User profiles for Haipeng Qu
haipeng quOcean Univesity of China Verified email at ouc.edu.cn Cited by 683 |
A systematic review of fuzzing
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …
generating a large number of test cases against target programs to discover unexpected …
Certificateless public key encryption with equality test
H Qu, Z Yan, XJ Lin, Q Zhang, L Sun - Information Sciences, 2018 - Elsevier
In this paper, we present the concept of certificateless public key encryption with equality test
(CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public …
(CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public …
Generic construction of public key encryption, identity-based encryption and signcryption with equality test
XJ Lin, L Sun, H Qu - Information Sciences, 2018 - Elsevier
Public key encryption with equality test (PKEET) allows the cloud server to test whether two
ciphertexts are generated on the same message. Recently, Lee et al. proposed a semi-…
ciphertexts are generated on the same message. Recently, Lee et al. proposed a semi-…
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems
Z Yan, H Qu, X Zhang, JL Xu, XJ Lin - Journal of Systems Architecture, 2023 - Elsevier
Cloud-based anonymous messaging systems have been widely utilized in covert
conversations to enable people to anonymously exchange encrypted data in public using …
conversations to enable people to anonymously exchange encrypted data in public using …
Public key encryption supporting equality test and flexible authorization without bilinear pairings
XJ Lin, L Sun, H Qu, X Zhang - Computer Communications, 2021 - Elsevier
Public key encryption with equality test (PKEET) is an important cryptographic primitive for
protecting users’ outsourced data in the cloud-based email systems. Due to the fact that it is …
protecting users’ outsourced data in the cloud-based email systems. Due to the fact that it is …
Improving transferable adversarial attack via feature-momentum
Transferable adversarial attackusing adversarial perturbations made on known models to
attack unknown modelshas made significant progress in recent years. The feature-level …
attack unknown modelshas made significant progress in recent years. The feature-level …
Privacy preserving and secure robust federated learning: A survey
Q Han, S Lu, W Wang, H Qu, J Li… - … : Practice and Experience, 2024 - Wiley Online Library
Federated learning (FL) has emerged as a promising solution to address the challenges
posed by data silos and the need for global data fusion. It offers a distributed machine learning …
posed by data silos and the need for global data fusion. It offers a distributed machine learning …
Identity-based encryption with equality test and datestamp-based authorization mechanism
XJ Lin, Q Wang, L Sun, H Qu - Theoretical Computer Science, 2021 - Elsevier
Due to the advancement of cloud computing, public key encryption with equality test has
become a hot topic in the cryptography community. The notion was extended to the identity-…
become a hot topic in the cryptography community. The notion was extended to the identity-…
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications
XJ Lin, L Sun, H Qu - computers & security, 2015 - Elsevier
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously
and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous …
and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous …
[HTML][HTML] An efficient RSA-based certificateless public key encryption scheme
XJ Lin, L Sun, H Qu - Discrete Applied Mathematics, 2018 - Elsevier
In order to resolve the key escrow in identity-based scheme and the significant cost of using
a PKI system in traditional public key scheme, the notion of certificateless public key …
a PKI system in traditional public key scheme, the notion of certificateless public key …