Special issue on advanced persistent threat J Chen, C Su, KH Yeh, M Yung Future Generation Computer Systems 79, 243-246, 2018 | 57 | 2018 |
Security analysis and new models on the intelligent symmetric key encryption L Zhou, J Chen, Y Zhang, C Su, MA James Computers & Security 80, 14-24, 2019 | 39 | 2019 |
Detection and classification of malicious patterns in network traffic using Benford's law L Sun, TS Anthony, HZ Xia, J Chen, X Huang, Y Zhang 2017 Asia-Pacific Signal and Information Processing Association Annual …, 2017 | 35 | 2017 |
Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data K Liang, C Su, J Chen, JK Liu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 32 | 2016 |
Related-key boomerang attacks on KATAN32/48/64 T Isobe, Y Sasaki, J Chen Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013 | 28 | 2013 |
An efficient blind filter: Location privacy protection and the access control in FinTech Z Li, W Li, QY Wen, J Chen, W Yin, K Liang Future Generation Computer Systems 100, 797-810, 2019 | 24 | 2019 |
Efficient encrypted data search with expressive queries and flexible update J Ning, J Chen, K Liang, JK Liu, C Su, Q Wu IEEE transactions on services computing 15 (3), 1619-1633, 2020 | 23 | 2020 |
Lightweight block cipher security evaluation based on machine learning classifiers and active S-boxes TR Lee, JS Teh, N Jamil, JLS Yan, J Chen IEEE Access 9, 134052-134064, 2021 | 21 | 2021 |
User location privacy protection mechanism for location-based services Y He, J Chen Digital communications and networks 7 (2), 264-276, 2021 | 21 | 2021 |
Security, privacy, and trust on internet of things C Kolias, W Meng, G Kambourakis, J Chen Wireless Communications and Mobile Computing 2019, 6452157, 2019 | 21 | 2019 |
ElearnChain: a privacy-preserving consortium blockchain system for e-learning educational records H An, J Chen Journal of Information Security and Applications 63, 103013, 2021 | 20 | 2021 |
Towards accurate statistical analysis of security margins: New searching strategies for differential attacks J Chen, J Teh, Z Liu, C Su, A Samsudin, Y Xiang IEEE Transactions on Computers 66 (10), 1763-1777, 2017 | 19 | 2017 |
Encryption switching service: Securely switch your encrypted data to another format P Jiang, J Ning, K Liang, C Dong, J Chen, Z Cao IEEE Transactions on Services Computing 14 (5), 1357-1369, 2018 | 18 | 2018 |
Improved lightweight pseudo-random number generators for the low-cost rfid tags J Chen, A Miyaj, H Sato, C Su 2015 IEEE Trustcom/BigDataSE/ISPA 1, 17-24, 2015 | 17 | 2015 |
How to find short RC4 colliding key pairs J Chen, A Miyaji International Conference on Information Security, 32-46, 2011 | 17 | 2011 |
Differential cryptanalysis and boomerang cryptanalysis of LBlock J Chen, A Miyaji Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 16 | 2013 |
A new practical key recovery attack on the stream cipher RC4 under related-key model J Chen, A Miyaji Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011 | 16 | 2011 |
Efficient implementation of lightweight block ciphers on volta and pascal architecture P Li, S Zhou, B Ren, S Tang, T Li, C Xu, J Chen Journal of Information Security and Applications 47, 235-245, 2019 | 14 | 2019 |
Generalized RC4 key collisions and hash collisions J Chen, A Miyaji International Conference on Security and Cryptography for Networks, 73-87, 2010 | 14 | 2010 |
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators JS Teh, W Teng, A Samsudin, J Chen Frontiers of Computer Science 14, 1-11, 2020 | 12 | 2020 |