Changgen Peng
Orcid: 0000-0001-8733-4596
According to our database1,
Changgen Peng
authored at least 80 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
2024
Wasserstein Generative Adversarial Networks Based Differential Privacy Metaverse Data Sharing.
IEEE J. Biomed. Health Informatics, November, 2024
Des. Codes Cryptogr., November, 2024
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network.
IEEE Internet Things J., October, 2024
An integrated graph data privacy attack framework based on graph neural networks in IoT.
Concurr. Comput. Pract. Exp., September, 2024
Reduction of the semigroup-action problem on a module to the hidden-subgroup problem.
Quantum Inf. Process., August, 2024
Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps.
IEEE Trans. Ind. Informatics, May, 2024
Axioms, April, 2024
Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse.
IEEE Trans. Consumer Electron., February, 2024
Multikeyword-Ranked Search Scheme Supporting Extreme Environments for Internet of Vehicles.
IEEE Internet Things J., February, 2024
Entropy, February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Expert Syst. Appl., 2024
Comput. Commun., 2024
Consortium blockchain private key protection scheme based on rational secret sharing and blockchain.
Comput. Networks, 2024
2023
A reversible and lossless secret image sharing scheme with authentication for color images.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
Entropy, December, 2023
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow.
Mob. Networks Appl., October, 2023
Entropy, September, 2023
Federated Learning Incentive Mechanism Design via Shapley Value and Pareto Optimality.
Axioms, July, 2023
IEEE Trans. Ind. Informatics, May, 2023
Comput. Commun., May, 2023
Image Adversarial Example Generation Method Based on Adaptive Parameter Adjustable Differential Evolution.
Entropy, March, 2023
Biomed. Signal Process. Control., March, 2023
Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings.
IEEE Trans. Consumer Electron., 2023
Privacy-utility equilibrium data generation based on Wasserstein generative adversarial networks.
Inf. Sci., 2023
Int. J. Intell. Syst., 2023
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things.
Concurr. Comput. Pract. Exp., 2023
Concurr. Comput. Pract. Exp., 2023
Secrecy Performance Analysis of Artificial Noise Assisted Secure Transmission for MISO systems with Multiple Eavesdroppers.
Proceedings of the IEEE International Conference on Signal Processing, 2023
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
IEEE Trans. Ind. Informatics, 2022
J. Inf. Sci. Eng., 2022
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022
Future Gener. Comput. Syst., 2022
Entropy, 2022
Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching.
Wirel. Commun. Mob. Comput., 2021
An Efficient Plaintext-Related Chaotic Image Encryption Scheme Based on Compressive Sensing.
Sensors, 2021
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing.
Secur. Commun. Networks, 2021
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.
Secur. Commun. Networks, 2021
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning.
Peer-to-Peer Netw. Appl., 2021
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021
Complex., 2021
An incentive-compatible rational secret sharing scheme using blockchain and smart contract.
Sci. China Inf. Sci., 2021
Res2-Unet: An Enhanced Network for Generalized Nuclear Segmentation in Pathological Images.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021
2020
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration.
Int. Arab J. Inf. Technol., July, 2020
Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms.
Theor. Comput. Sci., 2020
Symmetry, 2020
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals.
Inf. Sci., 2020
Shrinkage estimation for identification of linear components in composite quantile additive models.
Commun. Stat. Simul. Comput., 2020
A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach.
IEEE Access, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection.
Proceedings of the International Conference on Networking and Network Applications, 2020
2019
Int. J. High Perform. Comput. Netw., 2019
Weighted composite quantile regression for single index model with missing covariates at random.
Comput. Stat., 2019
IEEE Access, 2019
Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
User Identity Authentication and Identification Based on Multi-Factor Behavior Features.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018
一种基于隐私偏好的隐私保护模型及其量化方法 (Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference).
计算机科学, 2018
Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise.
KSII Trans. Internet Inf. Syst., 2018
2017
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017
Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated Sequences.
Proceedings of the International Conference on Networking and Network Applications, 2017
Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Proceedings of the International Conference on Networking and Network Applications, 2016
2015
2014
2013
2012
Int. J. Netw. Secur., 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005