Chengyu Hu
Orcid: 0000-0001-8226-5747
According to our database1,
Chengyu Hu
authored at least 118 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
MST-ARGCN: modality-squeeze transformer with attentional recurrent graph capsule network for multimodal sentiment analysis.
J. Supercomput., January, 2025
2024
Learning-Driven Dynamic Multimodal Optimization Algorithm for Real-Time Traceability of Water Pollution.
IEEE Trans. Artif. Intell., June, 2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024
Constrained multi-objective optimization with dual-swarm assisted competitive swarm optimizer.
Swarm Evol. Comput., 2024
Deep and wide search assisted evolutionary algorithm with reference vector guidance for many-objective optimization.
Swarm Evol. Comput., 2024
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning.
Neural Networks, 2024
TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations.
Proceedings of the IEEE International Conference on Software Analysis, 2024
2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023
Load Optimization Scheduling of Chip Mounter Based on Hybrid Adaptive Optimization Algorithm.
Complex Syst. Model. Simul., 2023
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Sensing or Transmission? Stochastic Scheduling of Energy-Harvesting Sensors Toward Zero-Carbon IoT.
IEEE Trans. Green Commun. Netw., 2022
Sensors, 2022
Multi-objective deep reinforcement learning for emergency scheduling in a water distribution network.
Memetic Comput., 2022
A novelty-search-based evolutionary reinforcement learning algorithm for continuous optimization problems.
Memetic Comput., 2022
An ensemble-surrogate assisted cooperative particle swarm optimisation algorithm for water contamination source identification.
Int. J. Bio Inspired Comput., 2022
Dynamic Scheduling Algorithm Based on Evolutionary Reinforcement Learning for Sudden Contaminant Events Under Uncertain Environment.
Complex Syst. Model. Simul., 2022
Design of Portrait System for Road Safety Based on a Dynamic Density Clustering Algorithm.
Proceedings of the Neural Computing for Advanced Applications, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
Symmetry, 2021
Sustainable scheduling of distributed permutation flow-shop with non-identical factory using a knowledge-based multi-objective memetic optimization algorithm.
Swarm Evol. Comput., 2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021
Hyperplane-driven and projection-assisted search for solving many-objective optimization problems.
Inf. Sci., 2021
An indicator and adaptive region division based evolutionary algorithm for many-objective optimization.
Appl. Soft Comput., 2021
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Solving Nonlinear Equations System With Dynamic Repulsion-Based Evolutionary Algorithms.
IEEE Trans. Syst. Man Cybern. Syst., 2020
Multi-objective based scheduling algorithm for sudden drinking water contamination incident.
Swarm Evol. Comput., 2020
Inline wireless mobile sensors and fog nodes placement for leakage detection in water distribution systems.
Softw. Pract. Exp., 2020
Chaotic-based grey wolf optimizer for numerical and engineering optimization problems.
Memetic Comput., 2020
A decomposition-based differential evolution with reinitialization for nonlinear equations systems.
Knowl. Based Syst., 2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
Data-driven pollution source location algorithm in water quality monitoring sensor networks.
Int. J. Bio Inspired Comput., 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
Multimodal optimization problem in contamination source determination of water supply networks.
Swarm Evol. Comput., 2019
Neural Comput. Appl., 2019
Fuzzy neighborhood-based differential evolution with orientation for nonlinear equation systems.
Knowl. Based Syst., 2019
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019
Real-time localization of pollution source for urban water supply network in emergencies.
Clust. Comput., 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
Balance of memory footprint and runtime for high-density routing in large-scale FPGAs.
Proceedings of the 13th IEEE International Conference on ASIC, 2019
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Data Reliability-Aware and Cloud-Assisted Software Infrastructure for Body Area Networks.
Proceedings of the Advances in Body Area Networks I, 2019
2018
A survey on sensor placement for contamination detection in water distribution systems.
Wirel. Networks, 2018
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017
Research on contaminant sources identification of uncertainty water demand using genetic algorithm.
Clust. Comput., 2017
A Spark-based genetic algorithm for sensor placement in large scale drinking water distribution systems.
Clust. Comput., 2017
Multi-objective Optimal Scheduling of Valves and Hydrants for Sudden Drinking Water Pollution Incident.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016
Secur. Commun. Networks, 2016
Contaminant source identification in water distribution network based on hybrid encoding.
J. Comput. Methods Sci. Eng., 2016
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016
Research on Multimodal Optimization Algorithm for the Contamination Source Identification of City Water Distribution Networks.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016
2015
An Advertiser-Centric Cooperative Mechanism in Smartphone Advertising Based on Stackelberg Game Analysis.
Int. J. Web Serv. Res., 2015
Int. J. Grid Util. Comput., 2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015
A MapReduce based Parallel Niche Genetic Algorithm for contaminant source identification in water distribution network.
Ad Hoc Networks, 2015
Executing Time and Cost-Aware Task Scheduling in Hybrid Cloud Using a Modified DE Algorithm.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
On Participant Selection for Minimum Cost Participatory Urban Sensing with Guaranteed Quality of Information.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the International Conference on Cloud Computing and Big Data, 2014
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014
2013
Int. J. Comput. Appl. Technol., 2013
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013
Cogn. Comput., 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
J. Comput., 2012
Proceedings of the Computational Intelligence and Intelligent Systems, 2012
Proceedings of the Computational Intelligence and Intelligent Systems, 2012
The Effect of Critical Transmission Range in Epidemic Data Propagation for Mobile Ad-hoc Social Network.
Proceedings of the Pervasive Computing and the Networked World, 2012
2011
Multi-swarm co-evolutionary paradigm for dynamic multi-objective optimisation problems.
Int. J. Intell. Inf. Database Syst., 2011
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2010
J. Next Gener. Inf. Technol., 2010
2009
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009
Multi-swarm Particle Swarm Optimizer with Cauchy Mutation for Dynamic Optimization Problems.
Proceedings of the Advances in Computation and Intelligence, 4th International Symposium, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008
Particle Swarm Optimization with Dynamic Dimension Crossover for High Dimensional Problems.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
An Efficient Threshold Group Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007