default search action
Zhide Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Zhanhong Ou, Jieyun Bai, Zhide Chen, Yaosheng Lu, Huijin Wang, Shun Long, Gaowen Chen:
RTSeg-net: A lightweight network for real-time segmentation of fetal head and pubic symphysis from intrapartum ultrasound images. Comput. Biol. Medicine 175: 108501 (2024) - [j23]Huiqing Wang, Yongrong Huang, Zhide Chen, Xu Yang, Xun Yi, Hai Dong, Xuechao Yang:
Estimation of realized volatility of cryptocurrencies using CEEMDAN-RF-LSTM. Future Gener. Comput. Syst. 158: 219-229 (2024) - [j22]Yongrong Huang, Huiqing Wang, Zhide Chen, Chen Feng, Kexin Zhu, Xu Yang, Wencheng Yang:
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model. IEEE Open J. Comput. Soc. 5: 83-94 (2024) - 2023
- [j21]Jiaxu Zhao, Binting Su, Xuli Rao, Zhide Chen:
A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network. Future Internet 15(1): 13 (2023) - [j20]Lin Shaodan, Kexin Zhu, Chen Feng, Zhide Chen:
Align-Yolact: a one-stage semantic segmentation network for real-time object detection. J. Ambient Intell. Humaniz. Comput. 14(2): 863-870 (2023) - 2021
- [j19]Yuting Zuo, Zhaozhe Kang, Jian Xu, Zhide Chen:
BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int. J. Distributed Sens. Networks 17(3): 155014772199961 (2021) - [j18]Xuli Rao, Feng Lin, Zhide Chen, Jiaxu Zhao:
Distracted driving recognition method based on deep convolutional neural network. J. Ambient Intell. Humaniz. Comput. 12(1): 193-200 (2021)
2010 – 2019
- 2019
- [j17]Xuli Rao, Jiaxu Zhao, Zhide Chen, Feng Lin:
Substitute Seed Nodes Mining Algorithms for Influence Maximization in Multi-Social Networks. Future Internet 11(5): 112 (2019) - [j16]Lin Shaodan, Feng Chen, Zhide Chen:
A Ship Target Location and Mask Generation Algorithms Base on Mask RCNN. Int. J. Comput. Intell. Syst. 12(2): 1134-1143 (2019) - 2018
- [j15]Feng Wang, Li Xu, Huaqun Wang, Zhide Chen:
Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69: 521-533 (2018) - 2016
- [j14]Zhide Chen, Meng Wang, Li Xu, Wei Wu:
Worm propagation model in mobile network. Concurr. Comput. Pract. Exp. 28(4): 1134-1144 (2016) - [j13]YaLi Zeng, Zhide Chen, Xu Yang:
Self-healing and energy-efficient restoration in machine-to-machine networks. IET Commun. 10(7): 805-811 (2016) - [j12]Zhiqiang Ruan, Haibo Luo, Zhide Chen:
Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks. Int. J. Commun. Syst. 29(5): 992-1011 (2016) - [j11]Zhide Chen, Jiyun Wu, Aniello Castiglione, Wei Wu:
Human continuous activity recognition based on energy-efficient schemes considering cloud security technology. Secur. Commun. Networks 9(16): 3585-3601 (2016) - [j10]YaLi Zeng, Li Xu, Zhide Chen:
Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks. Sensors 16(1): 3 (2016) - 2015
- [j9]Jiyun Wu, Zhide Chen:
An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors. Int. J. Distributed Sens. Networks 11: 470274:1-470274:16 (2015) - [j8]Jinhua Ma, Zhide Chen, Wei Wu, Rongjun Zheng, Jianghua Liu:
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies. Inf. 6(3): 536-549 (2015) - [j7]Jinhua Ma, Zhide Chen, Jianghua Liu, Rongjun Zheng:
Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network. Inf. 6(4): 613-632 (2015) - [c21]Jiaxu Zhao, Zhide Chen, YaLi Zeng:
Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance. CSCloud 2015: 204-212 - 2014
- [j6]Zhide Chen, Cheng Qiao, Li Xu, Wei Wu:
