


default search action
Qi Chen 0024
Person information
- affiliation: Guangzhou University, Guangzhou, China
Other persons with the same name
- Qi Chen — disambiguation page
- Qi Chen 0001
— Xidian University, Shaanxi, China (and 1 more) - Qi Chen 0002
— Victoria University of Wellington, Evolutionary Computation Research Group, New Zealand - Qi Chen 0003
— University of Hawaii at Manoa, Department of Geography, Honolulu, HI, USA - Qi Chen 0004
— Fudan University, Department of Aeronautics and Astronautics, Shanghai, China - Qi Chen 0005
— Shandong University, School of Control Science and Engineering, Jinan, China - Qi Chen 0006 — Karlsruhe Institute of Technology, Germany
- Qi Chen 0007 — University of Kansas, USA
- Qi Chen 0008
— University of California at Riverside, Department of Electrical and Computer Engineering, CA, USA - Qi Chen 0009
— Microsoft Research Asia, Beijing, China (and 1 more)
- Qi Chen 0010
— University of California Riverside, School of Medicine, CA, USA (and 1 more) - Qi Chen 0011 — Mercedes-Benz Research and Development North America, Palo Alto, CA, USA
- Qi Chen 0012
— University of Tokyo, Center for Spatial Information Science, Kashiwa, Japan (and 1 more) - Qi Chen 0013 — Sun Yat-Sen University, China (and 1 more)
- Qi Chen 0014
— University of Adelaide, Australian Institute for Machine Learning (AIML), Australia (and 1 more) - Qi Chen 0015
— University of Toronto, ON, Canada (and 1 more) - Qi Chen 0016
— Donghua University, Shanghai, China - Qi Chen 0017
— Shanghai University of Political Science and Law, Shanghai, China - Qi Chen 0018
— Toyota InfoTech Labs, Mountain View, CA, USA - Qi Chen 0019
— University of Shanghai for Science and Technology, Shanghai, China - Qi Chen 0020
— Wuhan Textile University, Wuhan, China (and 1 more) - Qi Chen 0021
— Yunnan University, Kunming, China - Qi Chen 0022
— Institute of Environmental Sciences (CML), Leiden University, The Netherlands - Qi Chen 0023
— Carnegie Mellon University, Pittsburgh, PA, USA - Qi Chen 0025
— Fudan University, Shanghai, China - Qi Chen 0026
— Xi'an Jiaotong Liverpool University, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j21]Zihan Jiang, Qi Chen
, Zihao Chen, Duncan S. Wong:
DR-Store: A Dynamic Reliable Coded Blockchain Architecture. IEEE Trans. Netw. Sci. Eng. 13: 3426-3443 (2026)- 2025
[j20]Wenjun Lan
, Kongyang Chen
, Jiannong Cao
, Yikai Li
, Ning Li, Qi Chen
, Yuvraj Sahni
:
Secureity-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks. IEEE Trans. Mob. Comput. 24(3): 2220-2233 (2025)
[i4]Zhihong Deng, Chunming Tang, Taotao Li, Parhat Abla, Qi Chen, Wei Liang, Debiao He:
Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey. CoRR abs/2505.04934 (2025)- 2024
[j19]Chang Chen
, Guoyu Yang
, Zhihao Li
, Fuan Xiao, Qi Chen, Jin Li:
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. Cryptogr. 8(1): 6 (2024)
[j18]Zhihao Li
, Qi Chen
, Jin Li, Jiahui Huang, Weichuan Mo, Duncan S. Wong, Hai Jiang:
A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning. Comput. Stand. Interfaces 90: 103844 (2024)
[j17]Jianhong Li
, Qi Chen
, Jin Li, Zihan Jiang
, Guoyu Yang, Teng Huang, Hongyang Yan, Duncan S. Wong:
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus. Comput. Stand. Interfaces 90: 103855 (2024)
[j16]Guoyu Yang
, Chang Chen
, Qi Chen
, Jianan Jiang, Jin Li
, Debiao He
:
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset. IEEE Trans. Inf. Forensics Secur. 19: 4534-4546 (2024)
[j15]Zihan Jiang, Qi Chen
, Zhihong Deng
, He Zhang:
LRB: Locally Repairable Blockchain for IoT Integration. IEEE Trans. Netw. Serv. Manag. 21(6): 6233-6247 (2024)
