发表论文
[1] 信息网络安全. 2024, 第 3 作者[2] Cybersecurity. 2024, 第 5 作者[3] International Conference on Dependable Systems and Networks. 2024, 第 3 作者[4] International Conference on Dependable Systems and Networks. 2024, 第 5 作者[5] International Conference on Pattern Recognition. 2024, 第 4 作者[6] Jiang Yubing, Shen Peisong, Zeng Li, Zhu Xiaojie, Jiang Di, Chi Chen. Cancelable biometric schemes for Euclidean metric and Cosine metric. CYBERSECURITY[J]. 2023, 第 6 作者6(3): 1-20, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7514973&detailType=1.[7] Yucheng Ma, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen. General Constructions of Fuzzy Extractors for Continuous Sources. International Conference on Information Security and Cryptology (INSCRYPT 2023). 2023, 第 5 作者[8] Feng Zhu, Peisong Shen, Kaini Chen, Yucheng Ma, Chi Chen. A Secure and Practical Sample-then-lock Scheme for Iris Recognition. 26th International Conference on Pattern Recognition (ICPR). 2022, 第 5 作者[9] 于晶, 袁曙光, 袁煜琳, 陈驰. 基于k匿名数据集的鲁棒性水印技术研究. 信息网络安全[J]. 2022, 第 4 作者[10] Shuguang Yuan, Chi Chen, Ke Yang, Tengfei Yang, Jing Yu. An Attribute-attack-proof Watermarking Technique for Relational Database. IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2022, 第 2 作者[11] Li, Yafan, Yuan, Shuguang, Yuan, Yulin, Chen, Chi, Yu, Jing. Anonymization of Quasi-Sensitive Attribute Sets in Aggregated Dataset. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, 第 4 作者2022: http://dx.doi.org/10.1155/2022/9721817.[12] Shuai Su, Chi Chen, Xiaojie Zhu. FAV-BFT: An Efficient File Authenticity Verification Protocol for Blockchain-Based File-Sharing System. CollaborateCom 2022: Collaborative Computing: Networking, Applications and Worksharing[J]. 2022, 第 2 作者[13] Su Shuai, Chi Chen. VoFSQ An Efficient File-Sharing Interactive Verification Protocol. IEEE Symposium on Computers and Communications (ISCC)[J]. 2021, 第 2 作者[14] Shuguang Yuan, Chi Chen, Jing Yu. Verify a Valid Message in Single Tuple:A Watermarking Technique for Relational Database. DASFAA 2020[J]. 2020, 第 2 作者null(null): [15] Zhu, Feng, Shen, Peisong, Chen, Chi, Chen, S, Choo, KKR, Fu, X, Lou, W, Mohaisen, A. A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II. 2019, 第 3 作者305: 259-272, [16] Tian Xue, Shen Peisong, Yang Tengfei, Chen Chi, Hu Jiankun, Hu J, Khalil I, Tari Z, Wen S. A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data. MOBILENETWORKSANDMANAGEMENTMONAMI2017. 2018, 第 4 作者235: 66-78, [17] Yang Yuting, Shen Peisong, Chen Chi, IEEE. A Robust Iris Segmentation using Fully Convolutional Network with Dilated Convolutions. 2018 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2018). 2018, 第 3 作者9-16, http://dx.doi.org/10.1109/ISM.2018.00010.[18] 王贞灵, 薛锐, 陈驰, 田雪, 顾广宇. 多源异构数据的云平台安全态势评估系统. 网络新媒体技术[J]. 2017, 第 3 作者6(3): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=672292002.[19] Chi Chen. A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes. 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). 2017, 第 1 作者[20] Chi Chen. Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-Keyword Searchable Encryption. SecureComm 2017. 2017, 第 1 作者[21] Wang Zhenling, Xue Rui, Chen Chi, Shen Peisong, Destech Publicat Inc. A Real-time Security Situation Assessment System Designed for Cloud Platform. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER SCIENCE (AICS 2016). 2016, 第 3 作者300-308, [22] Chen, Chi, Zhu, Xiaojie, Shen, Peisong, Hu, Jiankun, Guo, Song, Tari, Zahir, Zomaya, Albert Y. An Efficient Privacy-Preserving Ranked Keyword Search Method. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2016, 第 1 作者 通讯作者 27(4): 951-963, http://dx.doi.org/10.1109/TPDS.2015.2425407.[23] 杨静, 程昌秀, 李晓岚, 陈驰. 网络结构空间格局相似度分析以19382014年北京市骨干交通网络为例. 武汉大学学报信息科学版[J]. 2016, 第 4 作者41(12): 1593, http://lib.cqvip.com/Qikan/Article/Detail?id=670882574.[24] 田雪, 朱晓杰, 申培松, 陈驰, 邹洪. 基于相似查询树的快速密文检索方法. 软件学报[J]. 2016, 第 4 作者1566-1576, http://lib.cqvip.com/Qikan/Article/Detail?id=669126897.[25] 陈盛, 陈驰. 基于密文云存储的媒资系统的设计与实现. 网络新媒体技术[J]. 2016, 第 2 作者17-23, http://lib.cqvip.com/Qikan/Article/Detail?id=670626326.[26] 陈驰, 翟梅洁, 于晶. 基于水印的音频审计网关的设计与实现. 计算机应用[J]. 2016, 第 1 作者36(0S2): 57-61, http://lib.cqvip.com/Qikan/Article/Detail?id=WD7483748989504849549050484953.[27] 陈驰, 张莹, 田雪, 艾解清, 龙震岳. 空间访问控制研究综述. 网络新媒体技术[J]. 2015, 第 1 作者1-14, http://lib.cqvip.com/Qikan/Article/Detail?id=663763572.[28] Huawei Zhao, Chi Chen, Jiankun Hu, Jing Qin. Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2015, 第 2 作者11: https://doaj.org/article/d68417adcb034917bb8e5eb62aa6ee08.[29] Shen Peisong, Chen Chi, Tian Xue, Tian Jing, IEEE. A Similarity Evaluation Algorithm and Its Application in Multi-Keyword Search on Encrypted Cloud Data. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015). 2015, 第 2 作者 通讯作者 1218-1223, [30] Chen, Chi, Zhu, Xiaojie, Shen, Peisong, Yu, Jing, Zou, Hong, Hu, Jiankun. SOLS: A scheme for outsourced location based service. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS[J]. 2015, 第 1 作者56: 158-165, http://dx.doi.org/10.1016/j.jnca.2015.06.003.[31] Yang, Wencheng, Hu, Jiankun, Wang, Song, Chen, Chi. Mutual dependency of features in multimodal biometric systems. ELECTRONICS LETTERS[J]. 2015, 第 4 作者51(3): 234-235, https://www.webofscience.com/wos/woscc/full-record/WOS:000349385800024.[32] Chen, Xuexiu, Chen, Chi, Tao, Yuan, Hu, Jiankun. A Cloud Security Assessment System Based on Classifying and Grading. IEEECLOUDCOMPUTING[J]. 2015, 第 2 作者2(2): 58-67, https://www.webofscience.com/wos/woscc/full-record/WOS:000366898300010.[33] Chi Chen. Bee-Based IP Traceback. -. 2014, 第 1 作者[34] 陈雪秀, 于晶, 陈驰, 任卫红. 基于等级保护的云计算安全防护体系研究. 中国数字医学[J]. 2014, 第 3 作者44-47, http://lib.cqvip.com/Qikan/Article/Detail?id=662988631.[35] Chi Chen. Optional Multi-biometric CryptosystemBased on Fuzzy Extractor. -. 2014, 第 1 作者[36] Chen Chi, Zhu Xiaojie, Shen Peisong, Hu Jiankun, IEEE. A Hierarchical Clustering Method For Big Data Oriented Ciphertext Search. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS). 2014, 第 1 作者 通讯作者 559-564, [37] 田雪, 徐震, 陈驰. 若干新型数据库隐蔽信道应用场景研究. 中国科学院研究生院学报[J]. 2013, 第 3 作者30(3): 403-409, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=4837065&detailType=1.[38] 殷佳欣, 陈驰. 集群数据库系统多指标动态负载均衡方法的设计与实现. 中国科学院研究生院学报[J]. 2012, 第 2 作者29(1): 94-100, http://lib.cqvip.com/Qikan/Article/Detail?id=40402409.[39] Chi Chen, Qing Laiyun, Miao Jun, Chen Xilin, Koch R, Huang F. Evaluation of the Impetuses of Scan Path in Real Scene Searching. COMPUTER VISION - ACCV 2010 WORKSHOPS, PT I. 2011, 第 1 作者 通讯作者 6468: 450-459, [40] 付艳艳, 陈驰, 冯登国. 分布式短事务系统中提交协议的研究. 计算机科学[J]. 2011, 第 2 作者38(8): 29-32, http://lib.cqvip.com/Qikan/Article/Detail?id=38990307.[41] 张德胜, 冯登国, 陈驰. 一种面向空间数据库矢量数据的授权模型与实现方法. 计算机研究与发展[J]. 2011, 第 3 作者48(8): 1524-1533, http://lib.cqvip.com/Qikan/Article/Detail?id=38802223.[42] 张妍, 陈驰, 冯登国. 空间矢量数据细粒度强制查询访问控制模型及其高效实现. 软件学报[J]. 2011, 第 2 作者22(8): 1872-1883, http://lib.cqvip.com/Qikan/Article/Detail?id=38741799.[43] 陈驰, 冯登国, 徐震. 信息安全产品安全保证量化评估方法研究. 电子学报[J]. 2007, 第 1 作者35(10): 1886-1891, http://lib.cqvip.com/Qikan/Article/Detail?id=25776885.