Chunpeng Ge
Orcid: 0000-0002-9274-7325Affiliations:
- Shandong University, School of Software, Joint SDU-NTU Centre for Artificial Intelligence Research, C-FAIR, Jinan, China
- University of Wollongong, NSW, Austria
- Singapore University ofTechnology and Design, China
- Nanjing University of Aeronautics and Astronautics, China (PhD 2016)
According to our database1,
Chunpeng Ge
authored at least 90 papers
between 2009 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
Comput. Stand. Interfaces, 2026
2025
How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing.
IEEE Internet Things J., June, 2025
IEEE Trans. Serv. Comput., 2025
AdaptiveShard: Enhancing Throughput and Security of Sharded Blockchain With Adaptive Verifiable Coding.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Dependable Secur. Comput., 2025
Efficient privacy-preserving outsourcing of imbalanced clustering in cloud computing.
J. Inf. Secur. Appl., 2025
IEEE Internet Things J., 2025
Beyond Single Tabs: A Transformative Few-Shot Approach to Multi-Tab Website Fingerprinting Attacks.
Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
IEEE Trans. Neural Networks Learn. Syst., November, 2024
Comput. Secur., March, 2024
IEEE Trans. Serv. Comput., 2024
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024
A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024
Knowl. Based Syst., 2024
J. Inf. Secur. Appl., 2024
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024
ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse.
Future Gener. Comput. Syst., 2024
CoRR, 2024
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CARE-EMRs: Efficient and Privacy-Preserving Data Sharing Framework for Electronic Medical Records.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024
Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
2023
Autom. Softw. Eng., November, 2023
Comput. J., September, 2023
ACM Trans. Softw. Eng. Methodol., July, 2023
IEEE Trans. Ind. Informatics, July, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
J. Syst. Softw., 2023
Smart Optimization Solution for Channel Access Attack Defense Under UAV-Aided Heterogeneous Network.
IEEE Internet Things J., 2023
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
2022
RobustFL: Robust Federated Learning Against Poisoning Attacks in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022
Int. J. Intell. Syst., 2022
IEICE Trans. Inf. Syst., 2022
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Symmetry, 2021
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021
Sci. China Inf. Sci., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020
J. Syst. Archit., 2020
J. Parallel Distributed Comput., 2020
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020
A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020
Comput. Secur., 2020
Sci. China Inf. Sci., 2020
2019
Sensors, 2019
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019
Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019
IEEE Access, 2019
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture.
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018
Comput. Electr. Eng., 2018
2017
Comput. Stand. Interfaces, 2017
2016
Comput. J., 2016
2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013
2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012
2011
J. Syst. Softw., 2011
2010
J. Digit. Content Technol. its Appl., 2010
J. Digit. Content Technol. its Appl., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009