Changgen Peng

Orcid: 0000-0001-8733-4596

According to our database1, Changgen Peng authored at least 80 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Ghost-Weight protocol: a highly efficient blockchain consensus for IoT.
J. Supercomput., January, 2025

2024
Wasserstein Generative Adversarial Networks Based Differential Privacy Metaverse Data Sharing.
IEEE J. Biomed. Health Informatics, November, 2024

Cryptanalysis of a key exchange protocol based on a modified tropical structure.
Des. Codes Cryptogr., November, 2024

H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network.
IEEE Internet Things J., October, 2024

An integrated graph data privacy attack framework based on graph neural networks in IoT.
Concurr. Comput. Pract. Exp., September, 2024

Reduction of the semigroup-action problem on a module to the hidden-subgroup problem.
Quantum Inf. Process., August, 2024

Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps.
IEEE Trans. Ind. Informatics, May, 2024

Federated Learning Incentive Mechanism with Supervised Fuzzy Shapley Value.
Axioms, April, 2024

Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse.
IEEE Trans. Consumer Electron., February, 2024

Multikeyword-Ranked Search Scheme Supporting Extreme Environments for Internet of Vehicles.
IEEE Internet Things J., February, 2024

Federated Learning Backdoor Attack Based on Frequency Domain Injection.
Entropy, February, 2024

CP-IPFE: Ciphertext-Policy Based Inner Product Functional Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

A lattice-based data sharing functional encryption scheme with HRA security for IoT.
Expert Syst. Appl., 2024

A dynamic data access control scheme for hierarchical structures in big data.
Comput. Commun., 2024

Consortium blockchain private key protection scheme based on rational secret sharing and blockchain.
Comput. Networks, 2024

2023
A reversible and lossless secret image sharing scheme with authentication for color images.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Stable and Fast Deep Mutual Information Maximization Based on Wasserstein Distance.
Entropy, December, 2023

Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow.
Mob. Networks Appl., October, 2023

Secure Ring Signature Scheme for Privacy-Preserving Blockchain.
Entropy, September, 2023

Federated Learning Incentive Mechanism Design via Shapley Value and Pareto Optimality.
Axioms, July, 2023

Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT.
IEEE Trans. Ind. Informatics, May, 2023

Attribute-based multi-user collaborative searchable encryption in COVID-19.
Comput. Commun., May, 2023

Image Adversarial Example Generation Method Based on Adaptive Parameter Adjustable Differential Evolution.
Entropy, March, 2023

MMSRNet: Pathological image super-resolution by multi-task and multi-scale learning.
Biomed. Signal Process. Control., March, 2023

Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings.
IEEE Trans. Consumer Electron., 2023

Privacy-utility equilibrium data generation based on Wasserstein generative adversarial networks.
Inf. Sci., 2023

Fast and Accurate Deep Leakage from Gradients Based on Wasserstein Distance.
Int. J. Intell. Syst., 2023

Wasserstein Distance-Based Deep Leakage from Gradients.
Entropy, 2023

VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things.
Concurr. Comput. Pract. Exp., 2023

A mobile energy trading scheme based on Lightning Network.
Concurr. Comput. Pract. Exp., 2023

Secrecy Performance Analysis of Artificial Noise Assisted Secure Transmission for MISO systems with Multiple Eavesdroppers.
Proceedings of the IEEE International Conference on Signal Processing, 2023

Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
A Blockchain-Based Machine Learning Framework for Edge Services in IIoT.
IEEE Trans. Ind. Informatics, 2022

Game-based Theory Rational Delegation Learning Scheme.
J. Inf. Sci. Eng., 2022

K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks.
J. Inf. Sci. Eng., 2022

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022

Non-interactive verifiable privacy-preserving federated learning.
Future Gener. Comput. Syst., 2022

GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel.
Entropy, 2022

Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching.
Wirel. Commun. Mob. Comput., 2021

An Efficient Plaintext-Related Chaotic Image Encryption Scheme Based on Compressive Sensing.
Sensors, 2021

Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing.
Secur. Commun. Networks, 2021

Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.
Secur. Commun. Networks, 2021

High-throughput secure multiparty multiplication protocol via bipartite graph partitioning.
Peer-to-Peer Netw. Appl., 2021

Hierarchical identity-based inner product functional encryption.
Inf. Sci., 2021

Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021

An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method.
Complex., 2021

An incentive-compatible rational secret sharing scheme using blockchain and smart contract.
Sci. China Inf. Sci., 2021

Res2-Unet: An Enhanced Network for Generalized Nuclear Segmentation in Pathological Images.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021

2020
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration.
Int. Arab J. Inf. Technol., July, 2020

Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms.
Theor. Comput. Sci., 2020

A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation.
Symmetry, 2020

Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals.
Inf. Sci., 2020

Shrinkage estimation for identification of linear components in composite quantile additive models.
Commun. Stat. Simul. Comput., 2020

A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach.
IEEE Access, 2020

Rational Delegation Learning Outsourcing Scheme Based on Game Theory.
Proceedings of the International Conference on Networking and Network Applications, 2020

Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
A risk adaptive access control model based on Markov for big data in the cloud.
Int. J. High Perform. Comput. Netw., 2019

Weighted composite quantile regression for single index model with missing covariates at random.
Comput. Stat., 2019

Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach.
IEEE Access, 2019

Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

User Identity Authentication and Identification Based on Multi-Factor Behavior Features.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

一种基于隐私偏好的隐私保护模型及其量化方法 (Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference).
计算机科学, 2018

Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise.
KSII Trans. Internet Inf. Syst., 2018

2017
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017

Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated Sequences.
Proceedings of the International Conference on Networking and Network Applications, 2017

Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
一种理性安全协议的博弈逻辑描述模型 (Game Logic Formal Model of Rational Secure Protocol).
计算机科学, 2015

Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015

2014
Universally Composable Secure Group Communication.
IACR Cryptol. ePrint Arch., 2014

2013
A rational framework for secure communication.
Inf. Sci., 2013

Fair (t, n) threshold secret sharing scheme.
IET Inf. Secur., 2013

2012
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings.
Int. J. Netw. Secur., 2012

2011
Secret Sharing Scheme with Fairness.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
A Protocol of Secure Multi-party Multiplication Based on Bilinear Pairing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2005
An Identity-Based Threshold Signcryption Scheme with Semantic Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...