Haipeng Qu
Orcid: 0000-0002-1564-8980
According to our database1,
Haipeng Qu
authored at least 58 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Concurr. Comput. Pract. Exp., June, 2024
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., 2024
Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024
Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems.
J. Syst. Archit., September, 2023
Comput. Secur., May, 2023
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023
A Personalized Federated Multi-task Learning Scheme for Encrypted Traffic Classification.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
The Talent Cultivation System for Computer Science by integrating curriculum and industry practice through knowledge ability matrix.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Construction of Hardware Course Group in New Engineering Computer Specialty Facing Complex Engineering Problems.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Proceedings of the Web Information Systems and Applications, 2023
2022
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
Proceedings of the Joint Proceedings of the 10th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2022) & the 6th Software Engineering Education Workshop (SEED 2022) co-located with 29th Asia Pacific Software Engineering Conference 2022, 2022
Proceedings of the Web Information Systems and Applications, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021
Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
2020
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks.
Secur. Commun. Networks, 2020
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks.
Comput. Secur., 2020
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020
Ars Math. Contemp., 2020
Art Discret. Appl. Math., 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
Temperature-sensitive Fingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source Identification.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2019
<i>SLFAT</i>: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames.
Secur. Commun. Networks, 2019
Comput. J., 2019
Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
2018
Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018
Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.
IEICE Trans. Inf. Syst., 2018
Discret. Appl. Math., 2018
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018
Comput. J., 2018
Classification of regular balanced Cayley maps of minimal non-abelian metacyclic groups.
Ars Math. Contemp., 2018
2017
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Comparison of Security Frameworks for Governmental Clouds between United States and European Union.
Proceedings of the 6th International Conference on Communication and Network Security, 2016
2015
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015
2013
Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
2005
Proceedings of the Networking, 2005
1997