BibTeX records: Ju Chen

download as .bib file

@article{DBLP:journals/aes/ChenKGGMRCZ23,
  author       = {Ju Chen and
                  Mohd Shareduwan Mohd Kasihmuddin and
                  Yuan Gao and
                  Yueling Guo and
                  Mohd. Asyraf Mansor and
                  Nurul Atiqah Romli and
                  Weixiang Chen and
                  Chengfeng Zheng},
  title        = {{PRO2SAT:} Systematic Probabilistic Satisfiability logic in Discrete
                  Hopfield Neural Network},
  journal      = {Adv. Eng. Softw.},
  volume       = {175},
  pages        = {103355},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.advengsoft.2022.103355},
  doi          = {10.1016/J.ADVENGSOFT.2022.103355},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aes/ChenKGGMRCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cacml/GaoZCG23,
  author       = {Yuan Gao and
                  Chengfeng Zheng and
                  Ju Chen and
                  Yueling Guo},
  title        = {Estimation of Distribution Algorithm with Discrete Hopfield Neural
                  Network for {GRAN3SAT} Analysis},
  booktitle    = {Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing
                  and Machine Learning, {CACML} 2023, Shanghai, China, March 17-19,
                  2023},
  pages        = {96--101},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3590003.3590021},
  doi          = {10.1145/3590003.3590021},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cacml/GaoZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cacml/ChenZGG23,
  author       = {Ju Chen and
                  Chengfeng Zheng and
                  Yuan Gao and
                  Yueling Guo},
  title        = {Genetic algorithm in hopfield neural network with probabilistic 2
                  satisfiability},
  booktitle    = {Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing
                  and Machine Learning, {CACML} 2023, Shanghai, China, March 17-19,
                  2023},
  pages        = {107--111},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3590003.3590024},
  doi          = {10.1145/3590003.3590024},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cacml/ChenZGG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cacml/ZhengKGCM23,
  author       = {Chengfeng Zheng and
                  Mohd Shareduwan Mohd Kasihmuddin and
                  Yuan Gao and
                  Ju Chen and
                  Mohd. Asyraf Mansor},
  title        = {A Modified Fuzzy K-nearest Neighbor Using the Improved Sparrow Search
                  Algorithm for Two-classes and Multi-classes Datasets},
  booktitle    = {Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing
                  and Machine Learning, {CACML} 2023, Shanghai, China, March 17-19,
                  2023},
  pages        = {222--227},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3590003.3590042},
  doi          = {10.1145/3590003.3590042},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cacml/ZhengKGCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ChenSY23,
  author       = {Ju Chen and
                  Chengyu Song and
                  Heng Yin},
  title        = {R-Fuzz at SBFT'2023},
  booktitle    = {{IEEE/ACM} International Workshop on Search-Based and Fuzz Testing,
                  SBFT@ICSE 2023, Melbourne, Australia, May 14, 2023},
  pages        = {82--83},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SBFT59156.2023.00027},
  doi          = {10.1109/SBFT59156.2023.00027},
  timestamp    = {Wed, 02 Aug 2023 11:15:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ChenSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Chen22g,
  author       = {Ju Chen},
  title        = {Building an Efficient Concolic Executor},
  school       = {University of California, Riverside, {USA}},
  year         = {2022},
  url          = {https://www.escholarship.org/uc/item/3q32j16v},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Chen22g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aes/GuoKGMWZC22,
  author       = {Yueling Guo and
                  Mohd Shareduwan Mohd Kasihmuddin and
                  Yuan Gao and
                  Mohd. Asyraf Mansor and
                  Habibah A. Wahab and
                  Nur Ezlin Zamri and
                  Ju Chen},
  title        = {{YRAN2SAT:} {A} novel flexible random satisfiability logical rule
                  in discrete hopfield neural network},
  journal      = {Adv. Eng. Softw.},
  volume       = {171},
  pages        = {103169},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.advengsoft.2022.103169},
  doi          = {10.1016/J.ADVENGSOFT.2022.103169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aes/GuoKGMWZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenWSY22,
  author       = {Ju Chen and
                  Jinghan Wang and
                  Chengyu Song and
                  Heng Yin},
  title        = {{JIGSAW:} Efficient and Scalable Path Constraints Fuzzing},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {18--35},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833796},
  doi          = {10.1109/SP46214.2022.9833796},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChenWSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenHYZSLYS22,
  author       = {Ju Chen and
                  Wookhyun Han and
                  Mingjun Yin and
                  Haochen Zeng and
                  Chengyu Song and
                  Byoungyoung Lee and
                  Heng Yin and
                  Insik Shin},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SYMSAN:} Time and Space Efficient Concolic Execution via Dynamic
                  Data-flow Analysis},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2531--2548},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-ju},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenHYZSLYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/LiTZXC21,
  author       = {Kai Li and
                  Yuzhe Tang and
                  Qi Zhang and
                  Jianliang Xu and
                  Ju Chen},
  editor       = {Kaiwen Zhang and
                  Abdelouahed Gherbi and
                  Nalini Venkatasubramanian and
                  Lu{\'{\i}}s Veiga},
  title        = {Authenticated key-value stores with hardware enclaves},
  booktitle    = {Middleware '21: Proceedings of the 22nd International Middleware Conference:
                  Industrial Track, Virtual Event / Qu{\'{e}}bec City, Canada,
                  December 6 - 10, 2021},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3491084.3491425},
  doi          = {10.1145/3491084.3491425},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/LiTZXC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/FengCL19,
  author       = {Jun Feng and
                  Ju Chen and
                  Jiamin Lu},
  editor       = {Sukhan Lee and
                  Roslan Ismail and
                  Hyunseung Choo},
  title        = {Novel Approach for Multi-valued Truth Discovery},
  booktitle    = {Proceedings of the 13th International Conference on Ubiquitous Information
                  Management and Communication, {IMCOM} 2019, Phuket, Thailand, January
                  4-6, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {935},
  pages        = {1015--1028},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-19063-7\_80},
  doi          = {10.1007/978-3-030-19063-7\_80},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/FengCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TangLC19,
