[25]Jianyong Chen, Junwei Zhou, and Kwok W. Wong, "A modified chaos-based joint compression and encryption scheme", IEEE Transactions on Circuits and Systems--II: Express Briefs, Vol. 58 (2) (2011) 110-114 (SCI, IF=1.7)
[24]Jianyong Chen, Guihua Wu, Linlin Shen, and Zhen Ji, "Differentiated security levels for personal identifiable information in identity management system", Expert Systems with Applications (2011), DOI: 10.1016/j.eswa.2011.04.226 (SCI, IF=2.9)
[23]Jianyong Chen,Guihua Wu, and Zhen Ji, “Secure Interoperation of Identity Managements among Different Circles of Trust”, Computer Standards & Interfaces, (2011) DOI: 10.1016/j.csi.2011.02.008 (SCI, IF=1.37)
[22]Jianyong Chen, Junwei Zhou, and Kwok W. Wong, "Enhanced cryptography by multiple chaotic dynamics", Mathematical Problems in Engineering, Volume 2011, Article ID 938454, 12pages. (SCI, IF=0.6)
[21]Jianyong Chenand Qiuzhen Lin, "Immune-inspired evolutionary stragegy for constrained optimization problems", International Journal on Artificial Intelligence Tools (Accepted) (SCI, IF=0.4).
[20]Jianyong Chen, Huawang Zeng, Cunying Hu, and Zhen Ji, "Optimization between security and delay of quality of service", Journal of Network and Computer Applications, 34, (2011) 603-608. (SCI, IF=1.1)
[19]Jianyong Chen, Qiuzhen Lin, Zhen Ji, “Chaos-based multi-objective immune algorithm with a fine-grained selection mechanism”, Soft Computing, DOI 10.1007/s 005/000/10-6-61-4.(SCI, IF=1.3)
[18]Jianyong Chen, Cunying Hu, Huawang Zeng, "An improved ARED algorithm for congestion control of network”, Mathematical Problems in Engineering, Vol.2010, Article ID 329035, 14 pages (SCI, IF=0.6)
[17]Jianyong Chen, Qiuzhen Lin, Qinbin Hu, "Application of novel clonal algorithm in multiobjective optimization", International Journal of Information Technology and Decision Making. Vol. 9, No. 2 (2010) 239–266 (SCI, IF=1.3)
[16]Jianyong Chen, Qiuzhen Lin, Zhenji, "A hybrid immune multiobjective optimization algorithm", European Journal of Operational Research, 204 (2010) 294–302 (SCI, IF=2.0)
[15]Jianyong Chen, Cunying Hu, Huawang Zeng, “A novel model for evaluating optimal parameters of security and quality of service,” Journal of Computers, 5 (6) (2010) 973-978 EI: 2010/251/3031570
[10] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Phase synchronization between two different oscillators with unidirectional signal coupling,” International Journal of Bifurcation and Chaos14, 18771884 (2004). (SCI)
[9] J. Y. Chen, K. W. Wong, L. M. Cheng and J. W. Shuai, “A secure communication scheme based on the phase synchronization of chaotic systems,” Chaos, 13, 508-514 (2003). (SCI)
[8] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Phase synchronization in coupled chaotic oscillators with time delay.” Physical Review E, 66, 056203 (2002). (SCI)
[7] J. Y. Chen, K. W. Wong, and J. W. Shuai, “n:m phase synchronization with mutual coupling phase signals,” Chaos, 12, 100-106 (2002). (SCI)
[6] J. Y. Chen, K. W. Wong, H. Y. Zheng, and J. W. Shuai, “Phase signal coupling induced n:m phase synchronization in drive-response oscillators,” Physical Review E, 63, 036214 (2001). (SCI)
[5] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Properties of phase locking with weak phase-coherent attractors,” Physics Letters A, 285, 312-318 (2001). (SCI)
[4] J. Y. Chen, K. W. Wong, H. Y. Zheng, and J. W. Shuai, “Intermittent phase synchronization of coupled spatiotemporal chaotic systems,” Physical Review E, 64, 016212 (2001).(SCI)
[3] J. Y. Chen, K. W. Wong, Z. X. Chen, S. C. Xu, and J. W. Shuai, “Phase synchronization in discrete chaotic systems” Physical Review E61, 2559-2562 (2000).(SCI)
[2] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Finding the chaotic synchronizing state with gradient descent algorithm,” Physics Letters A, 263, 315-322 (1999). (SCI)
[1] J. Y. Chen, Z. X. Chen, J. W. Shuai, Y. Y. Lu, and D. H. Guo, “A chaotic lattice and the circuit of its unit”, Canadian Journal of Physics, 76, 801-808 (1998).(SCI)