default search action
Jiahui Chen 0002
Person information
- affiliation: Guangdong University of Technology, Guangzhou, China
- affiliation (former): National University of Singapore, Singapore
Other persons with the same name
- Jiahui Chen — disambiguation page
- Jiahui Chen 0001 — Beihang University, Beijing, China
- Jiahui Chen 0003 — Hunan University of Technology and Business, Changsha, China
- Jiahui Chen 0004 — ShanghaiTech University, School of Information Science and Technology, China
- Jiahui Chen 0005 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, China
- Jiahui Chen 0006 — Michigan State University, Department of Mathematics, East Lansing, MI, USA (and 1 more)
- Jiahui Chen 0007 — University of Utah, Salt Lake City, UT, USA
- Jiahui Chen 0008 — Universitat Ramon Llull, Barcelona, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Jie Ling, Junchang Zheng, Jiahui Chen:
Efficient federated learning privacy preservation method with heterogeneous differential privacy. Comput. Secur. 139: 103715 (2024) - [j24]Shaotao Chen, Jiahui Chen, Shicheng Wan:
Efficient weighted sequential pattern mining. Expert Syst. Appl. 243: 122703 (2024) - 2023
- [j23]Jiahui Chen, Hang Xiao, Muchuang Hu, Chien-Ming Chen:
A blockchain-based signature exchange protocol for metaverse. Future Gener. Comput. Syst. 142: 237-247 (2023) - [j22]Peiming Xu, Jiahui Chen, Yiwei Yang, Jianting Ning:
DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack. IEEE Internet Things J. 10(2): 1082-1095 (2023) - [j21]Jinbao Miao, Shicheng Wan, Wensheng Gan, Jiayi Sun, Jiahui Chen:
Targeted High-Utility Itemset Querying. IEEE Trans. Artif. Intell. 4(4): 871-883 (2023) - [j20]Wensheng Gan, Lili Chen, Shicheng Wan, Jiahui Chen, Chien-Ming Chen:
Anomaly Rule Detection in Sequence Data. IEEE Trans. Knowl. Data Eng. 35(12): 12095-12108 (2023) - [c17]Chengdong Chen, Wensheng Gan, Jiahui Chen, Shicheng Wan:
FSKY-Miner: Fast Mining of Skyline Patterns. ISPA/BDCloud/SocialCom/SustainCom 2023: 795-802 - [c16]Yixin Xu, Cuiwei Peng, Jiahui Chen, Wensheng Gan, Shicheng Wan:
Mining Rare Utility Patterns within Target Items. IEEE Big Data 2023: 6015-6024 - [i14]Shicheng Wan, Hong Lin, Wensheng Gan, Jiahui Chen, Philip S. Yu:
Web3: The Next Internet Revolution. CoRR abs/2304.06111 (2023) - 2022
- [j19]Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Terry Shue Chien Lau, Jiahui Chen:
Security Issues of Novel RSA Variant. IEEE Access 10: 53788-53796 (2022) - [j18]Jiadong Lu, Fangming Gu, Yiqi Wang, Jiahui Chen, Zhiniang Peng, Sheng Wen:
Static Detection of File Access Control Vulnerabilities on Windows System. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j17]Jiahui Chen, Xu Guo, Wensheng Gan, Chien-Ming Chen, Weiping Ding, Guoting Chen:
On-shelf utility mining from transaction database. Eng. Appl. Artif. Intell. 107: 104516 (2022) - [j16]Xiaoyu Li, Lin Ge, Jiahui Chen, Zhiniang Peng:
Comments on "A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud". J. Syst. Archit. 131: 102702 (2022) - [j15]Gengsen Huang, Wensheng Gan, Shan Huang, Jiahui Chen:
