


default search action
Chengyu Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Chengyu Hu 0001
— Shandong University, Qingdao, China - Chengyu Hu 0002
— China University of Geosciences, Wuhan, China - Chengyu Hu 0003
— Xijing University, Xi'an, China - Chengyu Hu 0004
— Xijing University, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j15]Qingqiang Qi, Xingye Yang, Chengyu Hu, Peng Tang, Zhiyuan Su, Shanqing Guo:
FLDS: differentially private federated learning with double shufflers. Comput. J. 68(4): 431-443 (2025)
[j14]Chengyu Hu, Jin Liu, Xingye Li, Meijing Li, Huihua He:
MST-ARGCN: modality-squeeze transformer with attentional recurrent graph capsule network for multimodal sentiment analysis. J. Supercomput. 81(1): 86 (2025)
[c28]Xinglin Du, Peng Tang, Rui Chen, Ning Wang, Chengyu Hu, Shanqing Guo:
Query Rewriting-Based View Generation for Efficient Multi-Relation Multi-Query with Differential Privacy. EDBT 2025: 576-588- 2024
[j13]Guiyun Qin, Limin Li, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party. Trans. Emerg. Telecommun. Technol. 35(4) (2024)
[j12]Zhaoxing Han
, Chengyu Hu, Tongyaqi Li
, Qingqiang Qi, Peng Tang
, Shanqing Guo:
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning. Neural Networks 179: 106574 (2024)
[c27]Zhen Zhao, Xiangpu Song, Qiuyu Zhong, Yingpei Zeng, Chengyu Hu, Shanqing Guo:
TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations. SANER 2024: 918-928- 2023
[c26]Xiao Zheng, Chang Tang, Zhiguo Wan, Chengyu Hu, Wei Zhang:
Multi-Level Confidence Learning for Trustworthy Multimodal Classification. AAAI 2023: 11381-11389
[c25]Gaoyuan Liu, Peng Tang, Chengyu Hu, Chongshi Jin, Shanqing Guo:
Multi-Dimensional Data Publishing With Local Differential Privacy. EDBT 2023: 183-194
[c24]Fengyan Lv, Cheng Liu, Xiaofeng Liu, Chengyu Hu, Zhihao Chen, Shanqing Guo:
ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications. ICC 2023: 5234-5239
[c23]Tengxiao Yang, Song Lian, Qiong Jia, Chengyu Hu, Shanqing Guo:
Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks. ICONIP (15) 2023: 152-164- 2022
[c22]Limin Li, Guiyun Qin, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Secure and Efficient Cloud Ciphertext Deduplication Based on SGX. ICPADS 2022: 696-703- 2021
[j11]Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mob. Networks Appl. 26(6): 2490-2500 (2021)- 2020
[c21]Chengyu Hu, Qinghua Duan, Peng Lu, Wei Liu, Jian Wang, Jinmei Lai:
INTB: A New FPGA Interconnect Model for Architecture Exploration. FPGA 2020: 325
[c20]Chengyu Hu, Qinghua Duan, Peng Lu, Wei Liu, Jian Wang, Jinmei Lai:
A Tile-based Interconnect Model for FPGA Architecture Exploration. ACM Great Lakes Symposium on VLSI 2020: 113-118
[c19]Zicheng Zhang
, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li:
An empirical study of potentially malicious third-party libraries in Android apps. WISEC 2020: 144-154
2010 – 2019
- 2019
[j10]Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li, Fanyu Kong:
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. J. Supercomput. 75(6): 3099-3122 (2019)
[c18]Wei Liu, Weilin Cong, Chengyu Hu, Peng Lu, Jinmei Lai:
Balance of memory footprint and runtime for high-density routing in large-scale FPGAs. ASICON 2019: 1-4
[c17]Zhengjie Li, Yuanlong Xiao
, Yufan Zhang, Yunbing Pang, Chengyu Hu, Jian Wang, Jinmei Lai:
An Automatic Transistor-Level Tool for GRM FPGA Interconnect Circuits Optimization. ACM Great Lakes Symposium on VLSI 2019: 93-98
[c16]Chengyu Hu, Qinghua Duan, Liran Hu, Peng Lu, Zhengjie Li, Meng Yang, Jian Wang, Jinmei Lai:
An Analytical-based Hybrid Algorithm for FPGA Placement. ACM Great Lakes Symposium on VLSI 2019: 351-354
[c15]Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou:
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. ICCNS 2019: 123-127- 2018
[j9]Chengyu Hu, Peng Lu, Meng Yang, Jian Wang, Jinmei Lai:
A SA-based parallel method for FPGA placement. IEICE Electron. Express 15(24): 20180943 (2018)
[c14]Chao Chen, Wenrui Diao
, Yingpei Zeng, Shanqing Guo, Chengyu Hu:
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations. ICSME 2018: 48-58
[i3]Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu:
DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations. CoRR abs/1808.05444 (2018)- 2017
[j8]Chengyu Hu, Pengtao Liu, Shanqing Guo, Qiuliang Xu:
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. Int. J. High Perform. Comput. Netw. 10(3): 226-239 (2017)
[c13]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499- 2016
[j7]Chengyu Hu, Pengtao Liu, Shanqing Guo:
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. J. Ambient Intell. Humaniz. Comput. 7(5): 681-692 (2016)
[j6]Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu:
Public-key encryption with keyword search secure against continual memory attacks. Secur. Commun. Networks 9(11): 1613-1629 (2016)
[j5]Yilei Wang, Leisi Chen, Ho-fung Leung, Chengyu Hu, Beijing Chen:
Fairness in secure computing protocols based on incentives. Soft Comput. 20(10): 3947-3955 (2016)
[j4]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016)- 2015
[j3]Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan:
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption. Int. J. Embed. Syst. 7(3/4): 216-229 (2015)
[j2]Chengyu Hu, Bo Yang, Pengtao Liu:
Multi-keyword ranked searchable public-key encryption. Int. J. Grid Util. Comput. 6(3/4): 221-231 (2015)
[c12]Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:
Anonymous Identity-Based Encryption with Bounded Leakage Resilience. AINA Workshops 2015: 287-292
[c11]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285- 2014
[c10]Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang:
How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? ICICS 2014: 200-214
[i2]Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan:
Weak-Key Leakage Resilient Cryptography. IACR Cryptol. ePrint Arch. 2014: 159 (2014)- 2013
[c9]Chengyu Hu, Pengtao Liu:
Public Key Encryption with Ranked Multi-keyword Search. INCoS 2013: 109-113
[i1]Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng:
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function. IACR Cryptol. ePrint Arch. 2013: 802 (2013)- 2012
[j1]Chengyu Hu, Pengtao Liu:
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions. J. Comput. 7(3): 716-723 (2012)
[c8]Xiangning Wu, Xuan Hu, Chengyu Hu, Guiling Li:
Applying Support Vector Machine to Time Series Prediction in Oracle. ISICA 2012: 101-110- 2011
[c7]Chengyu Hu, Pengtao Liu:
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension. CSEE (2) 2011: 131-136
[e2]Zhihua Cai, Chengyu Hu, Zhuo Kang, Yong Liu:
Advances in Computation and Intelligence - 5th International Symposium, ISICA 2010, Wuhan, China, October 22-24, 2010. Proceedings. Lecture Notes in Computer Science 6382, Springer 2011, ISBN 978-3-642-16492-7 [contents]- 2010
[e1]Zhihua Cai, Chengyu Hu, Zhuo Kang, Yong Liu:
Computational Intelligence and Intelligent Systems - 5th International Symposium, ISICA 2010, Wuhan, China, October 22-24, 2010. Proceedings. Communications in Computer and Information Science 107, Springer 2010, ISBN 978-3-642-16387-6 [contents]
2000 – 2009
- 2009
[c6]Chengyu Hu, Pengtao Liu:
A New ID-Based Deniable Ring Authentication with Constant-Size Signature. BMEI 2009: 1-4- 2007
[c5]Chengyu Hu, Daxing Li:
An Efficient Threshold Group Signature Scheme. IMECS 2007: 338-340
[c4]Chengyu Hu, Pengtao Liu, Daxing Li:
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. MCAM 2007: 262-266
[c3]Chengyu Hu, Daxing Li:
Forward-Secure Traceable Ring Signature. SNPD (3) 2007: 200-204
[c2]Chengyu Hu, Daxing Li:
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. SNPD (1) 2007: 866-868
[c1]Chengyu Hu, Daxing Li:
Ring Blind Signature Scheme. SNPD (1) 2007: 869-871
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-09 00:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







