Metaverse in education: Vision, opportunities, and challenges H Lin, S Wan, W Gan, J Chen, HC Chao 2022 IEEE International Conference on Big Data (Big Data), 2857-2866, 2022 | 212 | 2022 |
A secure blockchain-based group key agreement protocol for IoT CM Chen, X Deng, W Gan, J Chen, SKH Islam The Journal of Supercomputing 77, 9046-9068, 2021 | 86 | 2021 |
On the construction of a post-quantum blockchain for smart city J Chen, W Gan, M Hu, CM Chen Journal of information security and applications 58, 102780, 2021 | 54 | 2021 |
A novel location privacy-preserving approach based on blockchain Y Qiu, Y Liu, X Li, J Chen Sensors 20 (12), 3519, 2020 | 50 | 2020 |
Distributed blockchainbased authentication and authorization protocol for smart grid Y Zhong, M Zhou, J Li, J Chen, Y Liu, Y Zhao, M Hu Wireless Communications and Mobile Computing 2021 (1), 5560621, 2021 | 48 | 2021 |
Web3: The next internet revolution S Wan, H Lin, W Gan, J Chen, PS Yu IEEE Internet of Things Journal 11 (21), 34811-34825, 2024 | 32 | 2024 |
A blockchain-based signature exchange protocol for metaverse J Chen, H Xiao, M Hu, CM Chen Future Generation Computer Systems 142, 237-247, 2023 | 32 | 2023 |
TopHUI: Top-k high-utility itemset mining with negative utility W Gan, S Wan, J Chen, CM Chen, L Qiu 2020 IEEE International Conference on Big Data (Big Data), 5350-5359, 2020 | 31 | 2020 |
Identity-based signature schemes for multivariate public key cryptosystems J Chen, J Ling, J Ning, J Ding The Computer Journal 62 (8), 1132-1147, 2019 | 30 | 2019 |
Anomaly rule detection in sequence data W Gan, L Chen, S Wan, J Chen, CM Chen IEEE Transactions on Knowledge and Data Engineering 35 (12), 12095-12108, 2021 | 28 | 2021 |
Fast RFM model for customer segmentation S Wan, J Chen, Z Qi, W Gan, L Tang Companion Proceedings of the Web Conference 2022, 965-972, 2022 | 26 | 2022 |
Multiauthority AttributeBased Encryption with Traceable and Dynamic Policy Updating J Ling, J Chen, J Chen, W Gan Security and Communication Networks 2021 (1), 6661450, 2021 | 21 | 2021 |
Targeted high-utility itemset querying J Miao, S Wan, W Gan, J Sun, J Chen IEEE Transactions on Artificial Intelligence 4 (4), 871-883, 2022 | 19 | 2022 |
A new encryption scheme for multivariate quadratic systems J Chen, J Ning, J Ling, TSC Lau, Y Wang Theoretical Computer Science 809, 372-383, 2020 | 19 | 2020 |
On the construction of a post-quantum blockchain J Chen, W Gan, M Hu, CM Chen 2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021 | 14 | 2021 |
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature J Chen, J Ling, J Ning, E Panaousis, G Loukas, K Liang, J Chen International Journal of Distributed Sensor Networks 16 (4), 1550147720914775, 2020 | 12 | 2020 |
On-shelf utility mining from transaction database J Chen, X Guo, W Gan, CM Chen, W Ding, G Chen Engineering Applications of Artificial Intelligence 107, 104516, 2022 | 11 | 2022 |
Online/offline signature based on UOV in wireless sensor networks J Chen, S Tang, D He, Y Tan Wireless Networks 23, 1719-1730, 2017 | 11 | 2017 |
A jumping mining attack and solution M Hu, J Chen, W Gan, CM Chen Applied Intelligence 51, 1367-1378, 2021 | 8 | 2021 |
OSUMI: On-shelf utility mining from itemset-based data J Chen, X Guo, W Gan, CM Chen, W Ding, G Chen 2020 IEEE International Conference on Big Data (Big Data), 5340-5349, 2020 | 8 | 2020 |