default search action
Chunhua Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j110]Longtao Guo, Huakun Huang, Lingjun Zhao, Peiliang Wang, Shan Jiang, Chunhua Su:
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping. Comput. Secur. 142: 103894 (2024) - [j109]Chen Zhang, Zhuotao Lian, Huakun Huang, Chunhua Su:
PCIDS: Permission and Credibility-Based Intrusion Detection System in IoT Gateways. IEEE Internet Things J. 11(1): 904-913 (2024) - [j108]Zhuotao Lian, Qingkui Zeng, Weizheng Wang, Dequan Xu, Weizhi Meng, Chunhua Su:
Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles. IEEE Internet Things J. 11(4): 6722-6729 (2024) - [j107]Weizheng Wang, Zhaoyang Han, Thippa Reddy Gadekallu, Saleem Raza, Jawad Tanveer, Chunhua Su:
Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVs. IEEE Internet Things J. 11(6): 9547-9557 (2024) - [j106]Hong Zhao, Enting Guo, Zhuotao Lian, Yong Zhao, Xinyi Huang, Chunhua Su:
A review and implementation of physical layer channel key generation in the Internet of Things. J. Inf. Secur. Appl. 83: 103779 (2024) - [j105]Buzhen He, Tao Feng, Junli Fang, Chunyan Liu, Chunhua Su:
A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption. IEEE Trans. Consumer Electron. 70(1): 263-276 (2024) - [j104]Jianfeng Zong, Chen Wang, Jian Shen, Chunhua Su, Weizheng Wang:
ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 3994-4004 (2024) - [j103]Bin Wang, Xiaohan Yuan, Li Duan, Hongliang Ma, Bin Wang, Chunhua Su, Wei Wang:
DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain. IEEE Trans. Comput. Soc. Syst. 11(2): 1577-1588 (2024) - [j102]Zhuotao Lian, Chen Zhang, Chunhua Su, Fayaz Ali Dharejo, Mutiq Almutiq, Muhammad Hammad Memon:
FIND: Privacy-Enhanced Federated Learning for Intelligent Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 5005-5014 (2024) - [j101]Yaoqi Yang, Bangning Zhang, Daoxing Guo, Renhui Xu, Chunhua Su, Weizheng Wang:
Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing. IEEE Trans. Emerg. Top. Comput. 12(1): 281-292 (2024) - [j100]Taiyu Wang, Qinglin Yang, Kaiming Zhu, Junbo Wang, Chunhua Su, Kento Sato:
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving. IEEE Trans. Inf. Forensics Secur. 19: 1015-1030 (2024) - [j99]Zhi Li, Hao Wang, Guangquan Xu, Alireza Jolfaei, Xi Zheng, Chunhua Su, Wenying Zhang:
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation. IEEE Trans. Intell. Transp. Syst. 25(3): 2253-2269 (2024) - [j98]Xiangyu Wei, Wei Wang, Chongsheng Zhang, Weiping Ding, Bin Wang, Yaguan Qian, Zhen Han, Chunhua Su:
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks. ACM Trans. Knowl. Discov. Data 18(8): 204:1-204:25 (2024) - [c73]Hong Zhao, Enting Guo, Xiuheng Liao, Kouichi Sakurai, Chunhua Su:
The Framework of General Channel Key Generation Based on Physical Layer. DSPP (2) 2024: 204-220 - [c72]K. Sathish, C. V. Ravikumar, Chunhua Su:
MEMS Design Process Based Simulation and Analysis of a Hypothetical Sensor Design with Electromechanics Interface. DSPP (2) 2024: 221-238 - [c71]C. V. Ravikumar, K. Sathish, Chunhua Su:
Design and Analysis of Piezoelectric Energy Harvester for Wireless Sensor Networks. DSPP (2) 2024: 239-254 - [c70]Kazi Fatema, Mehrin Anannya, Samrat Kumar Dey, Chunhua Su, Rashed Mazumder:
Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection. DSPP (1) 2024: 260-275 - [c69]Zhuotao Lian, Weiyu Wang, Chunhua Su, Kouichi Sakurai:
AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 473-478 - 2023
- [j97]Caicong Wu, Dong Li, Xiaoqiang Zhang, Jiawen Pan, Lei Quan, Lili Yang, Weizhong Yang, Qin Ma, Chunhua Su, Weixin Zhai:
China's agricultural machinery operation big data system. Comput. Electron. Agric. 205: 107594 (2023) - [j96]Weizheng Wang, Fida Hussain Memon, Zhuotao Lian, Zhimeng Yin, Thippa Reddy Gadekallu, Quoc-Viet Pham, Kapal Dev, Chunhua Su:
Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction. IEEE Consumer Electron. Mag. 12(2): 27-34 (2023) - [j95]Chen Qiu, Haoda Wang, Qinglin Yang, Chunhua Su, Huawei Huang:
A coordinates-based hierarchical computing framework towards spatial data processing. Comput. Commun. 211: 83-92 (2023) - [j94]Weizheng Wang, Huakun Huang, Zhimeng Yin, Thippa Reddy Gadekallu, Mamoun Alazab, Chunhua Su:
Smart contract token-based privacy-preserving access control system for industrial Internet of Things. Digit. Commun. Networks 9(2): 337-346 (2023) - [j93]Bakkiam David Deebak, Fida Hussain Memon, Sunder Ali Khowaja, Kapal Dev, Weizheng Wang, Nawab Muhammad Faseeh Qureshi, Chunhua Su:
A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems. IEEE Internet Things J. 10(8, April 15): 6652-6660 (2023) - [j92]Kuongho Chen, Lin-Fa Lee, Wayne Chiu, Chunhua Su, Kuo-Hui Yeh, Han-Chieh Chao:
A Trusted Reputation Management Scheme for Cross-Chain Transactions. Sensors 23(13): 6033 (2023) - [j91]Kuo-Hui Yeh, Chunhua Su, Shi-Cho Cha:
Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust". Symmetry 15(5): 1059 (2023) - [j90]Zhuotao Lian, Qingkui Zeng, Weizheng Wang, Thippa Reddy Gadekallu, Chunhua Su:
Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System. IEEE Trans. Comput. Soc. Syst. 10(4): 1701-1710 (2023) - [j89]Zhaoyang Han, Yaoqi Yang, Weizheng Wang, Lu Zhou, Thippa Reddy Gadekallu, Mamoun Alazab, Prosanta Gope, Chunhua Su:
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 24(4): 4641-4650 (2023) - [j88]Qinglin Yang, Taiyu Wang, Kaiming Zhu, Junbo Wang, Yu Han, Chunhua Su:
Loss-based differentiation strategy for privacy preserving of social robots. J. Supercomput. 79(1): 321-348 (2023) - [j87]Qinglin Yang, Taiyu Wang, Kaiming Zhu, Junbo Wang, Yu Han, Chunhua Su:
Correction to: Loss-based differentiation strategy for privacy preserving of social robots. J. Supercomput. 79(1): 1159-1160 (2023) - [j86]Zhuotao Lian, Weizheng Wang, Zhaoyang Han, Chunhua Su:
Blockchain-Based Personalized Federated Learning for Internet of Medical Things. IEEE Trans. Sustain. Comput. 8(4): 694-702 (2023) - [c68]Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang:
Instant and Secure Channel Key Extraction Scheme Among Wireless Devices. GLOBECOM 2023: 5366-5371 - [c67]Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang:
Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios. ICICS 2023: 738-749 - [c66]Jian Zheng, Qinde Chen, Chunhua Su, Huawei Huang:
BrokerFi: A DeFi dApp Built upon Broker-based Blockchain. ICPADS 2023: 1817-1825 - [c65]Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. ISPEC 2023: 579-594 - [c64]Haoda Wang, Lingjun Zhao, Chen Qiu, Zhuotao Lian, Chunhua Su:
Privacy-stealing Approach in Distributed IoMT Systems. MCSoC 2023: 301-305 - [c63]Zhuotao Lian, Chen Zhang, Kaixi Nan, Chunhua Su:
SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning. NSS 2023: 235-248 - [c62]Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. PST 2023: 1-11 - [c61]Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou:
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. PST 2023: 1-7 - [e8]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - 2022
- [j85]Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. IEICE Trans. Inf. Syst. 105-D(2): 195-204 (2022) - [j84]Zhuotao Lian, Weizheng Wang, Huakun Huang, Chunhua Su:
Layer-Based Communication-Efficient Federated Learning with Privacy Preservation. IEICE Trans. Inf. Syst. 105-D(2): 256-263 (2022) - [j83]Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. IEICE Trans. Inf. Syst. 105-D(2): 272-279 (2022) - [j82]Yizhi Ren, Zelong Li, Lifeng Yuan, Zhen Zhang, Chunhua Su, Yujuan Wang, Guohua Wu:
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems. IEICE Trans. Inf. Syst. 105-D(2): 289-299 (2022) - [j81]Srinivas Koppu, Kumar K, Siva Rama Krishnan Somayaji, Iyapparaja Meenakshisundaram, Weizheng Wang, Chunhua Su:
Fusion of Blockchain, IoT and Artificial Intelligence - A Survey. IEICE Trans. Inf. Syst. 105-D(2): 300-308 (2022) - [j80]Ziyue Wang, Weizheng Wang, Yaoqi Yang, Zhaoyang Han, Dequan Xu, Chunhua Su:
CNN- and GAN-based classification of malicious code families: A code visualization approach. Int. J. Intell. Syst. 37(12): 12472-12489 (2022) - [j79]Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang, Chunhua Su:
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes. IEEE Internet Things J. 9(7): 4917-4927 (2022) - [j78]Weizheng Wang, Qiu Chen, Zhimeng Yin, Gautam Srivastava, Thippa Reddy Gadekallu, Fawaz Alsolami, Chunhua Su:
Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things J. 9(11): 8883-8891 (2022) - [j77]Weizheng Wang, Yaoqi Yang, Zhimeng Yin, Kapal Dev, Xiaokang Zhou, Xingwang Li, Nawab Muhammad Faseeh Qureshi, Chunhua Su:
BSIF: Blockchain-Based Secure, Interactive, and Fair Mobile Crowdsensing. IEEE J. Sel. Areas Commun. 40(12): 3452-3469 (2022) - [j76]Mamoun Alazab, Thippa Reddy Gadekallu, Chunhua Su:
Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications. IEEE Trans. Ind. Informatics 18(9): 6326-6329 (2022) - [j75]Weizheng Wang, Hao Xu, Mamoun Alazab, Thippa Reddy Gadekallu, Zhaoyang Han, Chunhua Su:
Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices. IEEE Trans. Ind. Informatics 18(10): 7059-7067 (2022) - [j74]Hu Xiong, Chuanjie Jin, Mamoun Alazab, Kuo-Hui Yeh, Hanxiao Wang, Thippa Reddy Gadekallu, Weizheng Wang, Chunhua Su:
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT. IEEE J. Biomed. Health Informatics 26(5): 1977-1986 (2022) - [j73]Zhaoyang Han, Yaoqi Yang, Weizheng Wang, Lu Zhou, Tu N. Nguyen, Chunhua Su:
Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint. IEEE Trans. Intell. Transp. Syst. 23(12): 25287-25296 (2022) - [j72]Zhuotao Lian, Qinglin Yang, Weizheng Wang, Qingkui Zeng, Mamoun Alazab, Hong Zhao, Chunhua Su:
DEEP-FEL: Decentralized, Efficient and Privacy-Enhanced Federated Edge Learning for Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 9(5): 3558-3569 (2022) - [j71]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - [c60]Hong Zhao, Chunhua Su:
Poster: Key Generation Scheme Based on Physical Layer. ACNS Workshops 2022: 606-610 - [c59]Zhuotao Lian, Chunhua Su:
Decentralized Federated Learning for Internet of Things Anomaly Detection. AsiaCCS 2022: 1249-1251 - [c58]Yaoqi Yang, Weizheng Wang, Renhui Xu, Gautam Srivastava, Mamoun Alazab, Thippa Reddy Gadekallu, Chunhua Su:
AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint. ICC 2022: 1-6 - [c57]Zhuotao Lian, Qinglin Yang, Qingkui Zeng, Chunhua Su:
WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy. ICC 2022: 2071-2076 - [c56]Zhuotao Lian, Qingkui Zeng, Chunhua Su:
Privacy-preserving Blockchain-based Global Data Sharing for Federated Learning with Non-IID Data. ICDCS Workshops 2022: 193-198 - [c55]Juzheng Huang, Qiang Tang, Chunhua Su, Na Ruan:
Secure Collaboration Between Consortiums in Permissioned Blockchains. ProvSec 2022: 228-245 - [c54]Pan Wang, Zeyi Li, Xiaokang Zhou, Chunhua Su, Weizheng Wang:
FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection. STM 2022: 156-174 - [e7]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e6]Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri:
Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings. Lecture Notes in Computer Science 13620, Springer 2022, ISBN 978-3-031-21279-6 [contents] - [e5]Chunhua Su, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3 [contents] - 2021
