Chunqiang Hu

Orcid: 0000-0001-5825-2241

According to our database1, Chunqiang Hu authored at least 105 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Attention-guided model for mitral regurgitation analysis based on multi-task learning.
Biomed. Signal Process. Control., 2025

2024
HS-DCell: A Highly Scalable DCell-Based Server-Centric Topology for Data Center Networks.
IEEE/ACM Trans. Netw., October, 2024

A Novel Temporal Privacy-Preserving Model for Social Recommendation.
IEEE Trans. Comput. Soc. Syst., October, 2024

A Privacy-Preserving Matching Service Scheme for Power Data Trading.
IEEE Internet Things J., October, 2024

FMDADA: Federated multi-discriminative adversarial domain adaptation.
Appl. Intell., September, 2024

An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication.
IEEE Internet Things J., June, 2024

DCI-PFGL: Decentralized Cross-Institutional Personalized Federated Graph Learning for IoT Service Recommendation.
IEEE Internet Things J., April, 2024

MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users.
IEEE Trans. Consumer Electron., February, 2024

A Revocable and Fair Outsourcing Attribute-Based Access Control Scheme in Metaverse.
IEEE Trans. Consumer Electron., February, 2024

Shortest Paths Publishing With Differential Privacy.
IEEE Trans. Sustain. Comput., 2024

A Lightweight Mutual Privacy Preserving $k$-Means Clustering in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2024

Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024

Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid.
IEEE Trans. Cloud Comput., 2024

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation.
Future Gener. Comput. Syst., 2024

A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning.
CoRR, 2024

How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data?
CoRR, 2024

FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Secret Sharing Based Key Agreement Protocol for Body Area Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

2023
PPFO: A Privacy Preservation-oriented Data Freshness Optimization Framework For Mobile Crowdsensing.
IEEE Commun. Stand. Mag., December, 2023

A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management.
IEEE Internet Things J., October, 2023

Physical Layer Security for Wireless-Powered Ambient Backscatter Cooperative Communication Networks.
IEEE Trans. Cogn. Commun. Netw., August, 2023

An efficient and secure recommendation system based on federated matrix factorization in digital economy.
Pers. Ubiquitous Comput., August, 2023

A Minimizing Energy Consumption Scheme for Real-Time Embedded System Based on Metaheuristic Optimization.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2023

Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network.
IEEE Trans. Knowl. Data Eng., May, 2023

Towards Neural Network-Based Communication System: Attack and Defense.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment.
IEEE Trans. Cloud Comput., 2023

Privacy-Preserving Travel Time Prediction for Internet of Vehicles: A Crowdsensing and Federated Learning Approach.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

A Novel Certificateless Authentication and Key Agreement Protocol for Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2023

2022
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading.
IEEE Trans. Netw. Serv. Manag., December, 2022

Generating Adversarial Examples With Shadow Model.
IEEE Trans. Ind. Informatics, 2022

A Secure Aggregation Scheme for Model Update in Federated Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

A Secure Task Matching Scheme in Crowdsourcing Based on Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT.
Wirel. Commun. Mob. Comput., 2021

Achieving Privacy Preservation and Billing via Delayed Information Release.
IEEE/ACM Trans. Netw., 2021

Differentially Private Consensus With Quantized Communication.
IEEE Trans. Cybern., 2021

A Fire Escape Simulation System Based on the Dijkstra Algorithm.
Comput. Syst. Sci. Eng., 2021

An Efficient and Secure Power Data Trading Scheme Based on Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Federated Recommendation System Based on Local Differential Privacy Clustering.
Proceedings of the 2021 IEEE SmartWorld, 2021

Find and Dig: A Privacy-Preserving Image Processing Mechanism in Deep Neural Networks for Mobile Computation.
Proceedings of the International Joint Conference on Neural Networks, 2021

Research on Cotton Impurity Detection Algorithm Based on Image Segmentation.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
An efficient blockchain-based privacy preserving scheme for vehicular social networks.
Inf. Sci., 2020

R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme.
IEEE Internet Things J., 2020

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean.
IEEE Internet Things J., 2020

An Efficient Blockchain-Based Bidirectional Friends Matching Scheme in Social Networks.
IEEE Access, 2020

Segmented Trajectory Clustering-Based Destination Prediction in IoVs.
IEEE Access, 2020

An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing.
IEEE Access, 2020

A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2019
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT.
Wirel. Commun. Mob. Comput., 2019

Security and Privacy for Smart Cyber-Physical Systems.
Secur. Commun. Networks, 2019

An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Comput. Networks, 2019

MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks.
IEEE Access, 2019

A Differential Private Mechanism to Protect Trajectory Privacy in Mobile Crowd-Sensing.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Efficient and Recoverable Data Sharing Mechanism for Edge Storage.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Popularity-prediction-driven hierarchical caching in fog-cloud based radio access networks.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
A Secure and Scalable Data Communication Scheme in Smart Grids.
Wirel. Commun. Mob. Comput., 2018

Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services.
IEEE Trans. Veh. Technol., 2018

SecureGuard: A Certificate Validation System in Public Key Infrastructure.
IEEE Trans. Veh. Technol., 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining.
Math. Found. Comput., 2018

A real-time aggregate data publishing scheme with adaptive <i>ω</i>-event differential privacy.
Math. Found. Comput., 2018

Cryptographic algorithms for privacy-preserving online applications.
Math. Found. Comput., 2018

CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018

A traceable threshold attribute-based signcryption for mHealthcare social network.
Int. J. Sens. Networks, 2018

An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions.
Int. J. Netw. Secur., 2018

An efficient anonymous batch authentication scheme based on priority and cooperation for VANETs.
EURASIP J. Wirel. Commun. Netw., 2018

Privacy-preserving combinatorial auction without an auctioneer.
EURASIP J. Wirel. Commun. Netw., 2018

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Privacy-Preserving Data Collection in Context-Aware Applications.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

2017
A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers.
Wirel. Commun. Mob. Comput., 2017

Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing.
IEEE Trans. Ind. Informatics, 2017

LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing.
IEEE Internet Things J., 2017

Fog Computing for the Internet of Things: Security and Privacy Issues.
IEEE Internet Comput., 2017

Efficient privacy-preserving dot-product computation for mobile big data.
IET Commun., 2017

A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI.
IEEE Access, 2017

An Attribute-Based Encryption Scheme to Secure Fog Communications.
IEEE Access, 2017

A Secure and Practical Authentication Scheme Using Personal Devices.
IEEE Access, 2017

A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A secure and verifiable outsourcing scheme for matrix inverse computation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

SA Framework based De-anonymization of Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

One-Time-Username: A Threshold-based Authentication System.
Proceedings of the 2017 International Conference on Identification, 2017

Smart and Lightweight DDoS Detection Using NFV.
Proceedings of the International Conference on Compute and Data Analysis, 2017

2016
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks.
IEEE Trans. Multi Scale Comput. Syst., 2016

Secure multi-unit sealed first-price auction mechanisms.
Secur. Commun. Networks, 2016

FPODG: a flexible and private proximity testing based on 'one degree' grid.
Int. J. Sens. Networks, 2016

Efficient privacy-preserving schemes for dot-product computation in mobile computing.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

2015
A Secure Multi-unit Sealed First-Price Auction Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Bidder-Oriented Privacy-Preserving VCG Auction Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Secure Auctions without an Auctioneer via Verifiable Secret Sharing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

2014
Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

A Practically Optimized Implementation of Attribute Based Cryptosystems.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Outsourcing Large Matrix Inversion Computation to A Public Cloud.
IEEE Trans. Cloud Comput., 2013

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme.
IEEE J. Sel. Areas Commun., 2013

OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Verifiable multi-secret sharing based on LFSR sequences.
Theor. Comput. Sci., 2012

Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem.
Int. J. Wavelets Multiresolution Inf. Process., 2012


  Loading...