Su Peng

Orcid: 0000-0002-3073-5695

According to our database1, Su Peng authored at least 16 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pick and Trace: Instance Segmentation for Filamentous Objects with a Recurrent Neural Network.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

2022
Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets.
IEEE Trans. Cloud Comput., 2022

2021
Comments on "Efficient Public Verification of Data Integrity for Cloud Storage Systems From Indistinguishability Obfuscation".
IEEE Trans. Inf. Forensics Secur., 2021

Secure Lightweight Stream Data Outsourcing for Internet of Things.
IEEE Internet Things J., 2021

2020
Chameleon accumulator and its applications.
J. Inf. Secur. Appl., 2020

A Review of Routing Protocols for Wireless Body Area Networks for Miner Safety.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas.
J. Netw. Comput. Appl., 2019

Publicly verifiable function secret sharing.
Int. J. Comput. Sci. Eng., 2019

SGX-Based Secure Indexing System.
IEEE Access, 2019

2018
Verifiable Outsourced Computation with Full Delegation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Identity-Based Batch Provable Data Possession with Detailed Analyses.
Int. J. Found. Comput. Sci., 2017

Identity-Based Public Multi-Replica Provable Data Possession.
IEEE Access, 2017

Private Graph Intersection Protocol.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2016

Identity-Based Batch Provable Data Possession.
Proceedings of the Provable Security, 2016

2014
Security-aware intermediate data placement strategy in scientific cloud workflows.
Knowl. Inf. Syst., 2014


  Loading...