- Feng Xie, Zhen Chen, Hongfeng Xu, Xiwei Feng, and Qi Hou. TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing, Tsinghua Science and Technology, 18, no.3, 2013.
- Yuan Tian, Chuang Lin, Zhen Chen, Jianxiong Wan, and Xuehai Peng. Performance Evaluation and Dynamic Optimization of Speed Scaling on Web Servers in Cloud Computing. Tsinghua Science and Technology, 18, no.3, 2013.
- Feng Xie, Ming Xu and Zhen Chen. RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems. Proc. of the 8th International Symposium on Frontiers of Information Systems and Network Applications (FINA), 2012.
- Ming Xu, Feng Xie, Haohan Wang and Zhen Chen, A Novel Workflow Based Data Processing Platform as a Service. Proc. of the 1st IEEE Computing, Communications & Applications Conference (ComCompAp), 2012.
- Yuqian Li, Yang Liu, Zhi-fang Liu, Jiwei Huang, Zhen Chen, The Power of Refresh: a Novel Mechanism for Securing Low Entropy PII, CMC'2011.
- Yuqian Li, Yang Liu, Zhifang Liu, Chao Liu, Zhaonan Li, Fuye Han, Jun Li, Ming Xu, Xin Guan, Zhen Chen, LiveS Cube: An Experiment for Mobile Social Network. Proc. International Conference on Networking and Distributed Computing, ICNDC'2011.
- 李 军, 陈 震,黄霁崴, 微博影响力评价研究进展,信息网络安全,2012年, 第5期, 10-13.
- 韩阜业,孟庆轩,微博系统架构的可信性研究,信息网络安全,2011年, 第8期,18-21.
- Ma Ge, Zhen Chen, Hongjian Liu, and Bin Cao. "Large-Scale Emulation for Content Centric Network." 2013 Fourth International Conference on Networking and Distributed Computing (ICNDC), pp.100-104, 2013.
- Haopei Wang, Zhen Chen, Feng Xie, Fuye Han, A Data Structure for Content Cache Management in Content-Centric Networking, the 3rd International Conference on Network and Distributed Computing, ICNDC'2012.
- Hongfeng Xu, Zhen Chen,Junwei Cao, Live Streaming with Content Centric Networking, the 3rd International Conference on Network and Distributed Computing, ICNDC'2012.
- Yong Liang, Zhen Chen, Jun Li and Shuai Ding, Reality Check of CCN Routing Using Search Processor, the 3rd International Conference on Network and Distributed Computing, ICNDC'2012.
- Shuai Ding, Zhen Chen and Zhi Liu, Parallelizing FIB Lookup in Content Centric Networking,the 3rd International Conference on Network and Distributed Computing, ICNDC'2012.
- ErLong Min, Zhen Chen, Rui Chen and Dongsheng Wang, Reformat Named Data Networking with Cryptographic Message Syntax, the 3rd International Conference on Network and Distributed Computing, ICNDC'2012.
- 闵二龙,陈震,陈睿,许宏峰,内容中心网络的隐私问题研究,信息网络安全,2013年02期.
- 李 军,陈 震,石 希,ICN体系结构与技术研究,信息网络安全,2012年第4期,第75-80页.
- 闵二龙,陈震,许宏峰,梁勇,内容中心网CCN研究进展探析,信息网络安全,2012年02期.
- Lingyun Ruan, Anan Luo, Zhen Chen. TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.
- Li Tang, Zhen Chen, Hao Yin, Jun Li and Yanda Li. CORS: A Cooperative Overlay Routing Service to Enhance Interactive Multimedia Communications. Journal of Visual Communication and Image Representation, pp.107-119, Vol.21, No.2, 2010.
- Hui Zhang, Wei Jiang, Jin Zhou, Zhen Chen and Jun Li. M3FEC: Joint Multiple Description Coding and Forward Error Correction for Interactive Multimedia in Multiple Path Transmission. Tsinghua Science and Technology, pp.320-331, Vol. 16, No.3, June 2011.
- Li Tang, Yin Huai, Jin Zhou, Hao Yin, Zhen Chen and Jun Li. A Measurement Study on the Benefits of Open Routers for Overlay Routing. Journal of Communications, Vol.4 No.9, pp.714-723, 2009.
- Xin Jiang, Chuang Lin, Yixin Jiang, Yuanzhuo Wang, Zhen Chen. ELCP: An effort-based least cost path scheme for MANETs, International Conference on Mobile Ad-hoc and Sensor Networks, MSN'2009.
- Dongsheng Peng and Zhen Chen et al., Enhancing Tit-for-Tat strategy to cope with free-riding in unreliable P2P networks, ICIW'2008.
- Dongsheng Peng and Zhen Chen et al., A Loosely Synchronized Gossip-Based Algorithm for Aggregate Information Computation, IEEE LCN'2008.
- Hui Zhang, Li Tang, Zhen Chen and Jun Li. Empirical Study on Multi-path Benefits on Interactive Video. Proc. of the 2007 IEEE International Conference on Multimedia & Expo (ICME), 2007.
- Li Tang, Zhijie Sun, Zhen Chen and Jun Li. On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing. Proc. of the 3rd International Conference on Networking and Services (ICNS), 2007.
- 张志明,周晋,陈震,李军,提高有效吞吐率的P2P TV网络编码数据传输算法,清华大学学报-自然科学版, Vol.52, No.12, 1657-1663,2012.
- 张志明,周晋,陈震,李军,基于网络编码的对等网流媒体传输模型和算法,软件学报,23(3):648-661,2012.
- 张志明,周晋,陈震,李军,基于网络编码的P2P TV拓扑优化,计算机科学,第38卷,第4期,2012年4月.
- 张志明,杜剑,郭瑛,周晋,陈震,李军,CORS TV 一种基于网络编码的P2P TV系统,计算机科学,第38卷,第12期,2011年12月.
- 唐力,槐寅,陈震,Flash媒体服务器的优化部署. 清华大学学报(自然科学版), 50(1): 5-8, 2010.
- 唐力,陈震等,改善多媒体通信质量的覆盖层路由系统. 电子技术应用, 11/12期,2009.
- Cao, Bin, Zhen Chen, Hongjian Liu, Ge Ma, Peng Zhang, and Guodong Peng. "Black Box Testing for Cloud-Based Client Security Software in Network Behaviors." In Networking and Distributed Computing (ICNDC), 2013 Fourth International Conference on, pp. 75-79. IEEE, 2013.
- Jianlin Xu, Yifan Yu, Zhen Chen, Bin Cao, Wenyu Dong, Yu Guo, and Junwei Cao. MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining. Tsinghua Science and Technology 18, no. 4 (2013).
- Zhen Chen, FuYe Han, Junwei Cao, Xin Jiang, Shuo Chen, Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System, Tsinghua Science and Technology, 18 (1), pp.40-50, 2013.
- Fuye Han, Zhen Chen, Hongfeng Xu and Yong Liang, A Collaborative Botnets Suppression System Based on Overlay Network, the special issue of the International Journal of Security and Networks, Vo. 7, No. 4, 2012.
- Fuye Han, Zhen Chen, Hongfeng Xu and Yong Liang. Garlic: A Distributed Botnets Suppression System. Proc. of the IEEE ICDCS, the First International Workshop on Network Forensics, Security and Privacy (NFSP), 2012.
- Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen chen and Jiwei Huang. A Performance Analysis of Identity-Based Encryption Schemes. Proc. of the 3rd International Conference on Trusted Systems (INTRUST), 2011.
- Xinming Chen, Kailin Ge, Zhen Chen and Jun Li. AC-Suffix-Tree: Buffer Free String Matching on Out-of-Sequence Packets. Proc. of the 7th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011.
- Tianyang Li, Fuye Han, Shuai Ding, Zhen Chen. LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform. ICCCN GridPeer Workshop, 2011.
- Beipeng Mu, Xinming Chen, Zhen Chen. A Collaborative Network Security Management System in Metropolitan Area Network. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.
- Xinming Chen, Beipeng Mu, Zhen Chen, NetSecu: A Collaborative Network Security Platform for in-network Security. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.
- Jinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu and Lingyun Ruan. Towards High-performance IPsec on Cavium OCTEON Platform. Proc. of the 2nd International Conference on Trusted Systems (INTRUST), LNCS, Springer-Verlag, 2010.
- Guodong Li, Zhen Chen, Anan Luo, Yibo Xue and Chuang Lin. A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network. Proc. of the 2th International Conference on Communication Software and Networks (ICCSN), 2010.
- Yin Zhang, Zhen Chen et al., UTM-CM A Practical Control Mechanism Solution for UTM System, CMC 2010.
- Shihai Huang and Zhen Chen et al., Proxy-based Security Audit System for Remote Desktop Access, ICCCN workshop Network Security and Privacy, 2009.
- Jia Ni, Zhen Chen et al., A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor, ICPP'2007.
- Zhen Chen et al., AntiWorm NPU-based Parallel Bloom filters in Giga-Ethernet LAN, ICC'2006.
- Donghua Ruan and Zhen Chen et al., Handling High Speed Traffic Measurement Using Network Processors, ICCT'2006.
- Zhen Chen et al., AntiWorm NPU-based Parallel Bloom filters for TCP-IP Content Processing in Giga-Ethernet LAN, IEEE LCN WoNS'2005.
- 关 欣,朱冰,陈震,彭雪海,基于特征码病毒扫描技术的研究,信息网络安全,2013年04期.
- 梁 勇,陈震,石 希,李军,高速网络流量管理系统研究,信息网络安全,2012年07期.
- 石 希,陈 震,汪东升,闵二龙,物联网汇聚安全网关关键技术研究,信息网络安全,2012年第6期,第85-89页.
- 韩阜业,陈震,梁勇,李军,基于覆盖网的协同式网络安全防护与分析系统, 信息网络安全, 第4期,第7-13页, 2012.
- 李国栋, 林闯, 董晓红, 陈震, 彭雪海, 基于Petri网模型的UTM防火墙性能分析, 系统仿真学报杂志, 2008年S2期.
- 董小明, 林闯, 陈震. 基于空间优化的决策树算法, 计算机应用研究, 24(11):222-224, 2007.
- 董小明, 林闯, 陈震, TCAM中规则的优化表示, 微计算机信息, 第23卷, 第7-3期,2007年.
- 倪 嘉, 林闯, 陈震, 基于HBM 算法的高速反蠕虫引擎的设计实现, 电子技术应用, 第8期, 2007年.
- Zhen Chen, Lingyun Ruan, Junwei Cao, Yifan Yu, and Xin Jiang. TIFAflow: enhancing traffic archiving system with flow granularity for forensic analysis in network security, Tsinghua Science and Technology 18, no. 4 , 2013.
- Zhen Chen, Xi Shi, Ling-Yun Ruan, Feng Xie and Jun Li, High Speed Traffic Archiving System for Flow Granularity Storage and Querying, ICCCN 2012 workshop on PMECT.
- Jun Li, Shuai Ding, Ming Xu, Fuye Han, Xin Guan, Zhen Chen. TIFA: Enabling Real-Time Querying and Storage of Massive Stream Data. Proc. International Conference on Networking and Distributed Computing (ICNDC), 2011.
- Zhen Chen, Fachao Deng, Anan Luo, Xin Jiang, Guodong Li, Runhua Zhang and Chuang Lin. Application Level Network Access Control System Based on TNC Architecture for Enterprise Network. Proc. of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010.
- Fachao Deng, Anan Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang and Dongsheng Peng. TNC-UTM: A Holistic Solution to Secure Enterprise Networks. The 9th International Conference for Young Computer Scientists (ICYCS 2008), 2008.
- Anan Luo and Zhen Chen et al., TNC-compatible NAC System implemented on Network Processor, 32nd IEEE Conference on Local Computer Networks,Workshop on Network Security, 2007.
- 陈震等,可信网络体系结构与关键技术,计算机学会通讯,2010年第2期.
- 陈震等,可信网络连接系统设计与实现,信息网络安全,2009年第7期.
- 陈震等,可信计算认证技术的研究,信息网络安全,2007年第7期.
- Reformat Content-Centric Networking with Cryptographic Message Syntax, CCNx Community conference 2012. (Poster)
- Reality Check of CCN Routing Using Search Processor, CCNx Community conference 2012. (Poster)
- Parallelizing FIB Lookup in Content Centric Networking, CCNx Community conference 2012. (Poster)
- Live Streaming with Content Centric Networking, CCNx Community conference 2012. (Poster)
- Fuye Han, Hongfeng Xu, Yong Liang and Zhen Chen. Garlic: A Distributed Botnets Suppression System. The 31st IEEE International Conference on Computer Communications (INFOCOM), 2012. (Student Poster)
- Jun Li, Zhen Chen, Zhu-Wei Chen, Fuye Han, Yong Liang, JiWei Huang, Feng Xie, LoongSing Influence Analysis for Chinese Weibo User, IEEE 35th Sarnoff Symposium 2012. (Student Poster)
- Yuan Tian, Zhen Chen, Jiwei Huang, Energy-Efficiency Aware Strategy Design for Content Centric Networking, IEEE 35th Sarnoff Symposium 2012. (Student Poster)
- Hui Zhang, Jin Zhou, Zhen Chen and Jun Li. Minimizing Delay for Video Conference with Network Coding. Proc. of ACM SIGCOMM 2009. (Poster)