Direct anonymous attestation E Brickell, J Camenisch, L Chen Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1369 | 2004 |
Identity-based key agreement protocols from pairings L Chen, Z Cheng, NP Smart International Journal of Information Security 6, 213-241, 2007 | 606 | 2007 |
When private set intersection meets big data: an efficient and scalable protocol C Dong, L Chen, Z Wen Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 478 | 2013 |
Identity based authenticated key agreement protocols from pairings L Chen, C Kudla 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 219-233, 2003 | 475 | 2003 |
Improved identity-based signcryption L Chen, J Malone-Lee International workshop on public key cryptography, 362-379, 2005 | 423 | 2005 |
A protocol for property-based attestation L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006 | 297 | 2006 |
Alice: Towards understanding adversarial learning for joint distribution matching C Li, H Liu, C Chen, Y Pu, L Chen, R Henao, L Carin Advances in neural information processing systems 30, 2017 | 277 | 2017 |
Vision-language pre-training with triple contrastive learning J Yang, J Duan, S Tran, Y Xu, S Chanda, L Chen, B Zeng, T Chilimbi, ... Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 225 | 2022 |
Concurrent signatures L Chen, C Kudla, KG Paterson Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 221 | 2004 |
Applications of multiple trust authorities in pairing based cryptosystems L Chen, K Harrison, D Soldera, NP Smart International Conference on Infrastructure Security, 260-275, 2002 | 216 | 2002 |
Contextualized perturbation for textual adversarial attack D Li, Y Zhang, H Peng, L Chen, C Brockett, MT Sun, B Dolan arXiv preprint arXiv:2009.07502, 2020 | 214 | 2020 |
Security proof of Sakai-Kasahara’s identity-based encryption scheme L Chen, Z Cheng IMA International conference on cryptography and coding, 442-459, 2005 | 189 | 2005 |
Trusted system SL Pearson, L Chen US Patent 7,275,160, 2007 | 188 | 2007 |
Threshold anonymous announcement in VANETs L Chen, SL Ng, G Wang IEEE Journal on selected areas in communications 29 (3), 605-615, 2011 | 174 | 2011 |
Graph optimal transport for cross-domain alignment L Chen, Z Gan, Y Cheng, L Li, L Carin, J Liu International Conference on Machine Learning, 1542-1553, 2020 | 163 | 2020 |
Adversarial text generation via feature-mover's distance L Chen, S Dai, C Tao, H Zhang, Z Gan, D Shen, Y Zhang, G Wang, ... Advances in neural information processing systems 31, 2018 | 163 | 2018 |
Triangle generative adversarial networks Z Gan, L Chen, W Wang, Y Pu, Y Zhang, H Liu, C Li, L Carin Advances in neural information processing systems 30, 2017 | 155 | 2017 |
A new direct anonymous attestation scheme from bilinear maps E Brickell, L Chen, J Li Trusted Computing-Challenges and Applications: First International …, 2008 | 154 | 2008 |
Electronic commerce system L Chen, B Balacheff, R Du Toit, SL Pearson, D Chan US Patent 7,096,204, 2006 | 150 | 2006 |
Public-key encryption with registered keyword search Q Tang, L Chen European public key infrastructure workshop, 163-178, 2009 | 148 | 2009 |