- [j70]Weizhi Meng, Javier Lopez, Shouhuai Xu, Chunhua Su, Rongxing Lu:
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges. IEEE Access 9: 108846-108850 (2021) - [j69]Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen:
Editorial for special issue on "security and privacy protection in the era of IoT devices". Digit. Commun. Networks 7(2): 245-246 (2021) - [j68]Lingjun Zhao, Huakun Huang, Chunhua Su, Shuxue Ding, Huawei Huang, Zhiyuan Tan, Zhenni Li:
Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment. IEEE Internet Things J. 8(5): 3211-3223 (2021) - [j67]Chunpeng Ge, Lu Zhou, Gerhard P. Hancke, Chunhua Su:
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks. IEEE Internet Things J. 8(16): 12481-12489 (2021) - [j66]Huakun Huang, Chen Zhang, Huijun Wu, Zeyang Dai, Lingjun Zhao, Chunhua Su:
An improving sparse coding algorithm for wireless passive target positioning. Phys. Commun. 49: 101487 (2021) - [j65]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Rongxing Lu, Chunhua Su:
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT. Peer-to-Peer Netw. Appl. 14(2): 708-721 (2021) - [j64]Weizheng Wang, Huakun Huang, Lejun Zhang, Chunhua Su:
Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw. Appl. 14(5): 2681-2693 (2021) - [j63]Liming Fang, Xinyu Yun, Changchun Yin, Weiping Ding, Lu Zhou, Zhe Liu, Chunhua Su:
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning. IEEE Trans. Fuzzy Syst. 29(4): 742-756 (2021) - [j62]Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su:
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. IEEE Trans. Netw. Sci. Eng. 8(2): 1133-1144 (2021) - [c53]Jikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su:
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism. ACISP 2021: 490-509 - [c52]Zhixin Zhao, Lu Zhou, Chunhua Su:
Systematic Research on Technology and Challenges of Lightning Network. DSC 2021: 1-8 - [c51]Zhuotao Lian, Weizheng Wang, Chunhua Su:
COFEL: Communication-Efficient and Optimized Federated Learning with Local Differential Privacy. ICC 2021: 1-6 - [e4]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i2]Zhuotao Lian, Qinglin Yang, Qingkui Zeng, Chunhua Su:
WebFed: Cross-platform Federated Learning Framework Based on Web Browser with Local Differential Privacy. CoRR abs/2110.11646 (2021) - 2020
- [j61]Lu Zhou, Chunpeng Ge, Chunhua Su:
A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes. Sci. China Inf. Sci. 63(3) (2020) - [j60]Guangquan Xu, Xiaotong Li, Litao Jiao, Weizhe Wang, Ao Liu, Chunhua Su, Xi Zheng, Shaoying Liu, Xiaochun Cheng:
BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs. IEEE Commun. Mag. 58(7): 35-41 (2020) - [j59]Na Ruan, Ruoyu Deng, Chunhua Su:
GADM: Manual fake review detection for O2O commercial platforms. Comput. Secur. 88 (2020) - [j58]Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. Comput. Secur. 88 (2020) - [j57]Huiyao Zheng, Jian Shen, Youngju Cho, Chunhua Su, Sangman Moh:
A Novel Structure-Based Data Sharing Scheme in Cloud Computing. IEICE Trans. Inf. Syst. 103-D(2): 222-229 (2020) - [j56]Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su:
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks. IEICE Trans. Inf. Syst. 103-D(2): 230-238 (2020) - [j55]Na Ruan, Chunhua Su, Chi Xie:
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication. IEICE Trans. Inf. Syst. 103-D(2): 256-264 (2020) - [j54]Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji:
New Pseudo-Random Number Generator for EPC Gen2. IEICE Trans. Inf. Syst. 103-D(2): 292-298 (2020) - [j53]Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. Int. J. Inf. Sec. 19(3): 243-244 (2020) - [j52]Hung-Yu Chien, Yi-Jui Chen, Guo-Hao Qiu, Jian Fu Liao, Ruo-Wei Hung, Pei-Chih Lin, Xi-An Kou, Mao-Lun Chiang, Chunhua Su:
A MQTT-API-compatible IoT security-enhanced platform. Int. J. Sens. Networks 32(1): 54-68 (2020) - [j51]Lu Zhou, Chunpeng Ge, Simin Hu, Chunhua Su:
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks. IEEE Internet Things J. 7(5): 3948-3957 (2020) - [j50]Liming Fang, Changchun Yin, Lu Zhou, Yang Li, Chunhua Su, Jinyue Xia:
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine. Inf. Sci. 507: 143-160 (2020) - [j49]Hu Xiong, Yan Wu, Chunhua Su, Kuo-Hui Yeh:
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things. J. Inf. Secur. Appl. 53: 102507 (2020) - [j48]Jing Zhang, Rong Tan, Chunhua Su, Wen Si:
Design and application of a personal credit information sharing platform based on consortium blockchain. J. Inf. Secur. Appl. 55: 102659 (2020) - [j47]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su:
Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theor. Comput. Sci. 814: 223-233 (2020) - [j46]Lu Zhou, Chunhua Su, Wayne Chiu, Kuo-Hui Yeh:
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. IEEE Trans. Emerg. Top. Comput. 8(2): 303-312 (2020) - [j45]Lingjun Zhao, Chunhua Su, Zeyang Dai, Huakun Huang, Shuxue Ding, Xinyi Huang, Zhaoyang Han:
Indoor device-free passive localization with DCNN for location-based services. J. Supercomput. 76(11): 8432-8449 (2020) - [c50]Hanyi Sun, Na Ruan, Chunhua Su:
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. ESORICS (2) 2020: 569-589 - [c49]Shenqing Wang, Jian Wang, Chunhua Su, Xinshu Ma:
Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack. ICPADS 2020: 382-389 - [c48]Hongzhi Xiao, Chen Qiu, Qinglin Yang, Huakun Huang, Junbo Wang, Chunhua Su:
Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems. MSN 2020: 137-144 - [c47]Weizheng Wang, Chunhua Su:
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin. SEC 2020: 324-337 - [c46]Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su:
BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid. TrustCom 2020: 1332-1338 - [e3]Guangquan Xu, Kaitai Liang, Chunhua Su:
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings. Communications in Computer and Information Science 1286, Springer 2020, ISBN 978-981-15-9738-1 [contents]
2010 – 2019
- 2019
- [j44]Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing. IEEE Access 7: 137266-137278 (2019) - [j43]Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James:
Security analysis and new models on the intelligent symmetric key encryption. Comput. Secur. 80: 14-24 (2019) - [j42]Lu Zhou, Xiong Li, Kuo-Hui Yeh, Chunhua Su, Wayne Chiu:
Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 91: 244-251 (2019) - [j41]Lu Zhou, Chunhua Su, Zhen Li, Zhe Liu, Gerhard P. Hancke:
Automatic fine-grained access control in SCADA by machine learning. Future Gener. Comput. Syst. 93: 548-559 (2019) - [j40]Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. Future Gener. Comput. Syst. 99: 154-163 (2019) - [j39]Cheng Guo, Ruhan Zhuang, Chunhua Su, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem. IEEE Internet Things J. 6(6): 9868-9879 (2019) - [j38]Lu Zhou, Xin Sun, Chunhua Su, Zhe Liu, Kim-Kwang Raymond Choo:
Game theoretic security of quantum bit commitment. Inf. Sci. 479: 503-514 (2019) - [j37]Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Trans. Internet Inf. Syst. 13(9): 4727-4741 (2019) - [j36]Bagus Santoso, Chunhua Su:
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries. J. Univers. Comput. Sci. 25(3): 294-308 (2019) - [j35]Jiageng Chen, Chunhua Su, Zheng Yan:
