Paper Publications
- [9] 胡程瑜. Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mobile Networks and Applications, 26, 2490, 2021.
- [10] Ge, Xinrui. Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Transactions on Dependable and Secure Computing, 18, 490, 2021.
- [11] 李浩. TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. Information and Communications Security - 23rd International Conference, ICICS 2021, 260, 2021.
- [12] 胡程瑜. Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Information Sciences, 520, 15, 2020.
- [13] 张子诚 , 刁文瑞 , 胡程瑜 , 郭山清 , Chaoshun Zuo and Li Li. An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps. The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2020), 2020.
- [14] 李政 , 韩歌 , Guo Shanqing and 胡程瑜. DeepKeyStego: Protecting Communication by Key-dependent Steganography with Deep Networks. 21st International Conference on High Performance Computing and Communication(HPCC 2019), 2019.
- [15] KONG Fanyu , jiangyali , Hu Chengyu and zhoudashui. Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. 2019.
- [16] Hu Chengyu , 徐宇钦 , 刘蓬涛 , 于佳 , 郭山清 and 赵明昊. Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Information Sciences, 520, 15-30, 2020.
Copyright All Rights Reserved Shandong University Address: No. 27 Shanda South Road, Jinan City, Shandong Province, China: 250100
Information desk: (86) - 0531-88395114
On Duty Telephone: (86) - 0531-88364731 Construction and Maintenance: Information Work Office of Shandong University