Comput. 23(18): 8907-8925 (2019) - 2018
- [j25]Xinyu Xiong, Fei Chen, Peizhi Huang, Miaomiao Tian, Xiaofang Hu, Badong Chen, Jing Qin:
Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data. IEEE Access 6: 28877-28889 (2018) - [j24]Zhengping Liang, Xuyong Wang, Qiuzhen Lin, Fei Chen, Jianyong Chen, Zhong Ming:
A novel multi-objective co-evolutionary algorithm based on decomposition approach. Appl. Soft Comput. 73: 50-66 (2018) - [j23]Qiuzhen Lin, Xiaozhou Wang, Bishan Hu, Lijia Ma, Fei Chen, Jianqiang Li, Carlos A. Coello Coello:
Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary Computation. Complex. 2018: 1716352:1-1716352:18 (2018) - [j22]Qiuzhen Lin, Yueping Ma, Jianyong Chen, Qingling Zhu, Carlos A. Coello Coello, Ka-Chun Wong, Fei Chen:
An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies. Inf. Sci. 430: 46-64 (2018) - [j21]Xiaoguo Li, Tao Xiang, Fei Chen, Shangwei Guo:
Efficient biometric identity-based encryption. Inf. Sci. 465: 248-264 (2018) - [j20]Tao Xiang, Xiaoguo Li, Fei Chen, Yuanyuan Yang, Shengyu Zhang:
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud. J. Parallel Distributed Comput. 112: 97-107 (2018) - [j19]Laizhong Cui, Shu Yang, Fei Chen, Zhong Ming, Nan Lu, Jing Qin:
A survey on application of machine learning for Internet of Things. Int. J. Mach. Learn. Cybern. 9(8): 1399-1417 (2018) - [j18]Laizhong Cui, Genghui Li, Yanli Luo, Fei Chen, Zhong Ming, Nan Lu, Jian Lu:
An enhanced artificial bee colony algorithm with dual-population framework. Swarm Evol. Comput. 43: 184-206 (2018) - [j17]Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang, Jing Qin:
Secure Hashing-Based Verifiable Pattern Matching. IEEE Trans. Inf. Forensics Secur. 13(11): 2677-2690 (2018) - [j16]Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
User Differentiated Verifiable File Search on the Cloud. IEEE Trans. Serv. Comput. 11(6): 948-961 (2018) - [c12]Miaomiao Tian, Shibei Ye, Hong Zhong, Lingyan Wang, Fei Chen, Jie Cui:
Identity-Based Proofs of Storage with Enhanced Privacy. ICA3PP (4) 2018: 461-480 - 2017
- [j15]Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:
Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017) - [j14]Yijun Yang, Fei Chen, Xiaomei Zhang, Jianping Yu, Peng Zhang:
Research on the Hash Function Structures and its Application. Wirel. Pers. Commun. 94(4): 2969-2985 (2017) - [c11]Jian Zhang, Yang Yang, Yanjiao Chen, Fei Chen:
A secure cloud storage system based on discrete logarithm problem. IWQoS 2017: 1-10 - 2016
- [j13]Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He:
A Review of Compressive Sensing in Information Security Field. IEEE Access 4: 2507-2519 (2016) - [j12]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Di Xiao, Bin Chen, Xiaofeng Liao:
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions. Int. J. Bifurc. Chaos 26(11): 1650191:1-1650191:15 (2016) - [j11]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao:
Embedding cryptographic features in compressive sensing. Neurocomputing 205: 472-480 (2016) - [j10]Tao Xiang, Xiaoguo Li, Fei Chen, Shangwei Guo, Yuanyuan Yang:
Processing secure, verifiable and efficient SQL over outsourced database. Inf. Sci. 348: 163-178 (2016) - [j9]Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Computers 65(6): 1936-1948 (2016) - [c10]Fei Chen, Taoyi Zhang, Jianyong Chen, Tao Xiang:
Cloud Storage Integrity Checking: Going from Theory to Practice. SCC@AsiaCCS 2016: 24-28 - [c9]Tao Xiang, Xiaoguo Li, Fei Chen, Yi Mu:
Bilateral-secure Signature by Key Evolving. AsiaCCS 2016: 523-533 - [c8]Fei Chen, Xinyu Xiong, Taoyi Zhang, Jianqiang Li, Jianyong Chen:
Making Cloud Storage Integrity Checking Protocols Economically Smarter. SmartCom 2016: 297-306 - 2015
- [c7]Fei Chen, Tao Xiang, Jianyong Chen, Wei Yu, Xinwen Fu, Shengyu Zhang:
A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud. CBD 2015: 219-226 - [c6]Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang:
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure. INFOCOM 2015: 2389-2397 - [c5]Yushu Zhang, Jiantao Zhou, Leo Yu Zhang, Fei Chen, Xinyu Lei:
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds. SocialSec 2015: 1-6 - 2014
- [j8]Fei Chen, Tao Xiang, Yuanyuan Yang:
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distributed Comput. 74(3): 2141-2151 (2014) - [j7]Tao Xiang, Chenyun Yu, Fei Chen:
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks. Signal Process. Image Commun. 29(9): 1015-1027 (2014) - [j6]Fei Chen, Tao Xiang, Xinyu Lei, Jianyong Chen:
Highly Efficient Linear Regression Outsourcing to a Cloud. IEEE Trans. Cloud Comput. 2(4): 499-508 (2014) - [j5]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang:
Period distribution of generalized discrete Arnold cat map. Theor. Comput. Sci. 552: 13-25 (2014) - [c4]Tao Xiang, Weimin Zhang, Fei Chen:
A verifiable PSO algorithm in cloud computing. IEEE Congress on Evolutionary Computation 2014: 190-193 - [c3]Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
Towards verifiable file search on the cloud. CNS 2014: 346-354 - [c2]Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure cloud storage meets with secure network coding. INFOCOM 2014: 673-681 - 2013
- [j4]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang:
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$. IEEE Trans. Inf. Theory 59(5): 3249-3255 (2013) - [c1]Tao Xiang, Chenyun Yu, Fei Chen:
Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks. WASA 2013: 196-205 - 2012
- [j3]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang:
Period Distribution of Generalized Discrete Arnold Cat Map for N=pe. IEEE Trans. Inf. Theory 58(1): 445-452 (2012) - 2011
- [j2]Fei Chen, Xiaofeng Liao, Tao Xiang, Hongying Zheng:
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN. Inf. Sci. 181(22): 5110-5118 (2011) - 2010
- [j1]Xiaofeng Liao, Fei Chen, Kwok-Wo Wong:
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$. IEEE Trans. Computers 59(10): 1392-1401 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint