


Остановите войну!
for scientists:
Liqun Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Liqun Chen 0001 — Duke University, Durham, NC, USA
- Liqun Chen 0002
— University of Surrey, Surrey Centre for Cyber Security, Guildford, UK (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Fuzheng Xiao, Liqun Chen:
Attitude Control of Spherical Liquid-Filled Spacecraft Based on High-Order Fully Actuated System Approaches. J. Syst. Sci. Complex. 35(2): 471-480 (2022) - [j15]Liqun Chen, Yi Chang
, Luxin Yan
:
On-Orbit Real-Time Variational Image Destriping: FPGA Architecture and Implementation. IEEE Trans. Geosci. Remote. Sens. 60: 1-12 (2022) - [j14]Liqun Chen
, Han-Xiong Li
, Shengli Xie
:
Modified High-Order SVD for Spatiotemporal Modeling of Distributed Parameter Systems. IEEE Trans. Ind. Electron. 69(4): 4296-4304 (2022) - [j13]Zhang Chen, Liqun Chen
, Wenjing Shen
, Kangkang Xu
:
Remaining Useful Life Prediction of Lithium-Ion Battery via a Sequence Decomposition and Deep Learning Integrated Approach. IEEE Trans. Veh. Technol. 71(2): 1466-1479 (2022) - [i29]Jinyu Yang, Jiali Duan, Son Tran, Yi Xu, Sampath Chanda, Liqun Chen, Belinda Zeng, Trishul Chilimbi, Junzhou Huang:
Vision-Language Pre-Training with Triple Contrastive Learning. CoRR abs/2202.10401 (2022) - [i28]Jiali Duan, Liqun Chen, Son Tran, Jinyu Yang, Yi Xu, Belinda Zeng, Trishul Chilimbi:
Multi-modal Alignment using Representation Codebook. CoRR abs/2203.00048 (2022) - [i27]Long Meng, Liqun Chen:
A Blockchain-based Long-term Time-Stamping Scheme. IACR Cryptol. ePrint Arch. 2022: 319 (2022) - 2021
- [j12]Jianneng Chen, Xianbing Bian, Liqun Chen, Tianlong Chen, Zhiwei Chen, Chennan Yu:
Design and testing of a production line mechanism for continuous cutting and coring of broccoli. Comput. Electron. Agric. 191: 106505 (2021) - [c3]Dianqi Li, Yizhe Zhang, Hao Peng, Liqun Chen, Chris Brockett, Ming-Ting Sun, Bill Dolan:
Contextualized Perturbation for Textual Adversarial Attack. NAACL-HLT 2021: 5053-5069 - [i26]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. CoRR abs/2102.03148 (2021) - [i25]Junya Chen, Zhe Gan, Xuan Li, Qing Guo, Liqun Chen, Shuyang Gao, Tagyoung Chung, Yi Xu, Belinda Zeng, Wenlian Lu, Fan Li, Lawrence Carin, Chenyang Tao:
Simpler, Faster, Stronger: Breaking The log-K Curse On Contrastive Learners With FlatNCE. CoRR abs/2107.01152 (2021) - [i24]Yanjie Wang, Xu Zou, Zhijun Zhang, Wenhui Xu, Liqun Chen, Sheng Zhong, Luxin Yan, Guodong Wang:
Learning Oriented Remote Sensing Object Detection via Naive Geometric Computing. CoRR abs/2112.00504 (2021) - [i23]Stephen Holmes, Liqun Chen:
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies. IACR Cryptol. ePrint Arch. 2021: 967 (2021) - [i22]Long Meng, Liqun Chen:
Analysis of Client-side Security for Long-term Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1411 (2021) - [i21]Long Meng, Liqun Chen:
Reviewing ISO/IEC Standard for Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1429 (2021) - [i20]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. IACR Cryptol. ePrint Arch. 2021: 1534 (2021) - [i19]Long Meng, Liqun Chen:
An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography. IACR Cryptol. ePrint Arch. 2021: 1606 (2021) - 2020
- [j11]Xi Jun Lin, Lin Sun, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen:
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model. Comput. J. 63(8): 1259-1262 (2020) - [j10]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [i18]Dianqi Li, Yizhe Zhang, Hao Peng, Liqun Chen, Chris Brockett, Ming-Ting Sun, Bill Dolan:
Contextualized Perturbation for Textual Adversarial Attack. CoRR abs/2009.07502 (2020)
2010 – 2019
- 2019
- [j9]Yang Zhang, Tianyuan Liu, Liqun Chen, Jinxurong Yang, Jiayi Yin, Yuncong Zhang, Zhixi Yun
, Hao Xu, Lin Ning, Feng-Biao Guo
, Yongshuai Jiang, Hao Lin, Dong Wang, Yan Huang, Jian Huang
:
RIscoper: a tool for RNA-RNA interaction extraction from the literature. Bioinform. 35(17): 3199-3202 (2019) - [j8]Haitao Li
, Hu Ding
, Liqun Chen:
Chaos Threshold of a Multistable Piezoelectric Energy Harvester Subjected to Wake-Galloping. Int. J. Bifurc. Chaos 29(12): 1950162:1-1950162:13 (2019) - [j7]Liqun Chen, Luxin Yan
, Hongshi Sang, Tianxu Zhang:
High-Throughput Architecture for Both Lossless and Near-lossless Compression Modes of LOCO-I Algorithm. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3754-3764 (2019) - 2018
- [e12]Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu:
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings. Lecture Notes in Computer Science 10631, Springer 2018, ISBN 978-3-319-89499-7 [contents] - [e11]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [e10]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - [i17]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - 2017
- [i16]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. IACR Cryptol. ePrint Arch. 2017: 485 (2017) - 2016
- [j6]Hongfei Wu
, Kai Sun, Liqun Chen, Lei Zhu, Yan Xing:
High Step-Up/Step-Down Soft-Switching Bidirectional DC-DC Converter With Coupled-Inductor and Voltage Matching Control for Energy Storage Systems. IEEE Trans. Ind. Electron. 63(5): 2892-2903 (2016) - [e9]Feng Bao, Liqun Chen, Robert H. Deng
, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - 2015
- [c2]Liqun Chen:
Keynote speaker 1: Global harmonization of cryptographic standards. WorldCIS 2015: 11 - [e8]Liqun Chen, Shin'ichiro Matsuo:
Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Lecture Notes in Computer Science 9497, Springer 2015, ISBN 978-3-319-27151-4 [contents] - [i15]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - 2014
- [b1]Graeme Proudler, Liqun Chen, Chris Dalton:
Trusted Computing Platforms - TPM2.0 in Context. Springer 2014, ISBN 978-3-319-08743-6, pp. 1-360 - 2013
- [i14]Changyu Dong, Liqun Chen, Zikai Wen:
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. IACR Cryptol. ePrint Arch. 2013: 515 (2013) - 2012
- [j5]Qishao Lu, Liqun Chen, Marian Wiercigroch
:
Editorial. Int. J. Bifurc. Chaos 22(5) (2012) - [j4]Liqun Chen, Jiangtao Li:
VLR group signatures with indisputable exculpability and efficient revocation. Int. J. Inf. Priv. Secur. Integr. 1(2/3): 129-159 (2012) - [e7]Liqun Chen, Moti Yung, Liehuang Zhu:
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7222, Springer 2012, ISBN 978-3-642-32297-6 [contents] - [i13]Liqun Chen:
Ring Group Signatures. IACR Cryptol. ePrint Arch. 2012: 289 (2012) - [i12]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. IACR Cryptol. ePrint Arch. 2012: 397 (2012) - [i11]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptol. ePrint Arch. 2012: 650 (2012) - 2011
- [e6]Liqun Chen:
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. Lecture Notes in Computer Science 7089, Springer 2011, ISBN 978-3-642-25515-1 [contents] - [e5]Liqun Chen, Moti Yung:
Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6802, Springer 2011, ISBN 978-3-642-25282-2 [contents] - [i10]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptol. ePrint Arch. 2011: 90 (2011) - [i9]Liqun Chen, Yu Chen:
The n-Diffie-Hellman Problem and its Applications. IACR Cryptol. ePrint Arch. 2011: 397 (2011) - [i8]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 593 (2011) - 2010
- [e4]Liqun Chen, Moti Yung:
Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6163, Springer 2010, ISBN 978-3-642-14596-4 [contents] - [i7]Liqun Chen:
A DAA Scheme Requiring Less TPM Resources. IACR Cryptol. ePrint Arch. 2010: 8 (2010)
2000 – 2009
- 2009
- [i6]Liqun Chen, Dan Page, Nigel P. Smart:
On the Design and Implementation of an Efficient DAA Scheme. IACR Cryptol. ePrint Arch. 2009: 598 (2009) - 2008
- [j3]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [j2]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. Univers. Comput. Sci. 14(3): 416-440 (2008) - [e3]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [e2]Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2 [contents] - [e1]Liqun Chen, Yi Mu, Willy Susilo
:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4 [contents] - [i5]Ernie Brickell, Liqun Chen, Jiangtao Li:
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings. IACR Cryptol. ePrint Arch. 2008: 104 (2008) - 2007
- [i4]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i3]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i2]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2007: 209 (2007) - 2006
- [j1]James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang:
Application of full-system simulation in exploratory system design and development. IBM J. Res. Dev. 50(2-3): 321-332 (2006) - 2005
- [i1]Qiang Tang, Liqun Chen:
Weaknesses in two group Diffie-Hellman key exchange protocols. IACR Cryptol. ePrint Arch. 2005: 197 (2005) - 2000
- [c1]Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler:
Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-04-29 22:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint