Chengyu Hu

Orcid: 0009-0004-5729-4844

According to our database1, Chengyu Hu authored at least 110 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024

Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024

2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023

Research on Nonlinear Filtering Applied in Integrated Navigation System.
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023

ECG signal denoising based on wavelet threshold algorithm.
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023

Demystifying Decentralized Matrix Communication Network: Ecosystem and Security.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Dimensional Data Publishing With Local Differential Privacy.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

Multi-Level Confidence Learning for Trustworthy Multimodal Classification.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Sensing or Transmission? Stochastic Scheduling of Energy-Harvesting Sensors Toward Zero-Carbon IoT.
IEEE Trans. Green Commun. Netw., 2022

Domain Knowledge-Based Evolutionary Reinforcement Learning for Sensor Placement.
Sensors, 2022

Multi-objective deep reinforcement learning for emergency scheduling in a water distribution network.
Memetic Comput., 2022

A novelty-search-based evolutionary reinforcement learning algorithm for continuous optimization problems.
Memetic Comput., 2022

An ensemble-surrogate assisted cooperative particle swarm optimisation algorithm for water contamination source identification.
Int. J. Bio Inspired Comput., 2022

Design of Portrait System for Road Safety Based on a Dynamic Density Clustering Algorithm.
Proceedings of the Neural Computing for Advanced Applications, 2022

Secure and Efficient Cloud Ciphertext Deduplication Based on SGX.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Evolutionary Multilabel Classification Algorithm Based on Cultural Algorithm.
Symmetry, 2021

Sustainable scheduling of distributed permutation flow-shop with non-identical factory using a knowledge-based multi-objective memetic optimization algorithm.
Swarm Evol. Comput., 2021

Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021

Hyperplane-driven and projection-assisted search for solving many-objective optimization problems.
Inf. Sci., 2021

An indicator and adaptive region division based evolutionary algorithm for many-objective optimization.
Appl. Soft Comput., 2021

TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Solving Nonlinear Equations System With Dynamic Repulsion-Based Evolutionary Algorithms.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Multi-objective based scheduling algorithm for sudden drinking water contamination incident.
Swarm Evol. Comput., 2020

Inline wireless mobile sensors and fog nodes placement for leakage detection in water distribution systems.
Softw. Pract. Exp., 2020

Chaotic-based grey wolf optimizer for numerical and engineering optimization problems.
Memetic Comput., 2020

A decomposition-based differential evolution with reinitialization for nonlinear equations systems.
Knowl. Based Syst., 2020

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

Modified NSGA-III for sensor placement in water distribution system.
Inf. Sci., 2020

Data-driven pollution source location algorithm in water quality monitoring sensor networks.
Int. J. Bio Inspired Comput., 2020

An empirical study of potentially malicious third-party libraries in Android apps.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

A Tile-based Interconnect Model for FPGA Architecture Exploration.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

INTB: A New FPGA Interconnect Model for Architecture Exploration.
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

Multimodal optimization problem in contamination source determination of water supply networks.
Swarm Evol. Comput., 2019

Spark-based intelligent parameter inversion method for prestack seismic data.
Neural Comput. Appl., 2019

Fuzzy neighborhood-based differential evolution with orientation for nonlinear equation systems.
Knowl. Based Syst., 2019

Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019

Real-time localization of pollution source for urban water supply network in emergencies.
Clust. Comput., 2019

Forward Secure Conjunctive-Keyword Searchable Encryption.
IEEE Access, 2019

Public-Key Encryption With Keyword Search via Obfuscation.
IEEE Access, 2019

Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

An Automatic Transistor-Level Tool for GRM FPGA Interconnect Circuits Optimization.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

An Analytical-based Hybrid Algorithm for FPGA Placement.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

Balance of memory footprint and runtime for high-density routing in large-scale FPGAs.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Data Reliability-Aware and Cloud-Assisted Software Infrastructure for Body Area Networks.
Proceedings of the Advances in Body Area Networks I, 2019

2018
A survey on sensor placement for contamination detection in water distribution systems.
Wirel. Networks, 2018

A SA-based parallel method for FPGA placement.
IEICE Electron. Express, 2018

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017

Research on contaminant sources identification of uncertainty water demand using genetic algorithm.
Clust. Comput., 2017

A Spark-based genetic algorithm for sensor placement in large scale drinking water distribution systems.
Clust. Comput., 2017

Multi-objective Optimal Scheduling of Valves and Hydrants for Sudden Drinking Water Pollution Incident.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2016
Fairness in secure computing protocols based on incentives.
Soft Comput., 2016

Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Public-key encryption with keyword search secure against continual memory attacks.
Secur. Commun. Networks, 2016

Contaminant source identification in water distribution network based on hybrid encoding.
J. Comput. Methods Sci. Eng., 2016

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016

Research on Multimodal Optimization Algorithm for the Contamination Source Identification of City Water Distribution Networks.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

2015
An Advertiser-Centric Cooperative Mechanism in Smartphone Advertising Based on Stackelberg Game Analysis.
Int. J. Web Serv. Res., 2015

Multi-keyword ranked searchable public-key encryption.
Int. J. Grid Util. Comput., 2015

Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015

A MapReduce based Parallel Niche Genetic Algorithm for contaminant source identification in water distribution network.
Ad Hoc Networks, 2015

Executing Time and Cost-Aware Task Scheduling in Hybrid Cloud Using a Modified DE Algorithm.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

MR-COF: A Genetic MapReduce Configuration Optimization Framework.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Updatable Hash Proof System and Its Applications.
Proceedings of the Computer Security - ESORICS 2015, 2015

On Participant Selection for Minimum Cost Participatory Urban Sensing with Guaranteed Quality of Information.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Weak-Key Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2014

Stochastic Analysis of Epidemic Routing Based Anycast in Throwbox-Equipped DTNs.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

A GPS Information Sharing System Based on Bluetooth Technology.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014

SAPSN: A Sensor Network for Signal Acquisition and Processing.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A Software-Defined Intelligent Method for Antenna Design.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A Comparison Study of Graph Data Processing Based on MyBSP and MapReduce.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

MyBSP: An Iterative Processing Framework Based on the Cloud Platform for Graph Data.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2013
Research of electronic circuit optimisation design algorithm.
Int. J. Comput. Appl. Technol., 2013

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013

Swarm Intelligence: Based Cooperation Optimization of Multi-Modal Functions.
Cogn. Comput., 2013

Multi-label Classification based on Particle Swarm Algorithm.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

The design model of evolutionary antenna with finite reflector.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Public Key Encryption with Ranked Multi-keyword Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
J. Comput., 2012

Applying Support Vector Machine to Time Series Prediction in Oracle.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

Construction of Standard College Tuition Model and Optimization.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

The Effect of Critical Transmission Range in Epidemic Data Propagation for Mobile Ad-hoc Social Network.
Proceedings of the Pervasive Computing and the Networked World, 2012

2011
Multi-swarm co-evolutionary paradigm for dynamic multi-objective optimisation problems.
Int. J. Intell. Inf. Database Syst., 2011

A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Design Electronic Circuits Using Evolutionary Algorithms.
J. Next Gener. Inf. Technol., 2010

2009
Nominative Proxy Ring Signature.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Multi-swarm Particle Swarm Optimizer with Cauchy Mutation for Dynamic Optimization Problems.
Proceedings of the Advances in Computation and Intelligence, 4th International Symposium, 2009

A New ID-Based Deniable Ring Authentication with Constant-Size Signature.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Representations of Evolutionary Electronics.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Particle Swarm Optimization with Dynamic Dimension Crossover for High Dimensional Problems.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

2007
Forward-Secure Traceable Ring Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Ring Blind Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

An Efficient Threshold Group Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Designing Electronic Circuits by Means of Gene Expression Programming II.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007

Autonomous Robot Path Planning Based on Swarm Intelligence and Stream Functions.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007


  Loading...