Chunpeng Ge

Orcid: 0000-0002-9274-7325

According to our database1, Chunpeng Ge authored at least 87 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hierarchically Contrastive Hard Sample Mining for Graph Self-Supervised Pretraining.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

Improved privacy-preserving PCA using optimized homomorphic matrix multiplication.
Comput. Secur., March, 2024

FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024

Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024

BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024

A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024

SF-CABD: Secure Byzantine fault tolerance federated learning on Non-IID data.
Knowl. Based Syst., 2024

Secure outsourced decryption for FHE-based privacy-preserving cloud computing.
J. Inf. Secur. Appl., 2024

Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024

ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse.
Future Gener. Comput. Syst., 2024

Optimized Homomorphic Vector Permutation From New Decomposition Techniques.
CoRR, 2024

Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System.
CoRR, 2024

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Tips: towards automating patch suggestion for vulnerable smart contracts.
Autom. Softw. Eng., November, 2023

Geometric Searchable Encryption Without False Positive And Its Applications.
Comput. J., September, 2023

Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair.
ACM Trans. Softw. Eng. Methodol., July, 2023

NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0.
IEEE Trans. Ind. Informatics, July, 2023

Privacy-Preserving Classification in Multiple Clouds eHealthcare.
IEEE Trans. Serv. Comput., 2023

Secure Replication-Based Outsourced Computation Using Smart Contracts.
IEEE Trans. Serv. Comput., 2023

Lightweight Privacy-Preserving Federated Incremental Decision Trees.
IEEE Trans. Serv. Comput., 2023

Geometric Searchable Encryption for Privacy-Preserving Location-Based Services.
IEEE Trans. Serv. Comput., 2023

Efficient transformer with code token learner for code clone detection.
J. Syst. Softw., 2023

Smart Optimization Solution for Channel Access Attack Defense Under UAV-Aided Heterogeneous Network.
IEEE Internet Things J., 2023

TextDefense: Adversarial Text Detection based on Word Importance Entropy.
CoRR, 2023

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

2022
RobustFL: Robust Federated Learning Against Poisoning Attacks in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2022

A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022

Robust privacy-preserving federated learning framework for IoT devices.
Int. J. Intell. Syst., 2022

A Privacy-Preserving Data Feed Scheme for Smart Contracts.
IEICE Trans. Inf. Syst., 2022

A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Proceedings of the Network and System Security - 16th International Conference, 2022

CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

An Efficient Login Authentication System against Multiple Attacks in Mobile Devices.
Symmetry, 2021

Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment.
Mob. Networks Appl., 2021

A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
Sci. China Inf. Sci., 2021

Fully Discover the Balance of Lightning Network Payment Channels.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Multi-Level IoT Device Identification.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

ActAnyware - Blockchain-Based Software Licensing Scheme.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Privacy Protection for Medical Data Sharing in Smart Healthcare.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Achieving reliable timestamp in the bitcoin platform.
Peer-to-Peer Netw. Appl., 2020

Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020

A semi-autonomous distributed blockchain-based framework for UAVs system.
J. Syst. Archit., 2020

A blockchain based decentralized data security mechanism for the Internet of Things.
J. Parallel Distributed Comput., 2020

Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020

A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020

Application research on service innovation and entrepreneurship education in university libraries and archives.
Int. J. Comput. Sci. Eng., 2020

A privacy preserve big data analysis system for wearable wireless sensor network.
Comput. Secur., 2020

A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes.
Sci. China Inf. Sci., 2020

2019
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
Sensors, 2019

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019

A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019

Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019

Permissionless Blockchains and Secure Logging.
CoRR, 2019

QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs.
IEEE Access, 2019

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access, 2019

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture.
Proceedings of the Network and System Security - 13th International Conference, 2019

Permission less Block chains and Secure Logging.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2018
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.
Secur. Commun. Networks, 2018

A proxy broadcast re-encryption for cloud data sharing.
Multim. Tools Appl., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Privacy preserving cloud data sharing system with flexible control.
Comput. Electr. Eng., 2018

2017
Identity-based conditional proxy re-encryption with fine grain policy.
Comput. Stand. Interfaces, 2017

2016
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013

Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013

2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012

Hierarchical conditional proxy re-encryption.
Comput. Stand. Interfaces, 2012

2011
Interactive conditional proxy re-encryption with fine grain policy.
J. Syst. Softw., 2011

2010
Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010

Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009


  Loading...