Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Wissem Soussi
Ren Changjiang
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Daewon Sun
Radu Timofte
Home
/
Author
/
CHEN YUAN
Author Info
Open Visualization
Name
Affiliation
Papers
CHEN YUAN
Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
35
Collaborators
Citations
PageRank
58
27
12.30
Referers
Referees
References
67
215
104
Search Limit
100
215
Publications (35 rows)
Collaborators (58 rows)
Referers (67 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
More Efficient Dishonest Majority Secure Computation over ℤ 2 k via Galois Rings.
0
0.34
2022
A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity
2
0.36
2021
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over $\mathbb {Z}/p^k\mathbb {Z} $.
0
0.34
2020
Graph Computing-Based WLS Fast Decoupled State Estimation
0
0.34
2020
Asymptotic Gilbert-Varshamov Bound on Frequency Hopping Sequences.
0
0.34
2020
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
0
0.34
2020
A Novel Graph-Based Energy Management System
0
0.34
2020
Substation One-Line Diagram Automatic Generation and Visualization.
0
0.34
2019
Towards optimal robust secret sharing with security against a rushing adversary.
0
0.34
2019
An Optimal Travel Route Recommendation System for Tourists' First Visit to Japan.
0
0.34
2019
pH Watch - Leveraging Pulse Oximeters in Existing Wearables for Reusable, Real-time Monitoring of pH in Sweat
0
0.34
2019
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority.
0
0.34
2019
Enabling Model-Based Lti For Large-Scale Power System Security Monitoring And Enhancement With Graph-Computing-Based Power Flow Calculation
0
0.34
2019
On the Complexity of Arithmetic Secret Sharing.
0
0.34
2019
Graph Computing based Distributed Fast Decoupled Power Flow Analysis.
0
0.34
2019
Robust Secret Sharing with Optimal Share Size and Security Against Rushing Adversaries.
0
0.34
2019
Exploration of Bi-Level PageRank Algorithm for Power Flow Analysis Using Graph Database
0
0.34
2018
Amortized Complexity of Information-Theoretically Secure MPC Revisited.
0
0.34
2018
A Multi-Dimensional Hyperspectral Image Mosaic Method and its Acquisition System.
0
0.34
2018
List Decoding of Cover Metric Codes Up to the Singleton Bound.
0
0.34
2018
Construction of optimal locally recoverable codes and connection with hypergraph.
1
0.35
2018
List Decodability of Symbol-Pair Codes.
1
0.35
2018
Power Flow Analysis Using Graph Based Combination Of Iterative Methods And Vertex Contraction Approach
0
0.34
2018
How Long Can Optimal Locally Repairable Codes Be
5
0.42
2018
Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes
10
0.52
2018
Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic.
0
0.34
2018
Subspace Designs based on Algebraic Function Fields.
1
0.35
2017
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet.
1
0.35
2017
List Decodability of Random Subcodes of Gabidulin Codes.
2
0.41
2017
Linear Tail-Biting Trellis and Its Sectionalization.
0
0.34
2017
Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity.
3
0.38
2017
Tunable, a VR reconstruction of "Listening to a Guqin" from emperor Zhao Ji.
0
0.34
2016
On Multi-Point Local Decoding of Reed-Muller Codes.
1
0.36
2016
Multipartite Entangled States, Symmetric Matrices, and Error-Correcting Codes
0
0.34
2015
A new class of rank-metric codes and their list decoding beyond the unique decoding radius.
0
0.34
2015
1