AI-Driven Cyber Security Analytics and Privacy Protection. Secur. Commun. Networks 2019: 1859143:1-1859143:2 (2019) - [j34]Bo Zhao, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, Chunhua Su:
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors 19(14): 3091 (2019) - [j33]Lingjun Zhao, Chunhua Su, Huakun Huang, Zhaoyang Han, Shuxue Ding, Xiang Li:
Intrusion Detection Based on Device-Free Localization in the Era of IoT. Symmetry 11(5): 630 (2019) - [j32]Huakun Huang, Zhaoyang Han, Shuxue Ding, Chunhua Su, Lingjun Zhao:
Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring. Symmetry 11(5): 637 (2019) - [j31]Lu Zhou, Chunhua Su, Zhi Hu, Sokjoon Lee, Hwajeong Seo:
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device. ACM Trans. Embed. Comput. Syst. 18(3): 23:1-23:13 (2019) - [j30]Lu Zhou, Chunhua Su, Kuo-Hui Yeh:
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things. ACM Trans. Embed. Comput. Syst. 18(3): 28:1-28:10 (2019) - [c45]Hao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo:
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones. Inscrypt 2019: 208-224 - [c44]Hung-Yu Chien, Chunhua Su:
A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid. CSII (selected papers) 2019: 165-175 - [c43]Hung-Yu Chien, Xi-An Kou, Mao-Lun Chiang, Chunhua Su:
Secure and Efficient MQTT Group Communication Design. CSII (selected papers) 2019: 177-186 - [c42]Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, Chunhua Su:
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks. ESORICS (1) 2019: 493-511 - [c41]Hung-Yu Chien, Guo-Hao Qiu, Ruo-Wei Hung, An-Tong Shih, Chunhua Su:
Hierarchical MQTT with Edge Computation. iCAST 2019: 1-5 - [c40]Zhaoyang Han, Chunhua Su, Shuxue Ding, Huakun Huang, Lingjun Zhao:
Device-Free Localization via Sparse Coding with Log-Regularizer. iCAST 2019: 1-6 - [c39]Bagus Santoso, Yasutada Oohama, Chunhua Su:
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks. NSS 2019: 3-17 - [c38]Jingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang:
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts. NSS 2019: 433-442 - [c37]Johann Großschädl, Zhe Liu, Zhi Hu, Chunhua Su, Lu Zhou:
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. SIoT 2019: 1-8 - [c36]Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds. SocialSec 2019: 139-151 - 2018
- [j29]Wenjuan Li, Weizhi Meng, Chunhua Su, Lam For Kwok:
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access 6: 6530-6539 (2018) - [j28]Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou, Rongxing Lu:
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access 6: 7234-7243 (2018) - [j27]Shi-Cho Cha, Ming-Shiung Chuang, Kuo-Hui Yeh, Zijia Huang, Chunhua Su:
A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices. IEEE Access 6: 20779-20787 (2018) - [j26]Shi-Cho Cha, Jyun-Fu Chen, Chunhua Su, Kuo-Hui Yeh:
A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things. IEEE Access 6: 24639-24649 (2018) - [j25]Kuo-Hui Yeh, Chunhua Su, Jia-Li Hou, Wayne Chiu, Chien-Ming Chen:
A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository. IEEE Access 6: 59394-59404 (2018) - [j24]Kuo-Hui Yeh, Chunhua Su, Wayne Chiu, Lu Zhou:
I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics. IEEE Commun. Mag. 56(2): 150-157 (2018) - [j23]Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. Future Gener. Comput. Syst. 79: 243-246 (2018) - [j22]Lu Zhou, Chunhua Su, Yamin Wen, Weijie Li, Zheng Gong:
Towards practical white-box lightweight block cipher implementations for IoTs. Future Gener. Comput. Syst. 86: 507-514 (2018) - [j21]Lu Zhou, Chunhua Su, Xin Sun, Xishun Zhao, Kim-Kwang Raymond Choo:
Stag hunt and trust emergence in social networks. Future Gener. Comput. Syst. 88: 168-172 (2018) - [j20]Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali A. Ghorbani:
