Chengyu Hu

Orcid: 0000-0002-5523-2672

Affiliations:
  • Shandong University, Qingdao, China


According to our database1, Chengyu Hu authored at least 17 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Safe Driving Adversarial Trajectory Can Mislead: Toward More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module.
ACM Trans. Priv. Secur., May, 2025

PFGRS: A Privacy-preserving Subgraph-level Federated Graph learning for Recommender System.
Expert Syst. Appl., 2025

2024
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024

PFDF: Privacy Preserving Federated Decision Forest for Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023

Demystifying Decentralized Matrix Communication Network: Ecosystem and Security.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

2019
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019

Forward Secure Conjunctive-Keyword Searchable Encryption.
IEEE Access, 2019

Public-Key Encryption With Keyword Search via Obfuscation.
IEEE Access, 2019

DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018


  Loading...