Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ju Chen
@article{DBLP:journals/aes/ChenKGGMRCZ23, author = {Ju Chen and Mohd Shareduwan Mohd Kasihmuddin and Yuan Gao and Yueling Guo and Mohd. Asyraf Mansor and Nurul Atiqah Romli and Weixiang Chen and Chengfeng Zheng}, title = {{PRO2SAT:} Systematic Probabilistic Satisfiability logic in Discrete Hopfield Neural Network}, journal = {Adv. Eng. Softw.}, volume = {175}, pages = {103355}, year = {2023}, url = {https://doi.org/10.1016/j.advengsoft.2022.103355}, doi = {10.1016/J.ADVENGSOFT.2022.103355}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aes/ChenKGGMRCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cacml/GaoZCG23, author = {Yuan Gao and Chengfeng Zheng and Ju Chen and Yueling Guo}, title = {Estimation of Distribution Algorithm with Discrete Hopfield Neural Network for {GRAN3SAT} Analysis}, booktitle = {Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, {CACML} 2023, Shanghai, China, March 17-19, 2023}, pages = {96--101}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590003.3590021}, doi = {10.1145/3590003.3590021}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cacml/GaoZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cacml/ChenZGG23, author = {Ju Chen and Chengfeng Zheng and Yuan Gao and Yueling Guo}, title = {Genetic algorithm in hopfield neural network with probabilistic 2 satisfiability}, booktitle = {Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, {CACML} 2023, Shanghai, China, March 17-19, 2023}, pages = {107--111}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590003.3590024}, doi = {10.1145/3590003.3590024}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cacml/ChenZGG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cacml/ZhengKGCM23, author = {Chengfeng Zheng and Mohd Shareduwan Mohd Kasihmuddin and Yuan Gao and Ju Chen and Mohd. Asyraf Mansor}, title = {A Modified Fuzzy K-nearest Neighbor Using the Improved Sparrow Search Algorithm for Two-classes and Multi-classes Datasets}, booktitle = {Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, {CACML} 2023, Shanghai, China, March 17-19, 2023}, pages = {222--227}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590003.3590042}, doi = {10.1145/3590003.3590042}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cacml/ZhengKGCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ChenSY23, author = {Ju Chen and Chengyu Song and Heng Yin}, title = {R-Fuzz at SBFT'2023}, booktitle = {{IEEE/ACM} International Workshop on Search-Based and Fuzz Testing, SBFT@ICSE 2023, Melbourne, Australia, May 14, 2023}, pages = {82--83}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SBFT59156.2023.00027}, doi = {10.1109/SBFT59156.2023.00027}, timestamp = {Wed, 02 Aug 2023 11:15:08 +0200}, biburl = {https://dblp.org/rec/conf/icse/ChenSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Chen22g, author = {Ju Chen}, title = {Building an Efficient Concolic Executor}, school = {University of California, Riverside, {USA}}, year = {2022}, url = {https://www.escholarship.org/uc/item/3q32j16v}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Chen22g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aes/GuoKGMWZC22, author = {Yueling Guo and Mohd Shareduwan Mohd Kasihmuddin and Yuan Gao and Mohd. Asyraf Mansor and Habibah A. Wahab and Nur Ezlin Zamri and Ju Chen}, title = {{YRAN2SAT:} {A} novel flexible random satisfiability logical rule in discrete hopfield neural network}, journal = {Adv. Eng. Softw.}, volume = {171}, pages = {103169}, year = {2022}, url = {https://doi.org/10.1016/j.advengsoft.2022.103169}, doi = {10.1016/J.ADVENGSOFT.2022.103169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aes/GuoKGMWZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenWSY22, author = {Ju Chen and Jinghan Wang and Chengyu Song and Heng Yin}, title = {{JIGSAW:} Efficient and Scalable Path Constraints Fuzzing}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {18--35}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833796}, doi = {10.1109/SP46214.2022.9833796}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChenWSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenHYZSLYS22, author = {Ju Chen and Wookhyun Han and Mingjun Yin and Haochen Zeng and Chengyu Song and Byoungyoung Lee and Heng Yin and Insik Shin}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SYMSAN:} Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2531--2548}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-ju}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenHYZSLYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/LiTZXC21, author = {Kai Li and Yuzhe Tang and Qi Zhang and Jianliang Xu and Ju Chen}, editor = {Kaiwen Zhang and Abdelouahed Gherbi and Nalini Venkatasubramanian and Lu{\'{\i}}s Veiga}, title = {Authenticated key-value stores with hardware enclaves}, booktitle = {Middleware '21: Proceedings of the 22nd International Middleware Conference: Industrial Track, Virtual Event / Qu{\'{e}}bec City, Canada, December 6 - 10, 2021}, pages = {1--8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3491084.3491425}, doi = {10.1145/3491084.3491425}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/LiTZXC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/FengCL19, author = {Jun Feng and Ju Chen and Jiamin Lu}, editor = {Sukhan Lee and Roslan Ismail and Hyunseung Choo}, title = {Novel Approach for Multi-valued Truth Discovery}, booktitle = {Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, {IMCOM} 2019, Phuket, Thailand, January 4-6, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {935}, pages = {1015--1028}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-19063-7\_80}, doi = {10.1007/978-3-030-19063-7\_80}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/FengCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TangLC19, author = {Yuzhe Richard Tang and Kai Li and Ju Chen}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Authenticated {LSM} Trees with Minimal Trust}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {454--471}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_27}, doi = {10.1007/978-3-030-37231-6\_27}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/TangLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-12068, author = {Yuzhe Richard Tang and Ju Chen and Kai Li and Jianliang Xu and Qi Zhang}, title = {Authenticated Key-Value Stores with Hardware Enclaves}, journal = {CoRR}, volume = {abs/1904.12068}, year = {2019}, url = {http://arxiv.org/abs/1904.12068}, eprinttype = {arXiv}, eprint = {1904.12068}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-12068.