Chengyu Hu
Orcid: 0000-0002-5523-2672Affiliations:
- Shandong University, Qingdao, China
According to our database1,
Chengyu Hu
authored at least 17 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module.
ACM Trans. Priv. Secur., May, 2025
PFGRS: A Privacy-preserving Subgraph-level Federated Graph learning for Recommender System.
Expert Syst. Appl., 2025
2024
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024
2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
2019
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019
DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018