Chunfu Jia

Orcid: 0000-0002-5588-9690

According to our database1, Chunfu Jia authored at least 133 papers between 1998 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Efficient privacy-preserving online medical pre-diagnosis based on blockchain.
J. Supercomput., January, 2025

2024
Timed-release encryption anonymous interaction protocol based on smart contract.
J. Cloud Comput., December, 2024

Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system.
J. Cloud Comput., December, 2024

A Controllable Parallel CBC Block Cipher Mode of Operation.
J. Inf. Process. Syst., February, 2024

Efficient and anonymous password-hardened encryption services.
Inf. Sci., January, 2024

A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption.
IEEE Trans. Sustain. Comput., 2024

Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags.
IEEE Trans. Dependable Secur. Comput., 2024

A Security Analysis of Honey Vaults.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2024

A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks.
Proceedings of the IEEE International Conference on Communications, 2024

Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs.
Digit. Commun. Networks, October, 2023

A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model.
Neural Process. Lett., June, 2023

DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain.
IEEE Trans. Cloud Comput., 2023

Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs.
IEEE Trans. Cloud Comput., 2023

A Secure Client-Side Deduplication Scheme Based on Updatable Server-Aided Encryption.
IEEE Trans. Cloud Comput., 2023

An electronic voting scheme based on homomorphic encryption and decentralization.
PeerJ Comput. Sci., 2023

Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023

No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters.
Proceedings of the 32nd USENIX Security Symposium, 2023

PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping.
IEEE Trans. Dependable Secur. Comput., 2022

Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture.
IEEE Trans. Dependable Secur. Comput., 2022

A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm.
PeerJ Comput. Sci., 2022

Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries.
Mob. Networks Appl., 2022

Reliable Password Hardening Service with Opt-Out.
IACR Cryptol. ePrint Arch., 2022

PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.
Proceedings of the Security and Privacy in Communication Networks, 2022

UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Secure Deduplication Against Frequency Analysis Attacks.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

2021
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation.
IEEE Trans. Inf. Forensics Secur., 2021

A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU.
EAI Endorsed Trans. Security Safety, 2021

Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model.
Secur. Commun. Networks, 2021

Privacy-Protection Scheme of a Credit-Investigation System Based on Blockchain.
Entropy, 2021

A secure deduplication scheme based on data popularity with fully random tags.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Homomorphic Modular Reduction and Improved Bootstrapping for BGV Scheme.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems.
Inf. Sci., 2020

AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain.
Comput. Secur., 2020

Secure video retrieval using image query on an untrusted cloud.
Appl. Soft Comput., 2020

Security-Enhanced Timed-Release Encryption in the Random Oracle Model.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Blockchain Based Multi-keyword Similarity Search Scheme over Encrypted Data.
Proceedings of the Security and Privacy in Communication Networks, 2020

Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel.
Proceedings of the Information Security - 23rd International Conference, 2020

PathAFL: Path-Coverage Assisted Fuzzing.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Xmark: Dynamic Software Watermarking Using Collatz Conjecture.
IEEE Trans. Inf. Forensics Secur., 2019

SSIR: Secure similarity image retrieval in IoT.
Inf. Sci., 2019

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019

Password Guessing via Neural Language Modeling.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Effective L-Diversity Anonymization Algorithm Based on Improved Clustering.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Explaining Concept Drift of Deep Learning Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.
Sensors, 2018

Semantic-integrated software watermarking with tamper-proofing.
Multim. Tools Appl., 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Netw. Comput. Appl., 2018

Differentially private Naive Bayes learning over multiple data sources.
Inf. Sci., 2018

Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018

Verifiable searchable encryption with aggregate keys for data sharing system.
Future Gener. Comput. Syst., 2018

K-Anonymity Algorithm Based on Improved Clustering.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Identifying Bitcoin Users Using Deep Neural Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Harden Tamper-Proofing to Combat MATE Attack.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
MMB<sup>cloud</sup>-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Comput., 2017

CDPS: A cryptographic data publishing system.
J. Comput. Syst. Sci., 2017

Hiding Fast Flux Botnet in Plain Email Sight.
Proceedings of the Security and Privacy in Communication Networks, 2017

An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Efficient Format-Preserving Encryption Mode for Integer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Hidden Path: Dynamic Software Watermarking Based on Control Flow Obfuscation.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

CombinedPWD: A New Password Authentication Mechanism Using Separators Between Keystrokes.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

ShadowPWD: practical browser-based password manager with a security token.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2016

Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016

New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016

N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016

An efficient and privacy-preserving location sharing mechanism.
Comput. Stand. Interfaces, 2016

The Approach to Detect Abnormal Access Behavior Based on Naive Bayes Algorithm.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Research and analysis on spatial adaptive strategy of End-hopping system.
J. High Speed Networks, 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
IACR Cryptol. ePrint Arch., 2015

SecLoc: Securing Location-Sensitive Storage in the Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Learning-Based Privacy-Preserving Location Sharing.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Secure Architecture for Data Storage in the Cloud Environments.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Software Watermarking Using Support Vector Machines.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Message from the STPSA 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Software Watermarking using Return-Oriented Programming.
Proceedings of the 10th ACM Symposium on Information, 2015

General Multi-key Searchable Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

SQL-Based Fuzzy Query Mechanism Over Encrypted Database.
Int. J. Data Warehous. Min., 2014

Privacy-preserving data utilization in hybrid clouds.
Future Gener. Comput. Syst., 2014

Enabling efficient and secure data sharing in cloud computing.
Concurr. Comput. Pract. Exp., 2014

Branch Obfuscation Using "Black Boxes".
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Control Flow Obfuscation Using Neural Network to Fight Concolic Testing.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Multi-key Searchable Encryption without Random Oracle.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

B-Mobishare: Privacy-Preserving Location Sharing Mechanism in Mobile Online Social Networks.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

New Data Publishing Framework in the Big Data Environments.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Cycle-walking revisited: consistency, security, and efficiency.
Secur. Commun. Networks, 2013

Secure Storage and Fuzzy Query over Encrypted Databases.
Proceedings of the Network and System Security - 7th International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Research on Spatial Adaptive Strategy of End-Hopping System.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Multi-user Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Format-Preserving Fuzzy Query Mechanism.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Extracting Sent Message Formats from Executables Using Backward Slicing.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Format Compliant Degradation for PNG Image.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Data Masking Generic Model.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Format-Preserving Encryption for Character Data.
J. Networks, 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Branch Obfuscation Using Code Mobility and Signal.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Linear Obfuscation to Combat Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2011, 2011

2009
Performance Evaluation of a Collaborative Intrusion Detection System.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Denial-of-Service Attacks on Host-Based Generic Unpackers.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Full Service Hopping for Proactive Cyber-Defense.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

The Application of the Relative Entropy Density Divergence in Intrusion Detection Models.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Port and Address Hopping for Active Cyber-Defense.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2004
Minimizing weighted earliness and tardiness penalties about a common due date on single machine with exponential processing times.
Proceedings of the 2004 American Control Conference, 2004

2003
Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003

Single machine scheduling with exponential processing times and a general form objective function.
Proceedings of the American Control Conference, 2003

2002
Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.
Proceedings of the American Control Conference, 2002

2001
Stochastic single machine scheduling with an exponentially distributed due date.
Oper. Res. Lett., 2001

1998
Minimizing variation in stochastic flow shop.
Oper. Res. Lett., 1998


  Loading...