Hanyu Quan

Orcid: 0000-0003-0479-5384

According to our database1, Hanyu Quan authored at least 16 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Public auditing of log integrity for shared cloud storage systems via blockchain.
Wirel. Networks, October, 2024

2023
FastReach: A system for privacy-preserving reachability queries over location data.
Comput. Secur., December, 2023

Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning.
Comput. Electr. Eng., October, 2023

Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0.
Int. J. Intell. Syst., 2023

2022
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data.
ACM Trans. Internet Techn., November, 2022

Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network.
IEEE Signal Process. Lett., 2022

A Novel Global-Local Representations Network for Speech Steganalysis.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

2020
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Data Auditing for the Internet of Things Environments Leveraging Smart Contract.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
IACR Cryptol. ePrint Arch., 2017

2016
SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area.
KSII Trans. Internet Inf. Syst., 2016

2015
Lightweight handover authentication with location privacy-preserving in mobile wireless networks.
Int. J. Embed. Syst., 2015


  Loading...