Multi-identity single-key decryption without random oracles F Guo, Y Mu, Z Chen, L Xu Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008 | 131 | 2008 |
Identity-based online/offline encryption F Guo, Y Mu, Z Chen Financial Cryptography and Data Security: 12th International Conference, FC …, 2008 | 104 | 2008 |
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key F Guo, Y Mu, Z Chen International Conference on Pairing-Based Cryptography, 392-406, 2007 | 91 | 2007 |
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game Z Chen, Y Qiu, J Liu, L Xu Computers & Mathematics with Applications 62 (9), 3378-3388, 2011 | 47 | 2011 |
An implicit identity authentication system considering changes of gesture based on keystroke behaviors J Wu, Z Chen International Journal of Distributed Sensor Networks 11 (6), 470274, 2015 | 46 | 2015 |
Distracted driving recognition method based on deep convolutional neural network X Rao, F Lin, Z Chen, J Zhao Journal of Ambient Intelligence and Humanized Computing 12 (1), 193-200, 2021 | 39 | 2021 |
Fault-tolerant algorithms for connectivity restoration in wireless sensor networks Y Zeng, L Xu, Z Chen Sensors 16 (1), 3, 2015 | 32 | 2015 |
Dynamics stability in wireless sensor networks active defense model Z Chen, C Qiao, Y Qiu, L Xu, W Wu Journal of Computer and System Sciences 80 (8), 1534-1548, 2014 | 30 | 2014 |
Active defense model of wireless sensor networks based on evolutionary game theory Y Qiu, Z Chen, L Xu 2010 6th International Conference on Wireless Communications Networking and …, 2010 | 26 | 2010 |
Efficient batch verification of short signatures for a single-signer setting without random oracles F Guo, Y Mu, Z Chen Advances in Information and Computer Security: Third International Workshop …, 2008 | 16 | 2008 |
Secure anonymous routing in trust and clustered wireless ad hoc networks S Chen, L Xu, Z Chen 2007 Second International Conference on Communications and Networking in …, 2007 | 15 | 2007 |
A cluster header election scheme based on auction mechanism for intrusion detection in MANET Y Zeng, Z Chen, C Qiao, L Xu 2011 International Conference on Network Computing and Information Security …, 2011 | 12 | 2011 |
Human continuous activity recognition based on energy‐efficient schemes considering cloud security technology Z Chen, J Wu, A Castiglione, W Wu Security and Communication Networks 9 (16), 3585-3601, 2016 | 10 | 2016 |
A simple analysis of heat transfer near an oscillating interface ZD Chen, JJJ Chen Chemical engineering science 53 (5), 947-950, 1998 | 10 | 1998 |
On the Security of WAI Protocol in the Third Version of WAPI ZH Tang, L Xu, Z Chen, F Guo 2008 International Conference on Intelligent Information Hiding and …, 2008 | 9 | 2008 |
Spread and control of mobile benign worm based on two-stage repairing mechanism M Wang, Z Chen, L Xu, H Zhan Journal of Applied Mathematics 2014, 2014 | 8 | 2014 |
Random access control for M2M in LTE system Z Chen, Y Zeng International Journal of Distributed Sensor Networks 9 (12), 313797, 2013 | 8 | 2013 |
Routing protocols based on double auction for ad hoc networks Z Wu, Z Chen, L Xu, F Guo 2007 International Conference on Networking, Architecture, and Storage (NAS …, 2007 | 8 | 2007 |
Worm propagation model in mobile network Z Chen, M Wang, L Xu, W Wu Concurrency and Computation: Practice and Experience 28 (4), 1134-1144, 2016 | 7 | 2016 |
Analysis of two-worm interaction model in heterogeneous M2M network J Ma, Z Chen, J Liu, R Zheng Information 6 (4), 613-632, 2015 | 7 | 2015 |