Haipeng Qu

Orcid: 0000-0002-1564-8980

According to our database1, Haipeng Qu authored at least 52 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A systematic review of fuzzing.
Soft Comput., March, 2024

2023
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems.
J. Syst. Archit., September, 2023

Improving transferable adversarial attack via feature-momentum.
Comput. Secur., May, 2023

LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks.
CoRR, 2023

BSGAT: A Graph Attention Network for Binary Code Similarity Detection.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

Deep CNN- RNN with Self- Attention Model for Electric IoT Traffic Classification.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

The Talent Cultivation System for Computer Science by integrating curriculum and industry practice through knowledge ability matrix.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

Construction of Hardware Course Group in New Engineering Computer Specialty Facing Complex Engineering Problems.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

Lazy Machine Unlearning Strategy for Random Forests.
Proceedings of the Web Information Systems and Applications, 2023

2022
AMSFuzz: An adaptive mutation schedule for fuzzing.
Expert Syst. Appl., 2022

Enhancing the Transferability via Feature-Momentum Adversarial Attack.
CoRR, 2022

AcoFuzz: Adaptive Energy Allocation for Greybox Fuzzing.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

A Composite Discover Method for Gadget Chains in Java Deserialization Vulnerability.
Proceedings of the Joint Proceedings of the 10th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2022) & the 6th Software Engineering Education Workshop (SEED 2022) co-located with 29th Asia Pacific Software Engineering Conference 2022, 2022

Spatial Data Publication Under Local Differential Privacy.
Proceedings of the Web Information Systems and Applications, 2022

2021
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021

Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021

Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021

OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

2020
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks.
Secur. Commun. Networks, 2020

BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks.
Comput. Secur., 2020

On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020

Leakage-free ID-Based Signature, Revisited.
Comput. J., 2020

Frobenius groups which are the automorphism groups of orientably-regular maps.
Ars Math. Contemp., 2020

Regular balanced Cayley maps on nonabelian metacyclic groups of odd order.
Art Discret. Appl. Math., 2020

PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range.
Proceedings of the Security and Privacy in Communication Networks, 2020

AFLTurbo: Speed up Path Discovery for Greybox Fuzzing.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Temperature-sensitive Fingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source Identification.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
<i>SLFAT</i>: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames.
Secur. Commun. Networks, 2019

Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.
Comput. J., 2019

Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
Certificateless public key encryption with equality test.
Inf. Sci., 2018

Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018

Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.
IEICE Trans. Inf. Syst., 2018

An efficient RSA-based certificateless public key encryption scheme.
Discret. Appl. Math., 2018

On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018

Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018

Classification of regular balanced Cayley maps of minimal non-abelian metacyclic groups.
Ars Math. Contemp., 2018

2017
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017

A Passive Client-based Approach to Detect Evil Twin Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations.
IACR Cryptol. ePrint Arch., 2016

Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016

Comparison of Security Frameworks for Governmental Clouds between United States and European Union.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

2015
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015

2013
LCCWS: Lightweight Copyfree Cross-layer Web Server.
J. Networks, 2013

Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2009
UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2005
Detecting the Deviations of Privileged Process Execution.
Proceedings of the Networking, 2005

A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005

1997
On isomorphisms of Cayley digraphs on dihedral groups.
Australas. J Comb., 1997


  Loading...