Negative pattern discovery with individual support. Knowl. Based Syst. 251: 109194 (2022) - [j14]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Smart System: Joint Utility and Frequency for Pattern Classification. ACM Trans. Manag. Inf. Syst. 13(4): 43:1-43:24 (2022) - [c15]Hong Lin, Shicheng Wan, Wensheng Gan, Jiahui Chen, Han-Chieh Chao:
Metaverse in Education: Vision, Opportunities, and Challenges. IEEE Big Data 2022: 2857-2866 - [c14]Gengsen Huang, Wensheng Gan, Long Li, Tianlong Gu, Jiahui Chen:
Flexibly Mining Better Patterns. IEEE Big Data 2022: 6212-6221 - [c13]Peifeng Zhang, Jiahui Chen, Shicheng Wan, Wensheng Gan:
Targeted Mining of Rare High-Utility Patterns. IEEE Big Data 2022: 6271-6280 - [c12]Shicheng Wan, Jieying Deng, Wensheng Gan, Jiahui Chen, Philip S. Yu:
Fast Mining RFM Patterns for Behavioral Analytics. DSAA 2022: 1-10 - [c11]Zhenqiang Ye, Shicheng Wan, Wensheng Gan, Jiahui Chen, Linlin Tang:
Fuzzy Utility Mining on Temporal Data. ICDIS 2022: 366-373 - [c10]Zhenqiang Ye, Ziyang Li, Weibin Guo, Wensheng Gan, Shicheng Wan, Jiahui Chen:
Fast Weighted Sequential Pattern Mining. IEA/AIE 2022: 807-818 - [c9]Shicheng Wan, Jiahui Chen, Peifeng Zhang, Wensheng Gan, Tianlong Gu:
Discovering Top-k Profitable Patterns for Smart Manufacturing. WWW (Companion Volume) 2022: 956-964 - [c8]Shicheng Wan, Jiahui Chen, Zhenlian Qi, Wensheng Gan, Linlin Tang:
Fast RFM Model for Customer Segmentation. WWW (Companion Volume) 2022: 965-972 - [i13]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Smart System: Joint Utility and Frequency for Pattern Classification. CoRR abs/2206.04269 (2022) - [i12]Shicheng Wan, Zhenqiang Ye, Wensheng Gan, Jiahui Chen:
Temporal Fuzzy Utility Maximization with Remaining Measure. CoRR abs/2208.12439 (2022) - [i11]Jiahui Chen, Yixin Xu, Shicheng Wan, Wensheng Gan, Jerry Chun-Wei Lin:
Itemset Utility Maximization with Correlation Measure. CoRR abs/2208.12551 (2022) - [i10]Jiahui Chen, Xu Guo, Wensheng Gan, Shicheng Wan, Philip S. Yu:
A Generic Algorithm for Top-K On-Shelf Utility Mining. CoRR abs/2208.14230 (2022) - [i9]Hong Lin, Shicheng Wan, Wensheng Gan, Jiahui Chen, Han-Chieh Chao:
Metaverse in Education: Vision, Opportunities, and Challenges. CoRR abs/2211.14951 (2022) - 2021
- [j13]Muchuang Hu, Jiahui Chen, Wensheng Gan, Chien-Ming Chen:
A jumping mining attack and solution. Appl. Intell. 51(3): 1367-1378 (2021) - [j12]Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen:
On the construction of a post-quantum blockchain for smart city. J. Inf. Secur. Appl. 58: 102780 (2021) - [j11]Jie Ling, Junwei Chen, Jiahui Chen, Wensheng Gan:
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating. Secur. Commun. Networks 2021: 6661450:1-6661450:13 (2021) - [j10]Chien-Ming Chen, Xiaoting Deng, Wensheng Gan, Jiahui Chen, SK Hafizul Islam:
A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8): 9046-9068 (2021) - [j9]Yuxin Zhong, Mi Zhou, Jiangnan Li, Jiahui Chen, Yan Liu, Yun Zhao, Muchuang Hu:
Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid. Wirel. Commun. Mob. Comput. 2021: 5560621:1-5560621:15 (2021) - [c7]Gengsen Huang, Wensheng Gan, Shan Huang, Jiahui Chen, Chien-Ming Chen:
NSPIS: Mining Negative Sequential Patterns with Individual Support. IEEE BigData 2021: 5507-5516 - [c6]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Joint Utility and Frequency for Pattern Classification. IEEE BigData 2021: 5524-5533 - [c5]Jinbao Miao, Shicheng Wan, Wensheng Gan, Jiayi Sun, Jiahui Chen:
