publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2023

  1. Quantum Heavy-tailed Bandits
    Yulian Wu, Chaowen Guan, Vaneet Aggarwal, and 1 more author
    arXiv preprint arXiv:2301.09680, 2023

2020

  1. Investigating Quantum Computing via Algebraic and Logical Tools
    Chaowen Guan
    State University of New York at Buffalo, 2020
  2. Estimating stochastic linear combination of non-linear regressions efficiently and scalably
    Di Wang, Xiangyu Guo, Chaowen Guan, and 2 more authors
    Neurocomputing, 2020
  3. Estimating Stochastic Linear Combination of Non-Linear Regressions
    Di Wang, Xiangyu Guo, Chaowen Guan, and 2 more authors
    In Proceedings of the AAAI Conference on Artificial Intelligence, 2020
  4. A New Graph Polynomial and Generalized Tutte–Grothendieck Invariant from Quantum Circuits
    Chaowen Guan, and Kenneth Regan
    In Advanced Computing and Systems for Security: Volume Eleven, 2020

2019

  1. Stabilizer circuits, quadratic forms, and computing matrix rank
    Chaowen Guan, and Kenneth Regan
    arXiv preprint arXiv:1904.00101, 2019

2018

  1. Algebraic and logical emulations of quantum circuits
    Kenneth Regan, Amlan Chakrabarti, and Chaowen Guan
    Transactions on Computational Science XXXI: Special Issue on Signal Processing and Security in Distributed Systems, 2018
  2. Middlebox-based packet-level redundancy elimination over encrypted network traffic
    Jingyuan Fan, Chaowen Guan, Kui Ren, and 1 more author
    IEEE/ACM Transactions on Networking, 2018

2017

  1. Spabox: Safeguarding privacy during deep packet inspection at a middlebox
    Jingyuan Fan, Chaowen Guan, Kui Ren, and 2 more authors
    IEEE/ACM Transactions on Networking, 2017
  2. When smart tv meets crn: Privacy-preserving fine-grained spectrum access
    Chaowen Guan, Aziz Mohaisen, Zhi Sun, and 3 more authors
    In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017
  3. Availability-aware mapping of service function chains
    Jingyuan Fan, Chaowen Guan, Yangming Zhao, and 1 more author
    In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 2017

2016

  1. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
    Zhangjie Fu, Xinle Wu, Chaowen Guan, and 2 more authors
    IEEE Transactions on Information Forensics and Security, 2016
  2. Enabling ciphertext deduplication for secure cloud storage and access control
    Heyi Tang, Yong Cui, Chaowen Guan, and 3 more authors
    In Proceedings of the 11th ACM on asia conference on computer and communications security, 2016

2015

  1. Symmetric-key based proofs of retrievability supporting public verification
    Chaowen Guan, Kui Ren, Fangguo Zhang, and 2 more authors
    In Computer Security–ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I 20, 2015
  2. Verifiable searchable symmetric encryption from indistinguishability obfuscation
    Rong Cheng, Jingbo Yan, Chaowen Guan, and 2 more authors
    In Proceedings of the 10th ACM symposium on information, computer and communications security, 2015
  3. GREP: Guaranteeing reliability with enhanced protection in NFV
    Jingyuan Fan, Zilong Ye, Chaowen Guan, and 3 more authors
    In Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

2014

  1. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
    DeHua Zhou, Jian Weng, ChaoWen Guan, and 3 more authors
    Science China Information Sciences, 2014
  2. Unforgeability of an improved certificateless signature scheme in the standard model
    Chaowen Guan, Jian Weng, Robert H Deng, and 2 more authors
    IET Information Security, 2014

2013

  1. Attribute-based encryption with verifiable outsourced decryption
    Junzuo Lai, Robert H Deng, Chaowen Guan, and 1 more author
    IEEE Transactions on information forensics and security, 2013
  2. Cryptanalysis of a certificateless proxy re-encryption scheme
    Yulin Zheng, Shaohua Tang, Chaowen Guan, and 1 more author
    In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013