default search action
Chunqiang Hu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Hao Chi, Hui Xia, Shuo Xu, Yusheng He, Chunqiang Hu:
FMDADA: Federated multi-discriminative adversarial domain adaptation. Appl. Intell. 54(17-18): 7849-7863 (2024) - [j64]Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu:
FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation. Future Gener. Comput. Syst. 153: 1-11 (2024) - [j63]Biao Xie, Chunqiang Hu, Hongyu Huang, Jiguo Yu, Hui Xia:
DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation. IEEE Internet Things J. 11(8): 13837-13850 (2024) - [j62]Zewei Liu, Chunqiang Hu, Conghao Ruan, Pengfei Hu, Meng Han, Jiguo Yu:
An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication. IEEE Internet Things J. 11(12): 22413-22428 (2024) - [j61]Zewei Liu, Chunqiang Hu, Conghao Ruan, Linghao Zhang, Pengfei Hu, Tao Xiang:
A Privacy-Preserving Matching Service Scheme for Power Data Trading. IEEE Internet Things J. 11(19): 32296-32309 (2024) - [j60]Chunqiang Hu, Huijun Zhuang, Jiajun Chen, Pengfei Hu, Tao Xiang, Jiguo Yu:
Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid. IEEE Trans. Cloud Comput. 12(2): 777-788 (2024) - [j59]Shuo Xu, Hui Xia, Lijuan Xu, Rui Zhang, Chunqiang Hu:
MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users. IEEE Trans. Consumer Electron. 70(1): 3098-3110 (2024) - [j58]Conghao Ruan, Chunqiang Hu, Xingwang Li, Shaojiang Deng, Zewei Liu, Jiguo Yu:
A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse. IEEE Trans. Consumer Electron. 70(1): 3781-3791 (2024) - [j57]Lina Gao, Jiguo Yu, Jianli Zhao, Chunqiang Hu:
A Novel Temporal Privacy-Preserving Model for Social Recommendation. IEEE Trans. Comput. Soc. Syst. 11(5): 5658-5670 (2024) - [j56]Chunqiang Hu, Zewei Liu, Ruinian Li, Pengfei Hu, Tao Xiang, Meng Han:
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(4): 2145-2161 (2024) - [j55]Chunqiang Hu, Jianshuo Liu, Hui Xia, Shaojiang Deng, Jiguo Yu:
A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT. IEEE Trans. Netw. Sci. Eng. 11(2): 2138-2152 (2024) - [j54]Guijuan Wang, Yazhi Zhang, Jiguo Yu, Meijie Ma, Chunqiang Hu, Jianxi Fan, Li Zhang:
HS-DCell: A Highly Scalable DCell-Based Server-Centric Topology for Data Center Networks. IEEE/ACM Trans. Netw. 32(5): 3808-3823 (2024) - [j53]Bin Cai, Weihong Sheng, Jiajun Chen, Chunqiang Hu, Jiguo Yu:
Shortest Paths Publishing With Differential Privacy. IEEE Trans. Sustain. Comput. 9(2): 209-221 (2024) - [i2]Yuwen Pu, Jiahao Chen, Chunyi Zhou, Zhou Feng, Qingming Li, Chunqiang Hu, Shouling Ji:
How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data? CoRR abs/2405.12719 (2024) - [i1]Yuwen Pu, Zhuoyuan Ding, Jiahao Chen, Chunyi Zhou, Qingming Li, Chunqiang Hu, Shouling Ji:
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning. CoRR abs/2405.12751 (2024) - 2023
- [j52]Yaoqi Yang, Bangning Zhang, Daoxing Guo, Weizheng Wang, Xingwang Li, Chunqiang Hu:
PPFO: A Privacy Preservation-oriented Data Freshness Optimization Framework For Mobile Crowdsensing. IEEE Commun. Stand. Mag. 7(4): 34-40 (2023) - [j51]Conghao Ruan, Chunqiang Hu, Ruifeng Zhao, Zewei Liu, Hongyu Huang, Jiguo Yu:
A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management. IEEE Internet Things J. 10(20): 17656-17665 (2023) - [j50]Hongyu Chen, Chunlei Fu, Chunqiang Hu:
An efficient and secure recommendation system based on federated matrix factorization in digital economy. Pers. Ubiquitous Comput. 27(4): 1595-1606 (2023) - [j49]Zewei Liu, Chunqiang Hu, Baolin Wang, Jiajun Chen, Shaojiang Deng, Jiguo Yu:
A Minimizing Energy Consumption Scheme for Real-Time Embedded System Based on Metaheuristic Optimization. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(7): 2276-2289 (2023) - [j48]Zewei Liu, Chunqiang Hu, Ruinian Li, Tao Xiang, Xingwang Li, Jiguo Yu, Hui Xia:
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. IEEE Trans. Cloud Comput. 11(3): 2325-2336 (2023) - [j47]Xingwang Li, Junjie Jiang, Hao Wang, Congzheng Han, Gaojie Chen, Jianhe Du, Chunqiang Hu, Shahid Mumtaz:
Physical Layer Security for Wireless-Powered Ambient Backscatter Cooperative Communication Networks. IEEE Trans. Cogn. Commun. Netw. 9(4): 927-939 (2023) - [j46]Zuobin Xiong, Zhipeng Cai, Chunqiang Hu, Daniel Takabi, Wei Li:
Towards Neural Network-Based Communication System: Attack and Defense. IEEE Trans. Dependable Secur. Comput. 20(4): 3238-3250 (2023) - [j45]Hui Xia, Shu-shu Shao, Chunqiang Hu, Rui Zhang, Tie Qiu, Fu Xiao:
Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network. IEEE Trans. Knowl. Data Eng. 35(5): 5203-5215 (2023) - [c35]Zewei Liu, Chunqiang Hu, Conghao Ruan, Ruinian Li:
A Novel Certificateless Authentication and Key Agreement Protocol for Smart Grid. GLOBECOM 2023: 3288-3293 - [c34]Hongyu Huang, Cui Sun, Xinyu Lei, Nankun Mu, Chunqiang Hu, Chao Chen, Huaqing Li, Yantao Li:
Privacy-Preserving Travel Time Prediction for Internet of Vehicles: A Crowdsensing and Federated Learning Approach. ICONIP (3) 2023: 55-66 - 2022
- [j44]Rui Zhang, Hui Xia, Chunqiang Hu, Cheng Zhang, Chao Liu, Fu Xiao:
Generating Adversarial Examples With Shadow Model. IEEE Trans. Ind. Informatics 18(9): 6283-6289 (2022) - [j43]Zewei Liu, Chunqiang Hu, Hui Xia, Tao Xiang, Baolin Wang, Jiajun Chen:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. IEEE Trans. Netw. Serv. Manag. 19(4): 5196-5207 (2022) - [c33]Baolin Wang, Chunqiang Hu, Zewei Liu:
A Secure Aggregation Scheme for Model Update in Federated Learning. WASA (1) 2022: 500-512 - [c32]Di Jiang, Jiajun Chen, Chunqiang Hu, Yan Lei, Haibo Hu:
A Secure Task Matching Scheme in Crowdsourcing Based on Blockchain. WASA (2) 2022: 514-525 - 2021
- [j42]Haolong Yang, Chunqiang Hu, Guwei Li, Jingchun Fan:
A Fire Escape Simulation System Based on the Dijkstra Algorithm. Comput. Syst. Sci. Eng. 39(3): 365-372 (2021) - [j41]Lan Gao, Shaojiang Deng, Wei Ren, Chunqiang Hu:
Differentially Private Consensus With Quantized Communication. IEEE Trans. Cybern. 51(8): 4075-4088 (2021) - [j40]Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Weifeng Lv:
Achieving Privacy Preservation and Billing via Delayed Information Release. IEEE/ACM Trans. Netw. 29(3): 1376-1390 (2021) - [j39]Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li:
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT. Wirel. Commun. Mob. Comput. 2021: 6682580:1-6682580:16 (2021) - [c31]Haolong Yang, Chunqiang Hu, Qi Diao:
Research on Cotton Impurity Detection Algorithm Based on Image Segmentation. ICAIS (1) 2021: 383-394 - [c30]Hongyu Huang, Hongyuan Zhao, Chunqiang Hu, Chao Chen, Yantao Li:
Find and Dig: A Privacy-Preserving Image Processing Mechanism in Deep Neural Networks for Mobile Computation. IJCNN 2021: 1-8 - [c29]Weiqing Li, Hongyu Chen, Ruifeng Zhao, Chunqiang Hu:
A Federated Recommendation System Based on Local Differential Privacy Clustering. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 364-369 - [c28]Yang Shi, Zewei Liu, Chunqiang Hu, Bin Cai, Binling Xie:
An Efficient and Secure Power Data Trading Scheme Based on Blockchain. WASA (1) 2021: 147-158 - [c27]Wenhao Mou, Chunlei Fu, Yan Lei, Chunqiang Hu:
A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation. WASA (2) 2021: 198-209 - 2020