OTP-IoT: An ownership transfer protocol for the Internet of Things. J. Inf. Secur. Appl. 43: 73-82 (2018) - [j19]Lu Zhou, Kuo-Hui Yeh, Gerhard P. Hancke, Zhe Liu, Chunhua Su:
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints. IEEE Signal Process. Mag. 35(5): 76-87 (2018) - [j18]Wayne Chiu, Chunhua Su, Chuan-Yen Fan, Chien-Ming Chen, Kuo-Hui Yeh:
Authentication with What You See and Remember in the Internet of Things. Symmetry 10(11): 537 (2018) - [c35]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - [c34]Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su, Dandan Xu:
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. Inscrypt 2018: 384-403 - [c33]Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han:
CPMap: Design of Click-Points Map-Based Graphical Password Authentication. SEC 2018: 18-32 - [e2]Chunhua Su, Hiroaki Kikuchi:
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings. Lecture Notes in Computer Science 11125, Springer 2018, ISBN 978-3-319-99806-0 [contents] - 2017
- [j17]Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Variable message encryption through blockcipher compression function. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j16]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A simple authentication encryption scheme. Concurr. Comput. Pract. Exp. 29(16) (2017) - [j15]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data. Int. J. Found. Comput. Sci. 28(6): 661-682 (2017) - [j14]Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. J. Inf. Secur. Appl. 34: 205-206 (2017) - [j13]Kuo-Hui Yeh, Chunhua Su, Kim-Kwang Raymond Choo, Wayne Chiu:
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors 17(5): 1001 (2017) - [j12]Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang:
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks. IEEE Trans. Computers 66(10): 1763-1777 (2017) - [j11]Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Secur. Comput. 14(1): 83-94 (2017) - [j10]Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. IEEE Trans. Inf. Forensics Secur. 12(12): 3024-3038 (2017) - [c32]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A simple construction of encryption for a tiny domain message. CISS 2017: 1-6 - [c31]Ye Li, Kaitai Liang, Chunhua Su, Wei Wu:
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. GPC 2017: 611-626 - [c30]Weizhi Meng, Lee Wang Hao, Zhe Liu, Chunhua Su, Yan Li:
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. ICISC 2017: 327-338 - [c29]Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han:
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). ISPEC 2017: 566-575 - [c28]Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. NSS 2017: 199-213 - [c27]Bagus Santoso, Chunhua Su:
Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model. ProvSec 2017: 271-284 - [c26]Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su:
Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2. TrustCom/BigDataSE/ICESS 2017: 721-728 - 2016
- [j9]Xu Yang, Xinyi Huang, Jinguang Han, Chunhua Su:
Improved handover authentication and key pre-distribution for wireless mesh networks. Concurr. Comput. Pract. Exp. 28(10): 2978-2990 (2016) - [j8]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
A Matrix Based ORAM: Design, Implementation and Experimental Analysis. IEICE Trans. Inf. Syst. 99-D(8): 2044-2055 (2016) - [c25]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A Blockcipher Based Authentication Encryption. CD-ARES 2016: 106-123 - [c24]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
An Efficient Construction of a Compression Function for Cryptographic Hash. CD-ARES 2016: 124-140 - [c23]Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - [c22]Kaitai Liang, Atsuko Miyaji, Chunhua Su:
Secure and Traceable Framework for Data Circulation. ACISP (1) 2016: 376-388 - [c21]Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun:
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space. ATIS 2016: 130-141 - [c20]Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94 - [c19]Kuo-Hui Yeh, Chunhua Su, Chien-Lung Hsu, Wayne Chiu, Yu-Fan Hsueh:
Transparent authentication scheme with adaptive biometrie features for IoT networks. GCCE 2016: 1-2 - [c18]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin:
Security and experimental performance analysis of a matrix ORAM. ICC 2016: 1-6 - [c17]Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia:
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree. ISPEC 2016: 300-314 - [e1]Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung:
Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. Lecture Notes in Computer Science 9955, Springer 2016, ISBN 978-3-319-46297-4 [contents] - 2015
- [j7]Jian Guo, Chunhua Su, Wun-She Yap:
An improved preimage attack against HAVAL-3. Inf. Process. Lett. 115(2): 386-393 (2015) - [c16]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. Inscrypt 2015: 108-124 - [c15]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Improved Differential Characteristic Searching Methods. CSCloud 2015: 500-508 - [c14]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin:
Analysis of Path ORAM toward Practical Utilization. NBiS 2015: 646-651 - [c13]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao:
A New Statistical Approach for Integral Attack. NSS 2015: 345-356 - [c12]Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su:
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags. TrustCom/BigDataSE/ISPA (1) 2015: 17-24 - [c11]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost. WISA 2015: 3-15 - 2014
- [j6]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. Secur. Commun. Networks 7(6): 964-978 (2014) - [c10]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. ISPEC 2014: 373-387 - [c9]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. NSS 2014: 184-197 - [c8]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. ProvSec 2014: 103-116 - [i1]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm. IACR Cryptol. ePrint Arch. 2014: 272 (2014) - 2012
- [j5]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou:
A Survey on Privacy Frameworks for RFID Authentication. IEICE Trans. Inf. Syst. 95-D(1): 2-11 (2012) - [c7]Chunhua Su, Guilin Wang, Kouichi Sakurai:
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. TrustCom 2012: 1012-1017 - 2011
- [j4]Chunhua Su:
p-Moment exponential robust stability of grey neutral stochastic delay systems. Grey Syst. Theory Appl. 1(1): 72-86 (2011) - 2010
- [j3]Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung:
Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83(12): 2556-2565 (2010) - [c6]Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li:
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. ICISS 2010: 246-260
2000 – 2009
- 2009
- [j2]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(4): 1246-1250 (2009) - [j1]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1868-1871 (2009) - [c5]Chunhua Su, Justin Zhan, Kouichi Sakurai:
Importance of Data Standardization in Privacy-Preserving K-Means Clustering. DASFAA Workshops 2009: 276-286 - 2008
- [c4]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 - [c3]Chunhua Su, Kouichi Sakurai:
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree. ADMA 2008: 170-181 - 2007
- [c2]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 - [c1]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint