default search action
Kejun Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Kejun Chen, Ningyuan Song, Yuehua Zhao, Jiaer Peng, Ye Chen:
Online attention versus knowledge utilization: Exploring how linguistic features of scientific papers influence knowledge diffusion. Inf. Process. Manag. 61(2): 103691 (2024) - [j29]Kejun Chen, Yuehua Zhao, Ningyuan Song, Yufei Han, Jiaer Peng, Jiaqing Wang:
You are not alone: Characterizing users' relationship-layer identities in online health communities. J. Assoc. Inf. Sci. Technol. 75(7): 807-828 (2024) - [c5]Zhaoxiang Liu, Kejun Chen, Dean Sullivan, Orlando Arias, Raj Dutta, Yier Jin, Xiaolong Guo:
Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective. ASPDAC 2024: 933-938 - [i5]Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly:
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method. CoRR abs/2409.04609 (2024) - 2023
- [j28]Kejun Chen, Yu Zhang:
Physics-Guided Residual Learning for Probabilistic Power Flow Analysis. IEEE Access 11: 90309-90321 (2023) - [j27]Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. ACM Comput. Surv. 55(2): 17:1-17:33 (2023) - [j26]Guangzhou Chen, Wen Li, Kejun Chen, Ming Zhong:
The existence spectrum for regular sparse anti-magic squares. Discret. Math. 346(10): 113531 (2023) - [j25]Ningyuan Song, Kejun Chen, Xiufang Jin, Yuehua Zhao:
Academic reading under a semantic enhancement environment: An empirical study on users' cognitive load and reading effect. J. Comput. Assist. Learn. 39(1): 167-181 (2023) - [j24]Ningyuan Song, Kejun Chen, Yuehua Zhao:
Understanding writing styles of scientific papers in the IS-LS domain: Evidence from abstracts over the past three decades. J. Informetrics 17(1): 101377 (2023) - [j23]Kejun Chen, Orlando Arias, Xiaolong Guo, Qingxu Deng, Yier Jin:
IP-Tag: Tag-Based Runtime 3PIP Hardware Trojan Detection in SoC Platforms. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(1): 68-81 (2023) - [c4]Shourya Bose, Kejun Chen, Yu Zhang:
On LinDistFlow Model Congestion Pricing: Bounding the Changes in Power Tariffs. ISIE 2023: 1-6 - [i4]Kejun Chen, Yu Zhang:
Physics-guided Residual Learning for Probabilistic Power Flow Analysis. CoRR abs/2301.12062 (2023) - [i3]Shourya Bose, Kejun Chen, Yu Zhang:
On LinDistFlow Model Congestion Pricing: Bounding the Changes in Power Tariffs. CoRR abs/2305.00400 (2023) - 2022
- [j22]Yajuan Zang, Guangzhou Chen, Kejun Chen, Zihong Tian:
Further results on 2-uniform states arising from irredundant orthogonal arrays. Adv. Math. Commun. 16(2): 231-247 (2022) - [j21]Yuehua Zhao, Kejun Chen, Jiaer Peng, Jiaqing Wang, Ningyuan Song:
Diverse needs and cooperative deeds: Comprehending users' identities in online health communities. Inf. Process. Manag. 59(5): 103060 (2022) - [j20]Kejun Chen, Lei Sun, Qingxu Deng:
Hardware and software co-verification from security perspective in SoC platforms. J. Syst. Archit. 122: 102355 (2022) - [j19]Kejun Chen, Orlando Arias, Qingxu Deng, Daniela Oliveira, Xiaolong Guo, Yier Jin:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. IEEE Trans. Inf. Forensics Secur. 17: 559-573 (2022) - [c3]Kejun Chen, Shourya Bose, Yu Zhang:
Unsupervised Deep Learning for AC Optimal Power Flow via Lagrangian Duality. GLOBECOM 2022: 5305-5310 - [c2]Kejun Chen, Yu Zhang:
Variation-cognizant Probabilistic Power Flow Analysis via Multi-task Learning. ISGT 2022: 1-5 - [i2]Kejun Chen, Yu Zhang:
Variation-cognizant Probabilistic Power Flow Analysis via Multi-task Learning. CoRR abs/2205.00598 (2022) - [i1]Kejun Chen, Shourya Bose, Yu Zhang:
Unsupervised Deep Learning for AC Optimal Power Flow via Lagrangian Duality. CoRR abs/2212.03977 (2022) - 2021
- [j18]Guangzhou Chen, Kejun Chen, Yong Zhang, Ning Jiang:
Super-simple group divisible designs with block size 4 and index λ = 7, 8. Discret. Math. 344(12): 112592 (2021)
2010 – 2019
- 2019
- [c1]Kejun Chen, Qingxu Deng, Yumin Hou, Yier Jin, Xiaolong Guo:
Hardware and Software Co-Verification from Security Perspective. MTV 2019: 50-55 - 2018
- [j17]Kun Wang, Kejun Chen:
A short disproof of Euler's conjecture based on quasi-difference matrices and difference matrices. Discret. Math. 341(4): 1114-1119 (2018) - [j16]Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin:
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. J. Hardw. Syst. Secur. 2(2): 97-110 (2018) - 2017
- [j15]Guangzhou Chen, Yong Zhang, Kejun Chen:
Super-simple pairwise balanced designs with block sizes 3 and 4. Discret. Math. 340(2): 236-242 (2017) - 2016
- [j14]Kejun Chen, Wen Li, Guangzhou Chen, Ruizhong Wei:
Regular sparse anti-magic squares with maximum density. Ars Comb. 127: 167-183 (2016) - [j13]Guangzhou Chen, Haiyan Chen, Kejun Chen, Wen Li:
Regular sparse anti-magic squares with small odd densities. Discret. Math. 339(1): 138-156 (2016) - 2015
- [j12]Nanyuan Cao, Kejun Chen, Yong Zhang:
Existence of Yang Hui Type Magic Squares. Graphs Comb. 31(5): 1289-1310 (2015) - 2014
- [j11]Yong Zhang, Kejun Chen, Nanyuan Cao, Hantao Zhang:
Strongly symmetric self-orthogonal diagonal Latin squares and Yang Hui type magic squares. Discret. Math. 328: 79-87 (2014) - 2013
- [j10]Kejun Chen, Guangzhou Chen, Wen Li, Ruizhong Wei:
Super-simple balanced incomplete block designs with block size 5 and index 3. Discret. Appl. Math. 161(16-17): 2396-2404 (2013) - 2012
- [j9]Kejun Chen, Ruizhong Wei:
On Super-simple Cyclic 2-designs. Ars Comb. 103: 257-277 (2012) - [j8]Kejun Chen, Wen Li:
Existence of normal bimagic squares. Discret. Math. 312(21): 3077-3086 (2012)
2000 – 2009
- 2009
- [j7]Haitao Cao, Kejun Chen, Ruizhong Wei:
Super-simple balanced incomplete block designs with block size 4 and index 5. Discret. Math. 309(9): 2808-2814 (2009) - 2008
- [j6]Douglas R. Stinson, Ruizhong Wei, Kejun Chen:
On generalized separating hash families. J. Comb. Theory A 115(1): 105-120 (2008) - 2007
- [j5]Kejun Chen, Ruizhong Wei:
Super-simple (v, 5, 4) designs. Discret. Appl. Math. 155(8): 904-913 (2007) - 2006
- [j4]Kejun Chen, Ruizhong Wei:
A Few More Cyclic Steiner 2-Designs. Electron. J. Comb. 13(1) (2006) - [j3]Kejun Chen, Ruizhong Wei:
Super-simple (nu, 5, 5) Designs. Des. Codes Cryptogr. 39(2): 173-187 (2006) - 2004
- [j2]Kejun Chen, Zhenfu Cao, Dianhua Wu:
Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4). Discret. Math. 279(1-3): 153-161 (2004) - 2000
- [j1]Kuo-Chi Lin, Shih-Wei Tan, Kejun Chen:
Study on the Dynamical Behavior of a Real-Time Distributed Simulation System. Simul. 74(1): 11-17 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint