Follow
Jiageng Chen
Jiageng Chen
Verified email at ccnu.edu.cn
Title
Cited by
Cited by
Year
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
542018
Security analysis and new models on the intelligent symmetric key encryption
L Zhou, J Chen, Y Zhang, C Su, MA James
Computers & Security 80, 14-24, 2019
342019
Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data
K Liang, C Su, J Chen, JK Liu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
312016
Detection and classification of malicious patterns in network traffic using Benford's law
L Sun, TS Anthony, HZ Xia, J Chen, X Huang, Y Zhang
2017 Asia-Pacific Signal and Information Processing Association Annual …, 2017
292017
Related-key boomerang attacks on KATAN32/48/64
T Isobe, Y Sasaki, J Chen
Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013
282013
An efficient blind filter: Location privacy protection and the access control in FinTech
Z Li, W Li, QY Wen, J Chen, W Yin, K Liang
Future generation computer systems 100, 797-810, 2019
222019
Efficient encrypted data search with expressive queries and flexible update
J Ning, J Chen, K Liang, JK Liu, C Su, Q Wu
IEEE transactions on services computing 15 (3), 1619-1633, 2020
212020
Security, privacy, and trust on internet of things
C Kolias, W Meng, G Kambourakis, J Chen
Wireless Communications and Mobile Computing 2019, 2019
212019
User location privacy protection mechanism for location-based services
Y He, J Chen
Digital communications and networks 7 (2), 264-276, 2021
202021
Lightweight block cipher security evaluation based on machine learning classifiers and active S-boxes
TR Lee, JS Teh, N Jamil, JLS Yan, J Chen
IEEE Access 9, 134052-134064, 2021
192021
Towards accurate statistical analysis of security margins: New searching strategies for differential attacks
J Chen, J Teh, Z Liu, C Su, A Samsudin, Y Xiang
IEEE Transactions on Computers 66 (10), 1763-1777, 2017
192017
Improved lightweight pseudo-random number generators for the low-cost rfid tags
J Chen, A Miyaj, H Sato, C Su
2015 IEEE Trustcom/BigDataSE/ISPA 1, 17-24, 2015
182015
How to find short RC4 colliding key pairs
J Chen, A Miyaji
International Conference on Information Security, 32-46, 2011
172011
ElearnChain: a privacy-preserving consortium blockchain system for e-learning educational records
H An, J Chen
Journal of Information Security and Applications 63, 103013, 2021
162021
Encryption switching service: Securely switch your encrypted data to another format
P Jiang, J Ning, K Liang, C Dong, J Chen, Z Cao
IEEE Transactions on Services Computing 14 (5), 1357-1369, 2018
162018
Differential cryptanalysis and boomerang cryptanalysis of LBlock
J Chen, A Miyaji
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
162013
A new practical key recovery attack on the stream cipher RC4 under related-key model
J Chen, A Miyaji
Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011
162011
Generalized RC4 key collisions and hash collisions
J Chen, A Miyaji
International Conference on Security and Cryptography for Networks, 73-87, 2010
122010
Efficient implementation of lightweight block ciphers on volta and pascal architecture
P Li, S Zhou, B Ren, S Tang, T Li, C Xu, J Chen
Journal of Information Security and Applications 47, 235-245, 2019
112019
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators
JS Teh, W Teng, A Samsudin, J Chen
Frontiers of Computer Science 14, 1-11, 2020
102020
The system can't perform the operation now. Try again later.
Articles 1–20