default search action
Chengyu Hu
- > Home > Persons > Chengyu Hu
Publications
- 2024
- [j57]Guiyun Qin, Limin Li, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j56]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting. IEEE Internet Things J. 11(1): 403-417 (2024) - [j55]Zhaoxing Han, Chengyu Hu, Tongyaqi Li, Qingqiang Qi, Peng Tang, Shanqing Guo:
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning. Neural Networks 179: 106574 (2024) - [c57]Zhen Zhao, Xiangpu Song, Qiuyu Zhong, Yingpei Zeng, Chengyu Hu, Shanqing Guo:
TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations. SANER 2024: 918-928 - 2023
- [j50]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security. IEEE Syst. J. 17(4): 5519-5530 (2023) - [c55]Gaoyuan Liu, Peng Tang, Chengyu Hu, Chongshi Jin, Shanqing Guo:
Multi-Dimensional Data Publishing With Local Differential Privacy. EDBT 2023: 183-194 - [c54]Fengyan Lv, Cheng Liu, Xiaofeng Liu, Chengyu Hu, Zhihao Chen, Shanqing Guo:
ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications. ICC 2023: 5234-5239 - [c53]Tengxiao Yang, Song Lian, Qiong Jia, Chengyu Hu, Shanqing Guo:
Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks. ICONIP (15) 2023: 152-164 - [c52]Hao Li, Yanbo Wu, Ronghong Huang, Xianghang Mi, Chengyu Hu, Shanqing Guo:
Demystifying Decentralized Matrix Communication Network: Ecosystem and Security. ICPADS 2023: 260-267 - 2022
- [c49]Ge Han, Zheng Li, Peng Tang, Chengyu Hu, Shanqing Guo:
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks. HPCC/DSS/SmartCity/DependSys 2022: 1601-1608 - [c48]Limin Li, Guiyun Qin, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Secure and Efficient Cloud Ciphertext Deduplication Based on SGX. ICPADS 2022: 696-703 - 2021
- [j41]Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mob. Networks Appl. 26(6): 2490-2500 (2021) - [c46]Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen:
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICS (1) 2021: 260-275 - 2020
- [j35]Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu, Shanqing Guo, Minghao Zhao:
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Inf. Sci. 520: 15-30 (2020) - [c43]Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li:
An empirical study of potentially malicious third-party libraries in Android apps. WISEC 2020: 144-154 - 2019
- [c42]Zheng Li, Chengyu Hu, Yang Zhang, Shanqing Guo:
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. ACSAC 2019: 126-137 - [c38]Zheng Li, Ge Han, Shanqing Guo, Chengyu Hu:
DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks. HPCC/SmartCity/DSS 2019: 1937-1944 - 2018
- [c36]Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu:
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations. ICSME 2018: 48-58 - [i3]Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu:
DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations. CoRR abs/1808.05444 (2018) - 2017
- [j15]Chengyu Hu, Pengtao Liu, Shanqing Guo, Qiuliang Xu:
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. Int. J. High Perform. Comput. Netw. 10(3): 226-239 (2017) - [c35]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499 - 2016
- [j14]Chengyu Hu, Pengtao Liu, Shanqing Guo:
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. J. Ambient Intell. Humaniz. Comput. 7(5): 681-692 (2016) - [j10]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016) - 2015
- [c32]Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:
Anonymous Identity-Based Encryption with Bounded Leakage Resilience. AINA Workshops 2015: 287-292 - [c31]Cuixia Yang, Chaoshun Zuo, Shanqing Guo, Chengyu Hu, Lizhen Cui:
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application. CIC 2015: 160-167
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 00:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint