Chunpeng Ge

Orcid: 0000-0002-9274-7325

Affiliations:
  • Shandong University, School of Software, Joint SDU-NTU Centre for Artificial Intelligence Research, C-FAIR, Jinan, China
  • University of Wollongong, NSW, Austria
  • Singapore University ofTechnology and Design, China
  • Nanjing University of Aeronautics and Astronautics, China (PhD 2016)


According to our database1, Chunpeng Ge authored at least 90 papers between 2009 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Blockchain-aided secure and fair multi-view data outsourcing computation scheme.
Comput. Stand. Interfaces, 2026

2025
How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing.
IEEE Internet Things J., June, 2025

ADSS: An Available-but-Invisible Data Service Scheme for Fine-Grained Usage Control.
IEEE Trans. Serv. Comput., 2025

AdaptiveShard: Enhancing Throughput and Security of Sharded Blockchain With Adaptive Verifiable Coding.
IEEE Trans. Inf. Forensics Secur., 2025

TextDefense: Adversarial Text Detection Based on Word Importance Score Dispersion.
IEEE Trans. Dependable Secur. Comput., 2025

Efficient privacy-preserving outsourcing of imbalanced clustering in cloud computing.
J. Inf. Secur. Appl., 2025

Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis.
IEEE Internet Things J., 2025

Beyond Single Tabs: A Transformative Few-Shot Approach to Multi-Tab Website Fingerprinting Attacks.
Proceedings of the ACM on Web Conference 2025, 2025

FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Hierarchically Contrastive Hard Sample Mining for Graph Self-Supervised Pretraining.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

Improved privacy-preserving PCA using optimized homomorphic matrix multiplication.
Comput. Secur., March, 2024

GrabPhisher: Phishing Scams Detection in Ethereum via Temporally Evolving GNNs.
IEEE Trans. Serv. Comput., 2024

FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024

Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024

BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024

A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024

SF-CABD: Secure Byzantine fault tolerance federated learning on Non-IID data.
Knowl. Based Syst., 2024

Secure outsourced decryption for FHE-based privacy-preserving cloud computing.
J. Inf. Secur. Appl., 2024

Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024

ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse.
Future Gener. Comput. Syst., 2024

Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System.
CoRR, 2024

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CARE-EMRs: Efficient and Privacy-Preserving Data Sharing Framework for Electronic Medical Records.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024

Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Tips: towards automating patch suggestion for vulnerable smart contracts.
Autom. Softw. Eng., November, 2023

Geometric Searchable Encryption Without False Positive And Its Applications.
Comput. J., September, 2023

Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair.
ACM Trans. Softw. Eng. Methodol., July, 2023

NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0.
IEEE Trans. Ind. Informatics, July, 2023

Privacy-Preserving Classification in Multiple Clouds eHealthcare.
IEEE Trans. Serv. Comput., 2023

Secure Replication-Based Outsourced Computation Using Smart Contracts.
IEEE Trans. Serv. Comput., 2023

Lightweight Privacy-Preserving Federated Incremental Decision Trees.
IEEE Trans. Serv. Comput., 2023

Geometric Searchable Encryption for Privacy-Preserving Location-Based Services.
IEEE Trans. Serv. Comput., 2023

Efficient transformer with code token learner for code clone detection.
J. Syst. Softw., 2023

Smart Optimization Solution for Channel Access Attack Defense Under UAV-Aided Heterogeneous Network.
IEEE Internet Things J., 2023

TextDefense: Adversarial Text Detection based on Word Importance Entropy.
CoRR, 2023

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

2022
RobustFL: Robust Federated Learning Against Poisoning Attacks in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2022

A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022

Robust privacy-preserving federated learning framework for IoT devices.
Int. J. Intell. Syst., 2022

A Privacy-Preserving Data Feed Scheme for Smart Contracts.
IEICE Trans. Inf. Syst., 2022

A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Proceedings of the Network and System Security - 16th International Conference, 2022

CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

An Efficient Login Authentication System against Multiple Attacks in Mobile Devices.
Symmetry, 2021

A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
Sci. China Inf. Sci., 2021

Fully Discover the Balance of Lightning Network Payment Channels.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Multi-Level IoT Device Identification.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

ActAnyware - Blockchain-Based Software Licensing Scheme.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Privacy Protection for Medical Data Sharing in Smart Healthcare.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Achieving reliable timestamp in the bitcoin platform.
Peer-to-Peer Netw. Appl., 2020

Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020

A semi-autonomous distributed blockchain-based framework for UAVs system.
J. Syst. Archit., 2020

A blockchain based decentralized data security mechanism for the Internet of Things.
J. Parallel Distributed Comput., 2020

Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020

A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020

A privacy preserve big data analysis system for wearable wireless sensor network.
Comput. Secur., 2020

A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes.
Sci. China Inf. Sci., 2020

2019
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
Sensors, 2019

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019

Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access, 2019

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
A proxy broadcast re-encryption for cloud data sharing.
Multim. Tools Appl., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

2017
Identity-based conditional proxy re-encryption with fine grain policy.
Comput. Stand. Interfaces, 2017

2016
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Hierarchical conditional proxy re-encryption.
Comput. Stand. Interfaces, 2012

2011
Interactive conditional proxy re-encryption with fine grain policy.
J. Syst. Softw., 2011

2010
Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009


  Loading...