胡程瑜
个人信息Personal Information
副教授 硕士生导师
性别:男
毕业院校:山东大学
学历:博士研究生毕业
学位:工学博士学位
在职信息:在职
所在单位:网络空间安全学院(研究院)
入职时间:2008-07-16
办公地点:山东大学青岛校区淦昌苑D座403
扫描关注
- [1] 刘高源. Multi-Dimensional Data Publishing With Local Differential Privacy. Proceedings 26th International Conference on Extending Database Technology, 183, 2022.
- [2] 李浩. TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICCS 2021, 2021.
- [3] 李利民. Secure and Efficient Cloud Ciphertext Deduplication Based on SGX. 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS), 2016, 2023.
- [4] 秦桂云. Controlled Search: Building Inverted-Index PEKS with Less Leakage in Multi-User Setting. IEEE Internet of Things Journal, 2023.
- [5] 郭山清. FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks. The 25th IEEE International Conference on High Performance Computing and Communications, 2022.
- [6] 秦桂云. Blockchain‐based secure deduplication of encrypted data supporting client‐side semantically secure encryption without trusted third party. Transactions on Emerging Telecommunications Technologies, 2022.
- [7] 唐朋. Multi-Dimensional Data Publishing With Local Differential Privacy. Proceedings 26th International Conference on Extending Database Technology, 2022.
- [8] 唐朋. Multi-Dimensional Data Publishing With Local Differential Privacy. Proceedings 26th International Conference on Extending Database Technology, 183, 2022.
- [9] 胡程瑜. Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mobile Networks and Applications, 26, 2490, 2021.
- [10] Ge, Xinrui. Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Transactions on Dependable and Secure Computing, 18, 490, 2021.
- [11] 李浩. TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. Information and Communications Security - 23rd International Conference, ICICS 2021, 260, 2021.
- [12] 胡程瑜. Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Information Sciences, 520, 15, 2020.
- [13] 张子诚 , 刁文瑞 , 胡程瑜 , 郭山清 , Chaoshun Zuo and Li Li. An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps. The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2020), 2020.
- [14] 李政 , 韩歌 , 郭山清 and 胡程瑜. DeepKeyStego: Protecting Communication by Key-dependent Steganography with Deep Networks. 21st International Conference on High Performance Computing and Communication(HPCC 2019), 2019.
- [15] 孔凡玉 , 蒋亚丽 , 胡程瑜 and 周大水. Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. 2019.
- [16] 胡程瑜 , 徐宇钦 , 刘蓬涛 , 于佳 , 郭山清 and 赵明昊. Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Information Sciences, 520, 15-30, 2020.
- [17] 李政 , 胡程瑜 , 张阳 and 郭山清. How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN. ACSAC 2019, 126-137, 2019.
- [18] 胡程瑜 , 赵明昊 , 宋祥福 , 赵川 Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial. Journal of Network and Computer Applications, 131, 55, 2019.
- [19] Xinrui Ge , Jia Yu , Hanlin Zhang , Chengyu Hu , Zengpeng Li , Zhan Qin and Rong Hao. Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,
- [20] 胡程瑜 and 郭山清. Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mobile Networks and Applications, 2018.