Chengyu Hu

According to our database1, Chengyu Hu authored at least 65 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
The Journal of Supercomputing, 2019

Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Network and Computer Applications, 2019

Forward Secure Conjunctive-Keyword Searchable Encryption.
IEEE Access, 2019

Public-Key Encryption With Keyword Search via Obfuscation.
IEEE Access, 2019

An Automatic Transistor-Level Tool for GRM FPGA Interconnect Circuits Optimization.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

An Analytical-based Hybrid Algorithm for FPGA Placement.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

2018
A survey on sensor placement for contamination detection in water distribution systems.
Wireless Networks, 2018

A SA-based parallel method for FPGA placement.
IEICE Electronic Express, 2018

DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations.
CoRR, 2018

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
IJHPCN, 2017

Research on contaminant sources identification of uncertainty water demand using genetic algorithm.
Cluster Computing, 2017

A Spark-based genetic algorithm for sensor placement in large scale drinking water distribution systems.
Cluster Computing, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2016
Fairness in secure computing protocols based on incentives.
Soft Comput., 2016

Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Public-key encryption with keyword search secure against continual memory attacks.
Security and Communication Networks, 2016

Contaminant source identification in water distribution network based on hybrid encoding.
J. Comput. Meth. in Science and Engineering, 2016

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intelligence and Humanized Computing, 2016

Research on Multimodal Optimization Algorithm for the Contamination Source Identification of City Water Distribution Networks.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2015
An Advertiser-Centric Cooperative Mechanism in Smartphone Advertising Based on Stackelberg Game Analysis.
Int. J. Web Service Res., 2015

Multi-keyword ranked searchable public-key encryption.
IJGUC, 2015

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
IJES, 2015

A MapReduce based Parallel Niche Genetic Algorithm for contaminant source identification in water distribution network.
Ad Hoc Networks, 2015

Executing Time and Cost-Aware Task Scheduling in Hybrid Cloud Using a Modified DE Algorithm.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

MR-COF: A Genetic MapReduce Configuration Optimization Framework.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Updatable Hash Proof System and Its Applications.
Proceedings of the Computer Security - ESORICS 2015, 2015

On Participant Selection for Minimum Cost Participatory Urban Sensing with Guaranteed Quality of Information.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Weak-Key Leakage Resilient Cryptography.
IACR Cryptology ePrint Archive, 2014

Stochastic Analysis of Epidemic Routing Based Anycast in Throwbox-Equipped DTNs.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

A GPS Information Sharing System Based on Bluetooth Technology.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014

SAPSN: A Sensor Network for Signal Acquisition and Processing.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A Software-Defined Intelligent Method for Antenna Design.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A Comparison Study of Graph Data Processing Based on MyBSP and MapReduce.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

MyBSP: An Iterative Processing Framework Based on the Cloud Platform for Graph Data.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2013
Research of electronic circuit optimisation design algorithm.
IJCAT, 2013

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptology ePrint Archive, 2013

Swarm Intelligence: Based Cooperation Optimization of Multi-Modal Functions.
Cognitive Computation, 2013

Multi-label Classification based on Particle Swarm Algorithm.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

The design model of evolutionary antenna with finite reflector.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Public Key Encryption with Ranked Multi-keyword Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
JCP, 2012

Applying Support Vector Machine to Time Series Prediction in Oracle.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

Construction of Standard College Tuition Model and Optimization.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

The Effect of Critical Transmission Range in Epidemic Data Propagation for Mobile Ad-hoc Social Network.
Proceedings of the Pervasive Computing and the Networked World, 2012

2011
Multi-swarm co-evolutionary paradigm for dynamic multi-objective optimisation problems.
IJIIDS, 2011

A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Design Electronic Circuits Using Evolutionary Algorithms.
JNIT, 2010

2009
Nominative Proxy Ring Signature.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Multi-swarm Particle Swarm Optimizer with Cauchy Mutation for Dynamic Optimization Problems.
Proceedings of the Advances in Computation and Intelligence, 4th International Symposium, 2009

A New ID-Based Deniable Ring Authentication with Constant-Size Signature.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Representations of Evolutionary Electronics.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Particle Swarm Optimization with Dynamic Dimension Crossover for High Dimensional Problems.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

2007
Forward-Secure Traceable Ring Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Ring Blind Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

An Efficient Threshold Group Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Designing Electronic Circuits by Means of Gene Expression Programming II.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007

Autonomous Robot Path Planning Based on Swarm Intelligence and Stream Functions.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007


  Loading...