  author       = {Yuzhe Richard Tang and
                  Kai Li and
                  Ju Chen},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Authenticated {LSM} Trees with Minimal Trust},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {454--471},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_27},
  doi          = {10.1007/978-3-030-37231-6\_27},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/TangLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-12068,
  author       = {Yuzhe Richard Tang and
                  Ju Chen and
                  Kai Li and
                  Jianliang Xu and
                  Qi Zhang},
  title        = {Authenticated Key-Value Stores with Hardware Enclaves},
  journal      = {CoRR},
  volume       = {abs/1904.12068},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.12068},
  eprinttype    = {arXiv},
  eprint       = {1904.12068},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-12068.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenYCMWHG18,
  author       = {Ju Chen and
                  Dianxing Yang and
                  Yue Cao and
                  Yiyi Ma and
                  Chuanbiao Wen and
                  Xiwei Huang and
                  Jinhong Guo},
  title        = {Syndrome Differentiation and Treatment Algorithm Model in Traditional
                  Chinese Medicine Based on Disease Cause, Location, Characteristics
                  and Conditions},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {71801--71813},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2881535},
  doi          = {10.1109/ACCESS.2018.2881535},
  timestamp    = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChenYCMWHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/TangZCLKKN18,
  author       = {Yuzhe Richard Tang and
                  Qiwu Zou and
                  Ju Chen and
                  Kai Li and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat and
                  Laurent Njilla},
  title        = {ChainFS: Blockchain-Secured Cloud Storage},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {987--990},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00152},
  doi          = {10.1109/CLOUD.2018.00152},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/TangZCLKKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TangX0CX18,
  author       = {Yuzhe Richard Tang and
                  Zihao Xing and
                  Cheng Xu and
                  Ju Chen and
                  Jianliang Xu},
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Lightweight Blockchain Logging for Data-Intensive Applications},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  pages        = {308--324},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58820-8\_21},
  doi          = {10.1007/978-3-662-58820-8\_21},
  timestamp    = {Wed, 16 Mar 2022 23:55:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/TangX0CX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AreekijsereeTC018,
  author       = {Katchaguy Areekijseree and
                  Yuzhe Richard Tang and
                  Ju Chen and
                  Shuang Wang and
                  Arun Iyengar and
                  Balaji Palanisamy},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving
                  Data Sharing},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {71--94},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_5},
  doi          = {10.1007/978-3-030-01701-9\_5},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AreekijsereeTC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/ChenTZ17,
  author       = {Ju Chen and
                  Yuzhe Richard Tang and
                  Hao Zhou},
  title        = {Strongly Secure and Efficient Data Shuffle on Hardware Enclaves},
  booktitle    = {Proceedings of the 2nd Workshop on System Software for Trusted Execution,
                  SysTEX@SOSP 2017, Shanghai, China, October 28, 2017},
  pages        = {1:1--1:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3152701.3152708},
  doi          = {10.1145/3152701.3152708},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/ChenTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-04243,
  author       = {Ju Chen and
                  Yuzhe Richard Tang and
                  Hao Zhou},
  title        = {Strongly Secure and Efficient Data Shuffle On Hardware Enclaves},
  journal      = {CoRR},
  volume       = {abs/1711.04243},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.04243},
  eprinttype    = {arXiv},
  eprint       = {1711.04243},
  timestamp    = {Tue, 21 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-04243.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PengTCWZ16,
  author       = {Zhiniang Peng and
                  Shaohua Tang and
                  Ju Chen and
                  Chen Wu and
                  Xinglin Zhang},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Fast Implementation of Simple Matrix Encryption Scheme on Modern x64
                  {CPU}},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {151--166},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_11},
  doi          = {10.1007/978-3-319-49151-6\_11},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PengTCWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangC16,
  author       = {Yuzhe Richard Tang and
                  Ju Chen},
  title        = {Write-Optimized Consistency Verification in Cloud Storage with Minimal
                  Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1063},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/ChenLC15,
  author       = {Ju Chen and
                  Yi Liu and
                  Yueting Chai},
  editor       = {Yinsheng Li and
                  Xiang Fei and
                  Kuo{-}Ming Chao and
                  Jen{-}Yao Chung},
  title        = {An Identity Management Framework for Internet of Things},
  booktitle    = {12th {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2015, Beijing, China, October 23-25, 2015},
  pages        = {360--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICEBE.2015.67},
  doi          = {10.1109/ICEBE.2015.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/ChenLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmssc/ChenCLL14,
  author       = {Ju Chen and
                  Kuiying Chen and
                  Rong Liu and
                  Ming Liang},
  title        = {Analytical modeling of oxide thickness variation of metals under high
                  temperature solid-particle erosion},
  journal      = {Int. J. Model. Simul. Sci. Comput.},
  volume       = {5},
  number       = {3},
  pages        = {1450002},
  year         = {2014},
  url          = {https://doi.org/10.1142/S1793962314500020},
  doi          = {10.1142/S1793962314500020},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmssc/ChenCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmic/ZhaoCJ09,
  author       = {Yu{-}Xi Zhao and
                  Ju Chen and
                  Wei{-}Liang Jin},
  title        = {Design of shear strengths of corroded reinforced concrete beams},
  journal      = {Int. J. Model. Identif. Control.},
  volume       = {7},
  number       = {2},
  pages        = {190--198},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJMIC.2009.027074},
  doi          = {10.1504/IJMIC.2009.027074},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmic/ZhaoCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics