Follow
Liqun Chen
Liqun Chen
Professor, University of Surrey, UK
Verified email at surrey.ac.uk - Homepage
Title
Cited by
Cited by
Year
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13552004
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6, 213-241, 2007
6062007
Identity based authenticated key agreement protocols from pairings
L Chen, C Kudla
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 219-233, 2003
4752003
When private set intersection meets big data: an efficient and scalable protocol
C Dong, L Chen, Z Wen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4402013
Improved identity-based signcryption
L Chen, J Malone-Lee
International workshop on public key cryptography, 362-379, 2005
4182005
A protocol for property-based attestation
L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble
Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006
2972006
Alice: Towards understanding adversarial learning for joint distribution matching
C Li, H Liu, C Chen, Y Pu, L Chen, R Henao, L Carin
Advances in neural information processing systems 30, 2017
2672017
Concurrent signatures
L Chen, C Kudla, KG Paterson
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
2202004
Applications of multiple trust authorities in pairing based cryptosystems
L Chen, K Harrison, D Soldera, NP Smart
International Conference on Infrastructure Security, 260-275, 2002
2122002
Vision-language pre-training with triple contrastive learning
J Yang, J Duan, S Tran, Y Xu, S Chanda, L Chen, B Zeng, T Chilimbi, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1842022
Trusted system
SL Pearson, L Chen
US Patent 7,275,160, 2007
1842007
Contextualized perturbation for textual adversarial attack
D Li, Y Zhang, H Peng, L Chen, C Brockett, MT Sun, B Dolan
arXiv preprint arXiv:2009.07502, 2020
1772020
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
IMA International conference on cryptography and coding, 442-459, 2005
1772005
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on selected areas in communications 29 (3), 605-615, 2011
1662011
Adversarial text generation via feature-mover's distance
L Chen, S Dai, C Tao, H Zhang, Z Gan, D Shen, Y Zhang, G Wang, ...
Advances in Neural Information Processing Systems 31, 2018
1562018
Triangle generative adversarial networks
Z Gan, L Chen, W Wang, Y Pu, Y Zhang, H Liu, C Li, L Carin
Advances in neural information processing systems 30, 2017
1562017
A new direct anonymous attestation scheme from bilinear maps
E Brickell, L Chen, J Li
Trusted Computing-Challenges and Applications: First International …, 2008
1512008
Electronic commerce system
L Chen, B Balacheff, R Du Toit, SL Pearson, D Chan
US Patent 7,096,204, 2006
1482006
Comments on the S/KEY user authentication scheme
CJ Mitchell, L Chen
ACM SIGOPS Operating Systems Review 30 (4), 12-16, 1996
1441996
Public-key encryption with registered keyword search
Q Tang, L Chen
European public key infrastructure workshop, 163-178, 2009
1422009
The system can't perform the operation now. Try again later.
Articles 1–20