PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks J Zhang, J Cui, H Zhong, Z Chen, L Liu IEEE Transactions on Dependable and Secure Computing 18 (2), 722-735, 2019 | 296 | 2019 |
Information assurance through redundant design: A novel TNU error-resilient latch for harsh radiation environment A Yan, Y Hu, J Cui, Z Chen, Z Huang, T Ni, P Girard, X Wen IEEE Transactions on Computers 69 (6), 789-799, 2020 | 87 | 2020 |
Design of a triple-node-upset self-recoverable latch for aerospace applications in harsh radiation environments A Yan, X Feng, Y Hu, C Lai, J Cui, Z Chen, K Miyase, X Wen IEEE Transactions on Aerospace and Electronic Systems 56 (2), 1163-1171, 2019 | 83 | 2019 |
Novel quadruple-node-upset-tolerant latch designs with optimized overhead for reliable computing in harsh radiation environments A Yan, Z Xu, X Feng, J Cui, Z Chen, T Ni, Z Huang, P Girard, X Wen IEEE transactions on emerging topics in computing 10 (1), 404-413, 2020 | 72 | 2020 |
A new scheme for covert communication via 3G encoded speech H Miao, L Huang, Z Chen, W Yang, A Al-Hawbani Computers & Electrical Engineering 38 (6), 1490-1501, 2012 | 56 | 2012 |
Effective linguistic steganography detection X Zhao, Z Chen, L Huang, Z Yu 2008 IEEE 8th International Conference on Computer and Information …, 2008 | 52 | 2008 |
Linguistic steganography detection using statistical characteristics of correlations between words Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008 | 52 | 2008 |
Probabilistic matrix factorization with personalized differential privacy S Zhang, L Liu, Z Chen, H Zhong Knowledge-Based Systems 183, 104864, 2019 | 49 | 2019 |
Steganalysis against substitution-based linguistic steganography based on context clusters Z Chen, L Huang, H Miao, W Yang, P Meng Computers & Electrical Engineering 37 (6), 1071-1081, 2011 | 47 | 2011 |
Quadruple cross-coupled dual-interlocked-storage-cells-based multiple-node-upset-tolerant latch designs A Yan, Y Ling, J Cui, Z Chen, Z Huang, J Song, P Girard, X Wen IEEE Transactions on Circuits and Systems I: Regular Papers 67 (3), 879-890, 2020 | 46 | 2020 |
True-MCSA: A framework for truthful double multi-channel spectrum auctions Z Chen, H Huang, Y Sun, L Huang IEEE Transactions on Wireless Communications 12 (8), 3838-3850, 2013 | 46 | 2013 |
Linguistic steganography detection algorithm using statistical language model P Meng, L Hang, W Yang, Z Chen, H Zheng 2009 international conference on information technology and computer science …, 2009 | 46 | 2009 |
A statistical algorithm for linguistic steganography detection based on distribution of words C Zhi-Li, H Liu-Sheng, Y Zhen-Shan, L Ling-Jun, Y Wei 2008 Third International Conference on Availability, Reliability and …, 2008 | 43 | 2008 |
Differentially private user-based collaborative filtering recommendation based on k-means clustering Z Chen, Y Wang, S Zhang, H Zhong, L Chen Expert Systems with applications 168, 114366, 2021 | 42 | 2021 |
PS-TRUST: Provably secure solution for truthful double spectrum auctions Z Chen, L Huang, L Li, W Yang, H Miao, M Tian, F Wang IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1249-1257, 2014 | 42 | 2014 |
A statistical attack on a kind of word-shift text-steganography L Li, L Huang, X Zhao, W Yang, Z Chen 2008 International Conference on Intelligent Information Hiding and …, 2008 | 42 | 2008 |
Steganalysis of compressed speech based on Markov and entropy H Miao, L Huang, Y Shen, X Lu, Z Chen Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014 | 38 | 2014 |
STBS: A statistical algorithm for steganalysis of translation-based steganography P Meng, L Hang, Z Chen, Y Hu, W Yang International Workshop on Information Hiding, 208-220, 2010 | 37 | 2010 |
Differentially private double spectrum auction with approximate social welfare maximization Z Chen, T Ni, H Zhong, S Zhang, J Cui IEEE Transactions on Information Forensics and Security 14 (11), 2805-2818, 2019 | 36 | 2019 |
Utility-efficient differentially private K-means clustering based on cluster merging T Ni, M Qiao, Z Chen, S Zhang, H Zhong Neurocomputing 424, 205-214, 2021 | 34 | 2021 |