陈飞
近期热点
资料介绍
个人简历
陈飞,博士,2008、2011、2014 年分别于重庆大学计算机学院、重庆大学计算机学院、香港中文大学计算机科学与工程系获学士、硕士、博士学位。2009、2013、2014年分别于中国科学院信息安全国家重点实验室、阿里巴巴集团数据库团队、维也纳理工大学,做访问研究。主要从事数据保护与隐私,及网络与信息安全方向研究工作。工作得到了国家自然科学基金、深圳市基础研究计划、CCF-启明星辰“鸿雁”科研基金、微众银行-深圳大学金融科技研究院项目等科研项目的资助研究领域
数据保护与隐私,及网络与信息安全"项目资助:国家自然科学基金,面上项目(2019 - 2022),青年基金(2016 - 2018)深圳市基础研究计划(2019 - 2020,2016 - 2018)微众银行(2019)CCF - 启明星辰“鸿雁”科研基金(2017)"近期论文
Fei Chen, Donghong Wang, Qiuzhen Lin, Jianyong Chen, Ming Zhong, Wei Yu, Jing Qin. Towards Dynamic Verifiable Pattern Matching. IEEE Transactions on Big Data, doi: 10.1109/TBDATA.2018.2868657, 2018.Fei Chen, Donghong Wang, Ronghua Li, Jianyong Chen, Zhong Ming, Alex X. Liu, Huayi Duan, Cong Wang, and Jing Qin. Secure Hashing Based Verifiable Pattern Matching. IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2677-2690, 2018.Fei Chen, Tao Xiang, Xinwen Fu, and Wei Yu. User Differentiated Verifiable File Search on the Cloud. IEEE Transactions on Services Computing, vol. 11, no. 6, pp. 948 – 961, 2018.Fei Chen, Tao Xiang, Yuanyuan Yang, and Sherman S. M. Chow. Secure Cloud Storage Meets with Secure Network Coding. IEEE Transactions on Computers, vol. 65, no. 6, pp. 1936-1948, 2016.Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, and Shengyu Zhang. Secure Cloud Storage Hits Distributed String Equality Checking: More Efficient, Conceptually Simpler, and Provably Secure. In Proc. of IEEE INFOCOM, 2015.Fei Chen, Tao Xiang, Xinyu Lei, and Jianyong Chen. Highly Efficient Linear Regression Outsourcing to a Cloud. IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 499 – 508, 2014.Fei Chen, Kwok-wo Wong, Xiaofeng Liao, and Tao Xiang. Period Distribution of Generalized Discrete Arnold Cat Map for N=2^e. IEEE Transactions on Information Theory, vol. 59, no. 5, pp. 3249-3255, 2013.Fei Chen, Kwok-wo Wong, Xiaofeng Liao, and Tao Xiang. Period Distribution of Generalized Discrete Arnold Cat Map for N=p^e. IEEE Transactions on Information Theory, vol. 58, no. 1, pp. 445-452, 2012.Fei Chen, Xiaofeng Liao, Tao Xiang, and Hongying Zheng. Security analysis of public key algorithms based on Chebyshev polynomials over the integer ring Z_N. Information Sciences, vol. 181, no. 22, 2011.Xiaofeng Liao, Fei Chen, and Kwo-kwo Wong. On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field Z_N. IEEE Transactions on Computers, vol. 59, no. 10, pp.1392-1401, 2010. 相关热点
最新收录
- 千奈美(ちなみん) 06-25
- 皆川琉衣(皆川るい) 06-25
- 凪光(凪ひかる) 06-25
- 织本濑里乃(織本せりの 06-25
- 冈本莉里 岡本莉里 (おか 06-25
- 凯蒂·佩里(水果姐) 06-25
- 吉高宁宁(吉高寧々 Nene 06-25
- 水咲优美(水咲優美) 06-25
- 三月光(三月ひかる) 06-21
- 澪川遥(澪川はるか) 06-21