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory. Concurr. Comput. Pract. Exp. 26(5): 1130-1141 (2014) - [j5]Meng Wang, Zhide Chen, Li Xu, Huan Zhan:
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism. J. Appl. Math. 2014: 746803:1-746803:14 (2014) - [j4]Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu:
Dynamics stability in wireless sensor networks active defense model. J. Comput. Syst. Sci. 80(8): 1534-1548 (2014) - [c20]Lei Wang, Zhide Chen:
Optimal aggregation platform mechanism for mobile App auction. ICAILP 2014: 578-583 - [c19]Lei Wang, Yong Zhang, Zhide Chen, Li Ning, Cheng Qiao:
Dominant Bidding Strategy in Mobile App Advertising Auction. ICEBE 2014: 26-30 - 2013
- [j3]Zhide Chen, YaLi Zeng:
Random Access Control for M2M in LTE System. Int. J. Distributed Sens. Networks 9 (2013) - [j2]Zhide Chen, Yanqing Zeng, Li Xu:
A Supermodular Game Framework for Power Control of Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2011
- [j1]Zhide Chen, Yihui Qiu, Jingjing Liu, Li Xu:
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Comput. Math. Appl. 62(9): 3378-3388 (2011) - 2010
- [c18]Yilian Zhang, Zhide Chen, Fuchun Guo:
Online/Offline Verification of Short Signatures. Inscrypt 2010: 350-358 - [c17]Zhide Chen, Li Xu:
Service Price Discrimination in Wireless Network. CSE 2010: 34-41 - [c16]Youqin Chen, Zhide Chen, Li Xu:
RFID System Security Using Identity-Based Cryptography. IITSI 2010: 460-464 - [c15]Yilian Zhang, Zhide Chen, Li Xu:
How to Construct a Divisible Online/Offline Signature. IITSI 2010: 562-566
2000 – 2009
- 2008
- [c14]Fuchun Guo, Yi Mu, Zhide Chen:
Identity-Based Online/Offline Encryption. Financial Cryptography 2008: 247-261 - [c13]Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo:
Hierarchical Identity-Based Online/Offline Encryption. ICYCS 2008: 2115-2119 - [c12]Zhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo:
On the Security of WAI Protocol in the Third Version of WAPI. IIH-MSP 2008: 516-519 - [c11]Fuchun Guo, Yi Mu, Zhide Chen:
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. IWSEC 2008: 49-63 - 2007
- [c10]Fuchun Guo, Yi Mu, Zhide Chen:
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. CANS 2007: 1-14 - [c9]Fuchun Guo, Yi Mu, Zhide Chen, Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles. Inscrypt 2007: 384-398 - [c8]Zhongsheng Wu, Zhide Chen, Li Xu, Fuchun Guo:
Routing Protocols Based on Double Auction for Ad Hoc Networks. IEEE NAS 2007: 55-61 - [c7]Fuchun Guo, Yi Mu, Zhide Chen:
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Pairing 2007: 392-406 - [c6]Zhongsheng Wu, Zhide Chen, Fuchun Guo, Li Xu:
Identity Based Private Matching. SECPerU 2007: 85-90 - [c5]Zhongren Liu, Li Xu, Zhide Chen, Fuchun Guo:
Private Key Management in Hierarchical Identity-Based Encryption. SITIS 2007: 206-212 - 2006
- [c4]Zhide Chen, Li Xu:
Anti-Collusion Anonymous Credentials Scheme. CIT 2006: 150 - [c3]Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang:
Secure and Efficient Trust Negotiation. CIS 2006: 374-384 - 2004
- [c2]Zhide Chen, Hong Zhu:
General Public Key m-Out-of-n Oblivious Transfer. CIS 2004: 888-894 - [c1]Zhide Chen, Hong Zhu:
Quantum m-out-of-n oblivious transfer. ISCC 2004: 375-380 - 2003
- [i1]Zhide Chen, Hong Zhu:
Quantum m-out-of-n Oblivious Transfer. CoRR cs.CR/0311039 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint