default search action
Haipeng Qu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Qingdi Han, Siqi Lu, Wenhao Wang, Haipeng Qu, Jingsheng Li, Yang Gao:
Privacy preserving and secure robust federated learning: A survey. Concurr. Comput. Pract. Exp. 36(13) (2024) - [j28]Zhen Yan, Xi Jun Lin, Xiaoshuai Zhang, Jianliang Xu, Haipeng Qu:
Identity-Based Matchmaking Encryption with Equality Test. Entropy 26(1): 74 (2024) - [j27]Xiaoqi Zhao, Haipeng Qu, Jianliang Xu, Xiaohui Li, Wenjie Lv, Gai-Ge Wang:
A systematic review of fuzzing. Soft Comput. 28(6): 5493-5522 (2024) - [c22]Ziyuan Yang, Haipeng Qu, Ying Hua, Xiaoshuai Zhang, Xijun Lin:
Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning. ICIC (9) 2024: 146-157 - [c21]Zhuo Yan, Haipeng Qu, Lingyun Ying, Ke Liu, Q. Chao:
Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer. ICST 2024: 47-58 - 2023
- [j26]Xianglong He, Yuezun Li, Haipeng Qu, Junyu Dong:
Improving transferable adversarial attack via feature-momentum. Comput. Secur. 128: 103135 (2023) - [j25]Zhen Yan, Haipeng Qu, Xiaoshuai Zhang, Jianliang Xu, Xi Jun Lin:
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems. J. Syst. Archit. 142: 102950 (2023) - [c20]Nan Sun, Ning Wang, Zhigang Wang, Jie Nie, Zhiqiang Wei, Peishun Liu, Xiaodong Wang, Haipeng Qu:
Lazy Machine Unlearning Strategy for Random Forests. WISA 2023: 383-390 - [c19]Haipeng Qu, Yaojun Hou, Rongqian Zhou:
Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover. ACM TUR-C 2023: 94-95 - [c18]Haipeng Qu, Feng Gao, Yongguo Jiang:
The Talent Cultivation System for Computer Science by integrating curriculum and industry practice through knowledge ability matrix. ACM TUR-C 2023: 120-121 - [c17]Yongguo Jiang, Haipeng Qu, Hao Su, Hao Zhang:
Construction of Hardware Course Group in New Engineering Computer Specialty Facing Complex Engineering Problems. ACM TUR-C 2023: 122-124 - [c16]Xueyu Guan, Run Du, Xiaohan Wang, Haipeng Qu:
A Personalized Federated Multi-task Learning Scheme for Encrypted Traffic Classification. ICANN (3) 2023: 258-270 - [c15]Gaozhou Wang, Linlin Tang, Ziyuan Yang, Li Yan, Peishun Liu, Haipeng Qu:
Deep CNN- RNN with Self- Attention Model for Electric IoT Traffic Classification. ICBASE 2023: 363-368 - [c14]Chao Qu, Rongqian Zhou, Ke Liu, Zhuo Yan, Haipeng Qu:
BSGAT: A Graph Attention Network for Binary Code Similarity Detection. PRDC 2023: 161-167 - [i6]Xiaoqi Song, Wenjie Lv, Haipeng Qu, Lingyun Ying:
LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks. CoRR abs/2303.12612 (2023) - 2022
- [j24]Xiaoqi Zhao, Haipeng Qu, Jianliang Xu, Shuo Li, Gai-Ge Wang:
AMSFuzz: An adaptive mutation schedule for fuzzing. Expert Syst. Appl. 208: 118162 (2022) - [c13]Jian Zhuang, Ning Wang, Zhigang Wang, Xiaodong Wang, Haipeng Qu, Zhiqiang Wei:
Spatial Data Publication Under Local Differential Privacy. WISA 2022: 627-637 - [c12]Zhaojia Lai, Haipeng Qu, Lingyun Ying:
A Composite Discover Method for Gadget Chains in Java Deserialization Vulnerability. QuASoQ/SEED@APSEC 2022: 10-17 - [c11]You Wu, Qi Zhan, Haipeng Qu, Xiaoqi Zhao:
AcoFuzz: Adaptive Energy Allocation for Greybox Fuzzing. ICST Workshops 2022: 269-276 - [i5]Xianglong He, Yuezun Li, Haipeng Qu, Junyu Dong:
Enhancing the Transferability via Feature-Momentum Adversarial Attack. CoRR abs/2204.10606 (2022) - 2021
- [j23]Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:
Public key encryption supporting equality test and flexible authorization without bilinear pairings. Comput. Commun. 170: 190-199 (2021) - [j22]Xi Jun Lin, Qihui Wang, Lin Sun, Haipeng Qu:
Identity-based encryption with equality test and datestamp-based authorization mechanism. Theor. Comput. Sci. 861: 117-132 (2021) - [j21]Xi Jun Lin, Lin Sun, Haipeng Qu:
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 16: 2773-2775 (2021) - [c10]Xumei Li, Lei Sun, Ruobing Jiang, Haipeng Qu, Zhen Yan:
OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing. SANER 2021: 108-118 - 2020
- [j20]Kai Yuan, Yan Wang, Haipeng Qu:
Regular balanced Cayley maps on nonabelian metacyclic groups of odd order. Art Discret. Appl. Math. 3(1) (2020) - [j19]Haipeng Qu, Yan Wang, Kai Yuan:
Frobenius groups which are the automorphism groups of orientably-regular maps. Ars Math. Contemp. 19(2): 363-374 (2020) - [j18]Xi Jun Lin, Lin Sun, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen:
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model. Comput. J. 63(8): 1259-1262 (2020) - [j17]Xi Jun Lin, Lin Sun, Haipeng Qu, Kaitai Liang:
Leakage-free ID-Based Signature, Revisited. Comput. J. 63(8): 1263-1270 (2020) - [j16]Qian Lu, Ruobing Jiang, Yuzhan Ouyang, Haipeng Qu, Jiahui Zhang:
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks. Comput. Secur. 88 (2020) - [j15]Miaoqing Tian, Ruobing Jiang, Haipeng Qu, Qian Lu, Xiaoyun Zhou:
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks. Secur. Commun. Networks 2020: 8834845:1-8834845:17 (2020) - [c9]Xiaoyun Zhou, Ruobing Jiang, Miaoqing Tian, Haipeng Qu, He Zhang:
Temperature-sensitive Fingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source Identification. ACM TUR-C 2020: 89-94 - [c8]Lei Sun, Xumei Li, Haipeng Qu, Xiaoshuai Zhang:
AFLTurbo: Speed up Path Discovery for Greybox Fuzzing. ISSRE 2020: 81-91 - [c7]Jiahui Zhang, Qian Lu, Ruobing Jiang, Haipeng Qu:
PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range. SecureComm (2) 2020: 188-207
2010 – 2019
- 2019
- [j14]Xi Jun Lin, Lin Sun, Haipeng Qu, He-Qun Xian:
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys. Comput. J. 62(8): 1087-1091 (2019) - [j13]Qian Lu, Haipeng Qu, Yuzhan Ouyang, Jiahui Zhang:
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames. Secur. Commun. Networks 2019: 2718741:1-2718741:10 (2019) - [c6]Miaoqing Tian, Ruobing Jiang, Chaoqun Xing, Haipeng Qu, Qian Lu, Xiaoyun Zhou:
Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection. IPCCC 2019: 1-8 - 2018
- [j12]Kai Yuan, Yan Wang, Haipeng Qu:
Classification of regular balanced Cayley maps of minimal non-abelian metacyclic groups. Ars Math. Contemp. 14(2): 433-443 (2018) - [j11]Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:
Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme. Comput. J. 61(4): 539-544 (2018) - [j10]Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. Comput. J. 61(12): 1791-1793 (2018) - [j9]Xi Jun Lin, Lin Sun, Haipeng Qu:
An efficient RSA-based certificateless public key encryption scheme. Discret. Appl. Math. 241: 39-47 (2018) - [j8]Qian Lu, Haipeng Qu, Yuan Zhuang, Xi Jun Lin, Yuzhan Ouyang:
Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames. IEICE Trans. Inf. Syst. 101-D(10): 2465-2473 (2018) - [j7]Xi Jun Lin, Lin Sun, Haipeng Qu:
Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Inf. Sci. 453: 111-126 (2018) - [j6]Haipeng Qu, Zhen Yan, Xi Jun Lin, Qi Zhang, Lin Sun:
Certificateless public key encryption with equality test. Inf. Sci. 462: 76-92 (2018) - 2017
- [j5]Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme. Comput. J. 60(4): 491-496 (2017) - [c5]Qian Lu, Haipeng Qu, Yuan Zhuang, Xi Jun Lin, Yanyong Zhu, Yunzheng Liu:
A Passive Client-based Approach to Detect Evil Twin Attacks. TrustCom/BigDataSE/ICESS 2017: 233-239 - 2016
- [c4]Zhilong Wang, Tao Zhang, Yu Yang, Haipeng Qu:
Comparison of Security Frameworks for Governmental Clouds between United States and European Union. ICCNS 2016: 30-34 - [i4]Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations. IACR Cryptol. ePrint Arch. 2016: 45 (2016) - [i3]Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings. IACR Cryptol. ePrint Arch. 2016: 76 (2016) - [i2]Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings. IACR Cryptol. ePrint Arch. 2016: 277 (2016) - 2015
- [j4]Xi Jun Lin, Lin Sun, Haipeng Qu:
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 48: 142-149 (2015) - [i1]Haipeng Qu, Peng Shang, Xi Jun Lin, Lin Sun:
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. IACR Cryptol. ePrint Arch. 2015: 1066 (2015) - 2013
- [j3]Haipeng Qu, Guojia Hou, Ying Guo, Ning Wang, Zhongwen Guo:
Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j2]Haipeng Qu, Lili Wen, Yanfei Xu, Ning Wang:
LCCWS: Lightweight Copyfree Cross-layer Web Server. J. Networks 8(1): 165-173 (2013)
2000 – 2009
- 2009
- [c3]Zhengbao Li, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng Yang:
UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network. MASS 2009: 918-923 - 2005
- [c2]Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng:
A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 - [c1]Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng:
Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988
1990 – 1999
- 1997
- [j1]Haipeng Qu, Jinsong Yu:
On isomorphisms of Cayley digraphs on dihedral groups. Australas. J Comb. 15: 213-220 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint