Chunpeng Ge
Orcid: 0000-0002-9274-7325
According to our database1,
Chunpeng Ge
authored at least 87 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Neural Networks Learn. Syst., November, 2024
Comput. Secur., March, 2024
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024
A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024
Knowl. Based Syst., 2024
J. Inf. Secur. Appl., 2024
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024
ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse.
Future Gener. Comput. Syst., 2024
CoRR, 2024
CoRR, 2024
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
2023
Autom. Softw. Eng., November, 2023
Comput. J., September, 2023
ACM Trans. Softw. Eng. Methodol., July, 2023
IEEE Trans. Ind. Informatics, July, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
J. Syst. Softw., 2023
Smart Optimization Solution for Channel Access Attack Defense Under UAV-Aided Heterogeneous Network.
IEEE Internet Things J., 2023
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
2022
RobustFL: Robust Federated Learning Against Poisoning Attacks in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022
Int. J. Intell. Syst., 2022
IEICE Trans. Inf. Syst., 2022
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Symmetry, 2021
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment.
Mob. Networks Appl., 2021
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021
Sci. China Inf. Sci., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020
J. Syst. Archit., 2020
J. Parallel Distributed Comput., 2020
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020
A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020
Application research on service innovation and entrepreneurship education in university libraries and archives.
Int. J. Comput. Sci. Eng., 2020
Comput. Secur., 2020
Sci. China Inf. Sci., 2020
2019
Sensors, 2019
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019
Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019
QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs.
IEEE Access, 2019
IEEE Access, 2019
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
2018
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.
Secur. Commun. Networks, 2018
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018
Comput. Electr. Eng., 2018
2017
Comput. Stand. Interfaces, 2017
2016
Comput. J., 2016
2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013
2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012
2011
J. Syst. Softw., 2011
2010
J. Digit. Content Technol. its Appl., 2010
J. Digit. Content Technol. its Appl., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009