Follow
Liqun Chen
Liqun Chen
Professor, University of Surrey, UK
Verified email at surrey.ac.uk - Homepage
Title
Cited by
Cited by
Year
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13822004
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6, 213-241, 2007
6082007
When private set intersection meets big data: an efficient and scalable protocol
C Dong, L Chen, Z Wen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4942013
Identity based authenticated key agreement protocols from pairings
L Chen, C Kudla
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 219-233, 2003
4782003
Improved identity-based signcryption
L Chen, J Malone-Lee
International workshop on public key cryptography, 362-379, 2005
4252005
A protocol for property-based attestation
L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble
Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006
3002006
Alice: Towards understanding adversarial learning for joint distribution matching
C Li, H Liu, C Chen, Y Pu, L Chen, R Henao, L Carin
Advances in neural information processing systems 30, 2017
2812017
Vision-language pre-training with triple contrastive learning
J Yang, J Duan, S Tran, Y Xu, S Chanda, L Chen, B Zeng, T Chilimbi, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
2722022
Contextualized perturbation for textual adversarial attack
D Li, Y Zhang, H Peng, L Chen, C Brockett, MT Sun, B Dolan
arXiv preprint arXiv:2009.07502, 2020
2262020
Concurrent signatures
L Chen, C Kudla, KG Paterson
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
2222004
Applications of multiple trust authorities in pairing based cryptosystems
L Chen, K Harrison, D Soldera, NP Smart
International Conference on Infrastructure Security, 260-275, 2002
2162002
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
IMA International conference on cryptography and coding, 442-459, 2005
1912005
Trusted system
SL Pearson, L Chen
US Patent 7,275,160, 2007
1902007
Graph optimal transport for cross-domain alignment
L Chen, Z Gan, Y Cheng, L Li, L Carin, J Liu
International Conference on Machine Learning, 1542-1553, 2020
1802020
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on selected areas in communications 29 (3), 605-615, 2011
1752011
Adversarial text generation via feature-mover's distance
L Chen, S Dai, C Tao, H Zhang, Z Gan, D Shen, Y Zhang, G Wang, ...
Advances in neural information processing systems 31, 2018
1682018
Triangle generative adversarial networks
Z Gan, L Chen, W Wang, Y Pu, Y Zhang, H Liu, C Li, L Carin
Advances in neural information processing systems 30, 2017
1592017
A new direct anonymous attestation scheme from bilinear maps
E Brickell, L Chen, J Li
Trusted Computing-Challenges and Applications: First International …, 2008
1562008
Electronic commerce system
L Chen, B Balacheff, R Du Toit, SL Pearson, D Chan
US Patent 7,096,204, 2006
1512006
Public-key encryption with registered keyword search
Q Tang, L Chen
European public key infrastructure workshop, 163-178, 2009
1492009
The system can't perform the operation now. Try again later.
Articles 1–20