User profiles for Haipeng Qu

haipeng qu

Ocean Univesity of China
Verified email at ouc.edu.cn
Cited by 683

A systematic review of fuzzing

X Zhao, H Qu, J Xu, X Li, W Lv, GG Wang - Soft Computing, 2024 - Springer
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …

Certificateless public key encryption with equality test

H Qu, Z Yan, XJ Lin, Q Zhang, L Sun - Information Sciences, 2018 - Elsevier
In this paper, we present the concept of certificateless public key encryption with equality test
(CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public …

Generic construction of public key encryption, identity-based encryption and signcryption with equality test

XJ Lin, L Sun, H Qu - Information Sciences, 2018 - Elsevier
Public key encryption with equality test (PKEET) allows the cloud server to test whether two
ciphertexts are generated on the same message. Recently, Lee et al. proposed a semi-…

Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems

Z Yan, H Qu, X Zhang, JL Xu, XJ Lin - Journal of Systems Architecture, 2023 - Elsevier
Cloud-based anonymous messaging systems have been widely utilized in covert
conversations to enable people to anonymously exchange encrypted data in public using …

Public key encryption supporting equality test and flexible authorization without bilinear pairings

XJ Lin, L Sun, H Qu, X Zhang - Computer Communications, 2021 - Elsevier
Public key encryption with equality test (PKEET) is an important cryptographic primitive for
protecting users’ outsourced data in the cloud-based email systems. Due to the fact that it is …

Improving transferable adversarial attack via feature-momentum

X He, Y Li, H Qu, J Dong - Computers & Security, 2023 - Elsevier
Transferable adversarial attackusing adversarial perturbations made on known models to
attack unknown modelshas made significant progress in recent years. The feature-level …

Privacy preserving and secure robust federated learning: A survey

Q Han, S Lu, W Wang, H Qu, J Li… - … : Practice and Experience, 2024 - Wiley Online Library
Federated learning (FL) has emerged as a promising solution to address the challenges
posed by data silos and the need for global data fusion. It offers a distributed machine learning …

Identity-based encryption with equality test and datestamp-based authorization mechanism

XJ Lin, Q Wang, L Sun, H Qu - Theoretical Computer Science, 2021 - Elsevier
Due to the advancement of cloud computing, public key encryption with equality test has
become a hot topic in the cryptography community. The notion was extended to the identity-…

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications

XJ Lin, L Sun, H Qu - computers & security, 2015 - Elsevier
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously
and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous …

[HTML][HTML] An efficient RSA-based certificateless public key encryption scheme

XJ Lin, L Sun, H Qu - Discrete Applied Mathematics, 2018 - Elsevier
In order to resolve the key escrow in identity-based scheme and the significant cost of using
a PKI system in traditional public key scheme, the notion of certificateless public key …