Changhui Hu

Orcid: 0000-0002-6177-6019

Affiliations:
  • Hainan University, School of Cyberspace Security (School of Cryptology), Haikou, China
  • Newcastle University, Newcastle upon Tyne, UK (former)
  • Dalian University of Technology, School of Mathematical Sciences, China (former)
  • University of Hong Kong, Department of Computer Science, Hong Kong (former)
  • Shandong University, School of Mathematics, China (PhD 2012)


According to our database1, Changhui Hu authored at least 11 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Data Sharing in the Metaverse With Key Abuse Resistance Based on Decentralized CP-ABE.
IEEE Trans. Computers, March, 2025

2024
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study.
IACR Cryptol. ePrint Arch., 2023

2022
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022

2021
Efficient and Secure Outsourcing of Large-Scale Linear System of Equations.
IEEE Trans. Cloud Comput., 2021

2020
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free.
IACR Cryptol. ePrint Arch., 2020

2016
Efficient and secure multi-functional searchable symmetric encryption schemes.
Secur. Commun. Networks, 2016

Efficient wildcard search over encrypted data.
Int. J. Inf. Sec., 2016

2014
Efficient Approximate Search Using VGRAM Over Encrypted Cloud Data.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2012
Efficient HMAC-based secure communication for VANETs.
Comput. Networks, 2012

2008
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008


  Loading...