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenYCMWHG18, author = {Ju Chen and Dianxing Yang and Yue Cao and Yiyi Ma and Chuanbiao Wen and Xiwei Huang and Jinhong Guo}, title = {Syndrome Differentiation and Treatment Algorithm Model in Traditional Chinese Medicine Based on Disease Cause, Location, Characteristics and Conditions}, journal = {{IEEE} Access}, volume = {6}, pages = {71801--71813}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2881535}, doi = {10.1109/ACCESS.2018.2881535}, timestamp = {Wed, 26 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenYCMWHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/TangZCLKKN18, author = {Yuzhe Richard Tang and Qiwu Zou and Ju Chen and Kai Li and Charles A. Kamhoua and Kevin A. Kwiat and Laurent Njilla}, title = {ChainFS: Blockchain-Secured Cloud Storage}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {987--990}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00152}, doi = {10.1109/CLOUD.2018.00152}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/TangZCLKKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TangX0CX18, author = {Yuzhe Richard Tang and Zihao Xing and Cheng Xu and Ju Chen and Jianliang Xu}, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Lightweight Blockchain Logging for Data-Intensive Applications}, booktitle = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, pages = {308--324}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58820-8\_21}, doi = {10.1007/978-3-662-58820-8\_21}, timestamp = {Wed, 16 Mar 2022 23:55:54 +0100}, biburl = {https://dblp.org/rec/conf/fc/TangX0CX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AreekijsereeTC018, author = {Katchaguy Areekijseree and Yuzhe Richard Tang and Ju Chen and Shuang Wang and Arun Iyengar and Balaji Palanisamy}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {71--94}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_5}, doi = {10.1007/978-3-030-01701-9\_5}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AreekijsereeTC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/ChenTZ17, author = {Ju Chen and Yuzhe Richard Tang and Hao Zhou}, title = {Strongly Secure and Efficient Data Shuffle on Hardware Enclaves}, booktitle = {Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, Shanghai, China, October 28, 2017}, pages = {1:1--1:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3152701.3152708}, doi = {10.1145/3152701.3152708}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/ChenTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-04243, author = {Ju Chen and Yuzhe Richard Tang and Hao Zhou}, title = {Strongly Secure and Efficient Data Shuffle On Hardware Enclaves}, journal = {CoRR}, volume = {abs/1711.04243}, year = {2017}, url = {http://arxiv.org/abs/1711.04243}, eprinttype = {arXiv}, eprint = {1711.04243}, timestamp = {Tue, 21 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-04243.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PengTCWZ16, author = {Zhiniang Peng and Shaohua Tang and Ju Chen and Chen Wu and Xinglin Zhang}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 {CPU}}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {151--166}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_11}, doi = {10.1007/978-3-319-49151-6\_11}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PengTCWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangC16, author = {Yuzhe Richard Tang and Ju Chen}, title = {Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1063}, year = {2016}, url = {http://eprint.iacr.org/2016/1063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/ChenLC15, author = {Ju Chen and Yi Liu and Yueting Chai}, editor = {Yinsheng Li and Xiang Fei and Kuo{-}Ming Chao and Jen{-}Yao Chung}, title = {An Identity Management Framework for Internet of Things}, booktitle = {12th {IEEE} International Conference on e-Business Engineering, {ICEBE} 2015, Beijing, China, October 23-25, 2015}, pages = {360--364}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICEBE.2015.67}, doi = {10.1109/ICEBE.2015.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/ChenLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmssc/ChenCLL14, author = {Ju Chen and Kuiying Chen and Rong Liu and Ming Liang}, title = {Analytical modeling of oxide thickness variation of metals under high temperature solid-particle erosion}, journal = {Int. J. Model. Simul. Sci. Comput.}, volume = {5}, number = {3}, pages = {1450002}, year = {2014}, url = {https://doi.org/10.1142/S1793962314500020}, doi = {10.1142/S1793962314500020}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmssc/ChenCLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmic/ZhaoCJ09, author = {Yu{-}Xi Zhao and Ju Chen and Wei{-}Liang Jin}, title = {Design of shear strengths of corroded reinforced concrete beams}, journal = {Int. J. Model. Identif. Control.}, volume = {7}, number = {2}, pages = {190--198}, year = {2009}, url = {https://doi.org/10.1504/IJMIC.2009.027074}, doi = {10.1504/IJMIC.2009.027074}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmic/ZhaoCJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.