Yupeng Hu

Orcid: 0000-0002-7358-7426

Affiliations:
  • Hunan University, Changsha, China


According to our database1, Yupeng Hu authored at least 40 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
FirmPass: Identifying Broken Password Management in Linux-Based IoT Firmware Through Query-Driven Approaches.
IEEE Internet Things J., July, 2025

SemSyn-LCE: A Charge Prediction Method Based on Semantic Syntactic Fusion and Legal Constituent Elements Matching.
Proceedings of the Document Analysis and Recognition - ICDAR 2025, 2025

MPCCP: A Multi-chain Perception Crime Charge Prediction Method.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2025, 2025

2024
HPDK: A Hybrid PM-DRAM Key-Value Store for High I/O Throughput.
IEEE Trans. Computers, June, 2024

SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android.
J. Comput. Secur., 2024

Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
Adaptive multi-source data fusion vessel trajectory prediction model for intelligent maritime traffic.
Knowl. Based Syst., October, 2023

Bidirectional Data-Driven Trajectory Prediction for Intelligent Maritime Traffic.
IEEE Trans. Intell. Transp. Syst., February, 2023

Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds.
IEEE Trans. Dependable Secur. Comput., 2023

Artificial Intelligence Security: Threats and Countermeasures.
ACM Comput. Surv., 2023

Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

2022
A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults.
IEEE Trans. Cloud Comput., 2022

FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

STT-MRAM-Based Reliable Weak PUF.
IEEE Trans. Computers, 2022

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022

Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022

2021
Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2021

Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems.
Inf. Sci., 2021

AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology.
IEEE Internet Things J., 2021

2020
Good or Mediocre? A Deep Reinforcement Learning Approach for Taxi Revenue Efficiency Optimization.
IEEE Trans. Netw. Sci. Eng., 2020

TrajData: On Vehicle Trajectory Collection With Commodity Plug-and-Play OBU Devices.
IEEE Internet Things J., 2020

SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020

An Ant Colony Optimization Based Data Update Scheme for Distributed Erasure-Coded Storage Systems.
IEEE Access, 2020

HRAE: Hardware-assisted Randomization against Adversarial Example Attacks.
Proceedings of the 29th IEEE Asian Test Symposium, 2020

2019
Data Temperature-Aware Bloom Filters for Flash-Based Storage.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
Secur. Commun. Networks, 2018

2017
Toward Complex Search for Encrypted Cloud Data via Blind Index Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A image texture and BP neural network basec malicious files detection technique for cloud storage systems.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

IRMD: Malware Variant Detection Using Opcode Image Recognition.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Multi-User Location Correlation Protection with Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Malware Variant Detection Using Opcode Image Recognition with Small Training Sets.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Unequal Failure Protection Coding Technology for Cloud Storage Systems.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs.
IEEE Trans. Circuits Syst. II Express Briefs, 2015

A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...