Chengyu Hu
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
MST-ARGCN: modality-squeeze transformer with attentional recurrent graph capsule network for multimodal sentiment analysis.
J. Supercomput., January, 2025
Comput. J., 2025
Query Rewriting-Based View Generation for Efficient Multi-Relation Multi-Query with Differential Privacy.
Proceedings of the Proceedings 28th International Conference on Extending Database Technology, 2025
2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning.
Neural Networks, 2024
TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations.
Proceedings of the IEEE International Conference on Software Analysis, 2024
2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021
2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
Balance of memory footprint and runtime for high-density routing in large-scale FPGAs.
Proceedings of the 13th IEEE International Conference on ASIC, 2019
2018
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016
Secur. Commun. Networks, 2016
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016
2015
Int. J. Grid Util. Comput., 2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
J. Comput., 2012
Proceedings of the Computational Intelligence and Intelligent Systems, 2012
2011
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
An Efficient Threshold Group Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007