- [j38]Ningzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei:
An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing. IEEE Access 8: 42805-42815 (2020) - [j37]Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Chunqiang Hu:
Segmented Trajectory Clustering-Based Destination Prediction in IoVs. IEEE Access 8: 98999-99009 (2020) - [j36]Feihong Yang, Ying Wang, Chunlei Fu, Chunqiang Hu, Arwa Alrawais:
An Efficient Blockchain-Based Bidirectional Friends Matching Scheme in Social Networks. IEEE Access 8: 150902-150913 (2020) - [j35]Yuwen Pu, Chunqiang Hu, Shaojiang Deng, Arwa Alrawais:
R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme. IEEE Internet Things J. 7(9): 8077-8089 (2020) - [j34]Chunqiang Hu, Yuwen Pu, Feihong Yang, Ruifeng Zhao, Arwa Alrawais, Tao Xiang:
Secure and Efficient Data Collection and Storage of IoT in Smart Ocean. IEEE Internet Things J. 7(10): 9980-9994 (2020) - [j33]Yuwen Pu, Tao Xiang, Chunqiang Hu, Arwa Alrawais, Hongyang Yan:
An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf. Sci. 540: 308-324 (2020) - [c26]Suhui Liu, Jiguo Yu, Chunqiang Hu, Mengmeng Li:
Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT. WASA (1) 2020: 322-332 - [c25]Ying Wang, Conghao Ruan, Chunqiang Hu:
A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage. WASA (1) 2020: 482-493 - [c24]Feihong Yang, Yuwen Pu, Chunqiang Hu, Yan Zhou:
A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks. WASA (1) 2020: 627-639
2010 – 2019
- 2019
- [j32]Mana Al Reshan, Hang Liu, Chunqiang Hu, Jiguo Yu:
MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks. IEEE Access 7: 78484-78502 (2019) - [j31]Hui Xia, Chun-qiang Hu, Fu Xiao, Xiangguo Cheng, Zhenkuan Pan:
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Comput. Networks 152: 210-220 (2019) - [j30]Liran Ma, Yan Huo, Chunqiang Hu, Wei Li:
Security and Privacy for Smart Cyber-Physical Systems. Secur. Commun. Networks 2019: 7045862:1-7045862:2 (2019) - [j29]Yuwen Pu, Jin Luo, Chunqiang Hu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang:
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wirel. Commun. Mob. Comput. 2019: 3985232:1-3985232:11 (2019) - [c23]Xiuhua Li, Xiaofei Wang, Zhengguo Sheng, Chunqiang Hu, Victor C. M. Leung:
Popularity-prediction-driven hierarchical caching in fog-cloud based radio access networks. ACM TUR-C 2019: 8:1-8:6 - [c22]Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. INFOCOM 2019: 838-846 - [c21]Ningzhi Deng, Shaojiang Deng, Chunqiang Hu, Kaiwen Lei:
An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing. WASA 2019: 84-97 - [c20]Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu, Haibo Hu:
An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. WASA 2019: 247-259 - [c19]Hongyu Huang, Xin Niu, Chao Chen, Chunqiang Hu:
A Differential Private Mechanism to Protect Trajectory Privacy in Mobile Crowd-Sensing. WCNC 2019: 1-6 - 2018
- [j28]Chunqiang Hu, Ruinian Li, Bo Mei, Wei Li, Arwa Alrawais, Rongfang Bie:
Privacy-preserving combinatorial auction without an auctioneer. EURASIP J. Wirel. Commun. Netw. 2018: 38 (2018) - [j27]Tao Jing, Yu Pei, Bowu Zhang, Chunqiang Hu, Yan Huo, Hui Li, Yanfei Lu:
An efficient anonymous batch authentication scheme based on priority and cooperation for VANETs. EURASIP J. Wirel. Commun. Netw. 2018: 277 (2018) - [j26]Fadi Al-Ayed, Chunqiang Hu, Hang Liu:
An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions. Int. J. Netw. Secur. 20(4): 655-663 (2018) - [j25]Yanfei Lu, Xu Wang, Chunqiang Hu, Hui Li, Yan Huo:
A traceable threshold attribute-based signcryption for mHealthcare social network. Int. J. Sens. Networks 26(1): 43-53 (2018) - [j24]Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, Limin Sun:
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids. Math. Found. Comput. 1(1): 77-100 (2018) - [j23]Chengtao Yong, Yan Huo, Chunqiang Hu, Yanfei Lu, Guanlin Jing:
A real-time aggregate data publishing scheme with adaptive ω-event differential privacy. Math. Found. Comput. 1(3): 295-309 (2018) - [j22]Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song, Chunqiang Hu:
Cryptographic algorithms for privacy-preserving online applications. Math. Found. Comput. 1(4): 311-330 (2018) - [j21]Saide Zhu, Wei Li, Hong Li, Chunqiang Hu, Zhipeng Cai:
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining. Math. Found. Comput. 1(4): 393-414 (2018) - [j20]Chunqiang Hu, Wei Li, Xiuzhen Cheng, Jiguo Yu, Shengling Wang, Rongfang Bie:
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds. IEEE Trans. Big Data 4(3): 341-355 (2018) - [j19]Arwa Alrawais, Abdulrahman Alhothaily, Xiuzhen Cheng, Chunqiang Hu, Jiguo Yu:
SecureGuard: A Certificate Validation System in Public Key Infrastructure. IEEE Trans. Veh. Technol. 67(6): 5399-5408 (2018) - [j18]Qin Hu, Shengling Wang, Chunqiang Hu, Jian-Hui Huang, Wei Li, Xiuzhen Cheng:
Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services. IEEE Trans. Veh. Technol. 67(8): 7698-7711 (2018) - [j17]Chunqiang Hu, Hang Liu, Liran Ma, Yan Huo, Arwa Alrawais, Xiuhua Li, Hong Li, Qingyu Xiong:
A Secure and Scalable Data Communication Scheme in Smart Grids. Wirel. Commun. Mob. Comput. 2018 (2018) - [c18]Wei Li, Chunqiang Hu, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai:
Privacy-Preserving Data Collection in Context-Aware Applications. PAC 2018: 75-85 - [c17]Yuwen Pu, Jin Luo, Ying Wang, Chunqiang Hu, Yan Huo, Jiong Zhang:
Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach. PAC 2018: 125-126 - [c16]Jingjing Fan, Yan Huo, Xin Fan, Chunqiang Hu, Guanlin Jing:
A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications. WASA 2018: 103-114 - [c15]Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang:
An Efficient Privacy-Preserving Data Aggregation Scheme for IoT. WASA 2018: 164-176 - 2017
- [j16]Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, Xiaoshuang Xing, Xiuzhen Cheng:
An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access 5: 9131-9138 (2017) - [j15]Abdulrahman Alhothaily, Chunqiang Hu, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng, Dechang Chen:
A Secure and Practical Authentication Scheme Using Personal Devices. IEEE Access 5: 11677-11687 (2017) - [j14]Liang Huang, Xin Fan, Yan Huo, Chunqiang Hu, Yuqi Tian, Jin Qian:
A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI. IEEE Access 5: 26476-26486 (2017) - [j13]Chunqiang Hu, Yan Huo:
Efficient privacy-preserving dot-product computation for mobile big data. IET Commun. 11(5): 704-712 (2017) - [j12]Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, Xiuzhen Cheng:
Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Comput. 21(2): 34-42 (2017) - [j11]Yan Huo, Chunqiang Hu, Xiaowei Qi, Tao Jing:
LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing. IEEE Internet Things J. 4(5): 1117-1124 (2017) - [j10]Kai Xing, Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Fengjuan Zhang:
Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing. IEEE Trans. Ind. Informatics 13(4): 2066-2076 (2017) - [j9]Yan Huo, Yuqi Tian, Chunqiang Hu, Qinghe Gao, Tao Jing:
A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers. Wirel. Commun. Mob. Comput. 2017 (2017) - [c14]Talal Alharbi, Ahamed Aljuhani, Hang Liu, Chunqiang Hu:
Smart and Lightweight DDoS Detection Using NFV. ICCDA 2017: 220-227 - [c13]Honglu Jiang, Jiguo Yu, Chunqiang Hu, Cheng Zhang, Xiuzhen Cheng:
SA Framework based De-anonymization of Social Networks. IIKI 2017: 358-363 - [c12]Abdulrahman Alhothaily, Arwa Alrawais, Chunqiang Hu, Wei Li:
One-Time-Username: A Threshold-based Authentication System. IIKI 2017: 426-432 - [c11]Chunqiang Hu, Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Carl Sturtivant, Hang Liu:
A secure and verifiable outsourcing scheme for matrix inverse computation. INFOCOM 2017: 1-9 - [c10]Chunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, Liping Feng:
An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids. WASA 2017: 469-482 - [c9]Xin Fan, Liang Huang, Yan Huo, Chunqiang Hu, Yuqi Tian, Jin Qian:
Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information. WASA 2017: 483-495 - [c8]Yuqi Tian, Yan Huo, Chunqiang Hu, Qinghe Gao, Tao Jing:
A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers. WASA 2017: 854-859 - 2016
- [j8]Tao Jing, Ping Lin, Yanfei Lu, Chunqiang Hu, Yan Huo:
FPODG: a flexible and private proximity testing based on 'one degree' grid. Int. J. Sens. Networks 20(3): 199-207 (2016) - [j7]Wei Li, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie:
Secure multi-unit sealed first-price auction mechanisms. Secur. Commun. Networks 9(16): 3833-3843 (2016) - [j6]Chunqiang Hu, Hongjuan Li, Yan Huo, Tao Xiang, Xiaofeng Liao:
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks. IEEE Trans. Multi Scale Comput. Syst. 2(2): 94-107 (2016) - [c7]Chunqiang Hu, Ruinian Li, Wei Li, Jiguo Yu, Zhi Tian, Rongfang Bie:
Efficient privacy-preserving schemes for dot-product computation in mobile computing. PAMCO@MobiHoc 2016: 51-59 - 2015
- [c6]Maya Larson, Chunqiang Hu, Ruinian Li, Wei Li, Xiuzhen Cheng:
Secure Auctions without an Auctioneer via Verifiable Secret Sharing. PAMCO@MobiHoc 2015: 1-6 - [c5]Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun:
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. SecureComm 2015: 418-437 - [c4]Maya Larson, Ruinian Li, Chunqiang Hu, Wei Li, Xiuzhen Cheng, Rongfang Bie:
A Bidder-Oriented Privacy-Preserving VCG Auction Scheme. WASA 2015: 284-294 - [c3]Maya Larson, Wei Li, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie:
A Secure Multi-unit Sealed First-Price Auction Mechanism. WASA 2015: 295-304 - 2014
- [j5]Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Chunqiang Hu, Nan Zhang, Weilian Xue:
Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks. IEEE Trans. Parallel Distributed Syst. 25(8): 2190-2200 (2014) - [c2]Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li, Xiao Xiao, Guilin Huang:
A Practically Optimized Implementation of Attribute Based Cryptosystems. TrustCom 2014: 197-204 - 2013
- [j4]Chunqiang Hu, Nan Zhang, Hongjuan Li, Xiuzhen Cheng, Xiaofeng Liao:
Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme. IEEE J. Sel. Areas Commun. 31(9-Supplement): 37-46 (2013) - [j3]Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, Chunqiang Hu:
Outsourcing Large Matrix Inversion Computation to A Public Cloud. IEEE Trans. Cloud Comput. 1(1) (2013) - [c1]Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, Dechang Chen:
OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks. INFOCOM 2013: 2274-2282 - 2012
- [j2]Chunqiang Hu, Xiaofeng Liao, Di Xiao:
Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem. Int. J. Wavelets Multiresolution Inf. Process. 10(3) (2012) - [j1]Chunqiang Hu, Xiaofeng Liao, Xiuzhen Cheng:
Verifiable multi-secret sharing based on LFSR sequences. Theor. Comput. Sci. 445: 52-62 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint