Chengyu Hu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
MST-ARGCN: modality-squeeze transformer with attentional recurrent graph capsule network for multimodal sentiment analysis.
J. Supercomput., January, 2025

FLDS: differentially private federated learning with double shufflers.
Comput. J., 2025

Query Rewriting-Based View Generation for Efficient Multi-Relation Multi-Query with Differential Privacy.
Proceedings of the Proceedings 28th International Conference on Extending Database Technology, 2025

2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024

Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning.
Neural Networks, 2024

TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations.
Proceedings of the IEEE International Conference on Software Analysis, 2024

2023
Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Dimensional Data Publishing With Local Differential Privacy.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

Multi-Level Confidence Learning for Trustworthy Multimodal Classification.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Secure and Efficient Cloud Ciphertext Deduplication Based on SGX.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021

2020
An empirical study of potentially malicious third-party libraries in Android apps.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

A Tile-based Interconnect Model for FPGA Architecture Exploration.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

INTB: A New FPGA Interconnect Model for Architecture Exploration.
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

An Automatic Transistor-Level Tool for GRM FPGA Interconnect Circuits Optimization.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

An Analytical-based Hybrid Algorithm for FPGA Placement.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

Balance of memory footprint and runtime for high-density routing in large-scale FPGAs.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2018
A SA-based parallel method for FPGA placement.
IEICE Electron. Express, 2018

DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2016
Fairness in secure computing protocols based on incentives.
Soft Comput., 2016

Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Public-key encryption with keyword search secure against continual memory attacks.
Secur. Commun. Networks, 2016

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016

2015
Multi-keyword ranked searchable public-key encryption.
Int. J. Grid Util. Comput., 2015

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015

Updatable Hash Proof System and Its Applications.
Proceedings of the Computer Security - ESORICS 2015, 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Weak-Key Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2014

How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013

Public Key Encryption with Ranked Multi-keyword Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
J. Comput., 2012

Applying Support Vector Machine to Time Series Prediction in Oracle.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

2011
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2009
A New ID-Based Deniable Ring Authentication with Constant-Size Signature.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2007
Forward-Secure Traceable Ring Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Ring Blind Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

An Efficient Threshold Group Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007


  Loading...