Chunhua Su
Orcid: 0000-0002-6461-9684
According to our database1,
Chunhua Su
authored at least 184 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024
IEEE Internet Things J., March, 2024
ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption.
IEEE Trans. Consumer Electron., February, 2024
IEEE Internet Things J., February, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Emerg. Top. Comput., 2024
A review and implementation of physical layer channel key generation in the Internet of Things.
J. Inf. Secur. Appl., 2024
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping.
Comput. Secur., 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
MEMS Design Process Based Simulation and Analysis of a Hypothetical Sensor Design with Electromechanics Interface.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
2023
A coordinates-based hierarchical computing framework towards spatial data processing.
Comput. Commun., November, 2023
IEEE Trans. Comput. Soc. Syst., August, 2023
Sensors, July, 2023
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023
Smart contract token-based privacy-preserving access control system for industrial Internet of Things.
Digit. Commun. Networks, April, 2023
Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction.
IEEE Consumer Electron. Mag., March, 2023
Comput. Electron. Agric., February, 2023
IEEE Trans. Sustain. Comput., 2023
Correction to: Loss-based differentiation strategy for privacy preserving of social robots.
J. Supercomput., 2023
J. Supercomput., 2023
Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust".
Symmetry, 2023
A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems.
IEEE Internet Things J., 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the 16th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
CNN- and GAN-based classification of malicious code families: A code visualization approach.
Int. J. Intell. Syst., December, 2022
IEEE Trans. Serv. Comput., 2022
DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
IEEE J. Sel. Areas Commun., 2022
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022
Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022
IEICE Trans. Inf. Syst., 2022
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems.
IEICE Trans. Inf. Syst., 2022
IEICE Trans. Inf. Syst., 2022
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022
IEICE Trans. Inf. Syst., 2022
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Proceedings of the Provable and Practical Security, 2022
Privacy-preserving Blockchain-based Global Data Sharing for Federated Learning with Non-IID Data.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint.
Proceedings of the IEEE International Conference on Communications, 2022
WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021
Peer-to-Peer Netw. Appl., 2021
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021
Phys. Commun., 2021
Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment.
IEEE Internet Things J., 2021
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021
Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021
COFEL: Communication-Efficient and Optimized Federated Learning with Local Differential Privacy.
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
J. Supercomput., 2020
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput., 2020
Theor. Comput. Sci., 2020
Design and application of a personal credit information sharing platform based on consortium blockchain.
J. Inf. Secur. Appl., 2020
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things.
J. Inf. Secur. Appl., 2020
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020
Int. J. Inf. Sec., 2020
IEICE Trans. Inf. Syst., 2020
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks.
IEICE Trans. Inf. Syst., 2020
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication.
IEICE Trans. Inf. Syst., 2020
Comput. Secur., 2020
Comput. Secur., 2020
IEEE Commun. Mag., 2020
Sci. China Inf. Sci., 2020
BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst., 2019
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019
Symmetry, 2019
Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring.
Symmetry, 2019
Sensors, 2019
Secur. Commun. Networks, 2019
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries.
J. Univers. Comput. Sci., 2019
KSII Trans. Internet Inf. Syst., 2019
Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
IEEE Access, 2019
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019
A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid.
Proceedings of the Computational Science/Intelligence and Applied Informatics, 2019
Proceedings of the Computational Science/Intelligence and Applied Informatics, 2019
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Symmetry, 2018
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018
J. Inf. Secur. Appl., 2018
Future Gener. Comput. Syst., 2018
IEEE Commun. Mag., 2018
IEEE Access, 2018
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018
A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017
Int. J. Found. Comput. Sci., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.
Proceedings of the Provable Security, 2017
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
IEICE Trans. Inf. Syst., 2016
Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurr. Comput. Pract. Exp., 2016
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Applications and Techniques in Information Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Secur. Commun. Networks, 2014
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
2012
IEICE Trans. Inf. Syst., 2012
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Grey Syst. Theory Appl., 2011
2010
J. Syst. Softw., 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Database Systems for Advanced Applications, 2009
2008
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007