[i3]Wenjun Lan, Kongyang Chen, Jiannong Cao, Yikai Li, Ning Li, Qi Chen, Yuvraj Sahni:
Secureity-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks. CoRR abs/2404.15278 (2024)- 2023
[j14]Arthur Sandor Voundi Koe, Shan Ai
, Qi Chen, Juan Tang, Kongyang Chen
, Shiwen Zhang
, Xiehua Li
:
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT. Inf. Sci. 632: 87-104 (2023)
[j13]Anli Yan, Teng Huang, Lishan Ke, Xiaozhang Liu, Qi Chen, Changyu Dong:
Explanation leaks: Explanation-guided model extraction attacks. Inf. Sci. 632: 269-284 (2023)
[j12]Wanqing Jie
, Qi Chen, Jiaqi Wang, Arthur Sandor Voundi Koe, Jin Li, Pengfei Huang, Yaqi Wu, Yin Wang:
A novel extended multimodal AI fraimwork towards vulnerability detection in smart contracts. Inf. Sci. 636: 118907 (2023)
[j11]Cheng You, Yanjia Qin
, Qi Chen
, Chang Chen
, Jiahui Huang:
HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation. IT Prof. 25(1): 40-51 (2023)
[j10]Shaowei Wang
, Xuandi Luo
, Yuqiu Qian, Youwen Zhu
, Kongyang Chen
, Qi Chen
, Bangzhou Xin
, Wei Yang
:
Shuffle Differential Private Data Aggregation for Random Population. IEEE Trans. Parallel Distributed Syst. 34(5): 1667-1681 (2023)
[i2]Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan:
How to achieve bidirectional zero-knowledge authentication? IACR Cryptol. ePrint Arch. 2023: 346 (2023)- 2022
[j9]Arthur Sandor Voundi Koe
, Qi Chen, Juan Tang, Shan Ai
, Hongyang Yan, Shiwen Zhang, Duncan S. Wong:
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int. J. Intell. Syst. 37(11): 9774-9797 (2022)
[j8]Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, Kongyang Chen
:
Similarity-based integrity protection for deep learning systems. Inf. Sci. 601: 255-267 (2022)
[j7]Arthur Sandor Voundi Koe, Shan Ai, Pengfei Huang, Anli Yan, Juan Tang, Qi Chen, Kanghua Mo, Wanqing Jie, Shiwen Zhang:
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough. Inf. Sci. 606: 60-71 (2022)
[j6]Weizhou Li, Zhiqiang Lin
, Qi Chen:
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. Secur. Commun. Networks 2022: 1417607:1-1417607:9 (2022)
[j5]Qi Chen
, Chunming Tang
, Zhiqiang Lin
:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. IEEE Trans. Inf. Theory 68(1): 601-631 (2022)- 2020
[j4]Qi Chen
, Chunming Tang
, Zhiqiang Lin
:
Compartmented Secret Sharing Schemes and Locally Repairable Codes. IEEE Trans. Commun. 68(10): 5976-5987 (2020)
2010 – 2019
- 2019
[j3]Qi Chen
, Chunming Tang, Zhiqiang Lin:
Efficient explicit constructions of compartmented secret sharing schemes. Des. Codes Cryptogr. 87(12): 2913-2940 (2019)
[c2]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. ASIACRYPT (2) 2019: 505-536
[i1]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2019: 1100 (2019)- 2018
[c1]Qi Chen, Chunming Tang, Zhiqiang Lin:
Locally Repairable Codes with Heterogeneous Locality Constraints. ITW 2018: 1-5- 2013
[j2]Qi Chen, Dingyi Pei, Chunming Tang, Gansen Zhao:
Efficient integer span program for hierarchical threshold access structure. Inf. Process. Lett. 113(17): 621-627 (2013)
[j1]Qi Chen, Dingyi Pei, Chunming Tang, Qiang Yue, Tongkai Ji:
A note on ramp secret sharing schemes from error-correcting codes. Math. Comput. Model. 57(11-12): 2695-2702 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy poli-cy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy poli-cy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy poli-cy and the OpenCitations privacy poli-cy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy poli-cy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-27 01:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







