Yanyu Huang

Orcid: 0000-0001-5541-6554

According to our database1, Yanyu Huang authored at least 20 papers between 2016 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption.
IEEE Trans. Dependable Secur. Comput., 2022

Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Searchable Symmetric Encryption with Forward Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Frequency-Hiding Order-Preserving Encryption with Small Client Storage.
Proc. VLDB Endow., 2021

ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM.
Mob. Networks Appl., 2021

Lightweight authentication protocol in edge-based smart grid environment.
EURASIP J. Wirel. Commun. Netw., 2021

A secure authenticated and key exchange scheme for fog computing.
Enterp. Inf. Syst., 2021

Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX.
Sci. China Inf. Sci., 2021

2020
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020

NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme.
IEEE Trans. Knowl. Data Eng., 2020

ℋ ∞ control under asymptotic tracking constraint and nonproper output weights.
Int. J. Control, 2020

2019
FSSE: Forward secure searchable encryption with keyed-block chains.
Inf. Sci., 2019

HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019

Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

2018
DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018

On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A Mutation Approach of Detecting SQL Injection Vulnerabilities.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Generalized Format-Preserving Encryption for Character Data.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016


  Loading...