Targeted High-Utility Itemset Querying. IEEE BigData 2021: 5534-5543 - [c4]Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen:
On the Construction of a Post-Quantum Blockchain. DSC 2021: 1-8 - [i8]Jiahui Chen, Shicheng Wan, Wensheng Gan, Guoting Chen, Hamido Fujita:
TOPIC: Top-k High-Utility Itemset Discovering. CoRR abs/2106.14811 (2021) - [i7]Shicheng Wan, Jiahui Chen, Wensheng Gan, Guoting Chen, Vikram Goyal:
THUE: Discovering Top-K High Utility Episodes. CoRR abs/2106.14830 (2021) - [i6]Shicheng Wan, Wensheng Gan, Xu Guo, Jiahui Chen, Unil Yun:
FUIM: Fuzzy Utility Itemset Mining. CoRR abs/2111.00307 (2021) - [i5]Jinbao Miao, Shicheng Wan, Wensheng Gan, Jiayi Sun, Jiahui Chen:
TargetUM: Targeted High-Utility Itemset Querying. CoRR abs/2111.00309 (2021) - [i4]Wensheng Gan, Lili Chen, Shicheng Wan, Jiahui Chen, Chien-Ming Chen:
Anomaly Rule Detection in Sequence Data. CoRR abs/2111.15026 (2021) - 2020
- [j8]Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Hamidreza Tavakoli, Sachin Kumar, Jiahui Chen:
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications. IEEE Access 8: 200851-200862 (2020) - [j7]Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j6]Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen:
A Novel Location Privacy-Preserving Approach Based on Blockchain. Sensors 20(12): 3519 (2020) - [j5]Jiahui Chen, Jianting Ning, Jie Ling, Terry Shue Chien Lau, Yacheng Wang:
A new encryption scheme for multivariate quadratic systems. Theor. Comput. Sci. 809: 372-383 (2020) - [c3]Jiahui Chen, Xu Guo, Wensheng Gan, Chien-Ming Chen, Weiping Ding, Guoting Chen:
OSUMI: On-Shelf Utility Mining from Itemset-based Data. IEEE BigData 2020: 5340-5349 - [c2]Wensheng Gan, Shicheng Wan, Jiahui Chen, Chien-Ming Chen, Lina Qiu:
TopHUI: Top-k high-utility itemset mining with negative utility. IEEE BigData 2020: 5350-5359 - [i3]Muchuang Hu, Jiahui Chen, Wensheng Gan, Chien-Ming Chen:
A Jumping Mining Attack and Solution. CoRR abs/2008.08184 (2020) - [i2]Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien-Ming Chen:
On the Construction of a Post-Quantum Blockchain for Smart City. CoRR abs/2012.15799 (2020)
2010 – 2019
- 2019
- [j4]Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. Comput. J. 62(8): 1132-1147 (2019) - [j3]Dan Gao, Jie Ling, Jiahui Chen:
基于可撤销外包属性加密的二维码加密 (Two-dimensional Code Encryption Based on Revocable Outsourced Attribute Encryption). 计算机科学 46(12): 186-191 (2019) - [c1]Jiahui Chen, Jie Ling, Jianting Ning, Zhiniang Peng, Yang Tan:
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature. Inscrypt 2019: 443-451 - 2017
- [j2]Jiahui Chen, Shaohua Tang, Xinglin Zhang:
HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere. KSII Trans. Internet Inf. Syst. 11(6): 3166-3187 (2017) - [j1]Jiahui Chen, Shaohua Tang, Daojing He, Yang Tan:
Online/offline signature based on UOV in wireless sensor networks. Wirel. Networks 23(6): 1719-1730 (2017) - 2013
- [i1]Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li:
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature. IACR Cryptol. ePrint Arch. 2013: 877 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint