


default search action
Yupeng Hu 0004
Person information
- affiliation: Hunan University, Changsha, China
Other persons with the same name
- Yupeng Hu — disambiguation page
- Yupeng Hu 0001
— Southwest Jiaotong University, Chengdu, Sichuan, China - Yupeng Hu 0002
— Shandong University, Qingdao, Shandong, China - Yupeng Hu 0003
— Shandong University, Jinan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j21]Jing Huang
, Jiongyi Chen
, Yuting Xiao
, Zheng Qin
, Yupeng Hu
:
FirmPass: Identifying Broken Password Management in Linux-Based IoT Firmware Through Query-Driven Approaches. IEEE Internet Things J. 12(14): 26911-26922 (2025)
[c18]Congshan Huang
, Tianshuo Jiao, Qiao Hu
, Yupeng Hu
, Bianxia Du
:
MPCCP: A Multi-chain Perception Crime Charge Prediction Method. ICANN (4) 2025: 89-101
[c17]Wenjun Chen
, Bianxia Du
, Wenhui Xia, Qiao Hu
, Yupeng Hu
:
SemSyn-LCE: A Charge Prediction Method Based on Semantic Syntactic Fusion and Legal Constituent Elements Matching. ICDAR (1) 2025: 392-409- 2024
[j20]Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu:
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. J. Comput. Secur. 32(3): 291-317 (2024)
[j19]Bihui Liu
, Zhenyu Ye
, Qiao Hu
, Yupeng Hu
, Yuchong Hu
, Yang Xu
, Keqin Li
:
HPDK: A Hybrid PM-DRAM Key-Value Store for High I/O Throughput. IEEE Trans. Computers 73(6): 1575-1587 (2024)
[c16]Ye Xiao, Yupeng Hu
, Jiangjin Yin
, Yi Xiao, Hanmin Jiang, Qianzhen Liu:
Attention Mechanism-based Forward and Backward Data-Driven Method for Ship Trajectory Prediction. CNIOT 2024
[c15]Zhenyu Ye
, Lei Zhou
, Fengwei Zhang
, Wenqiang Jin
, Zhenyu Ning
, Yupeng Hu
, Zheng Qin
:
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor. ISSTA 2024: 38-50
[c14]Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li:
Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR. NDSS 2024- 2023
[j18]Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. ACM Comput. Surv. 55(2): 20:1-20:36 (2023)
[j17]Ye Xiao
, Xingchen Li
, Jiangjin Yin, Wei Liang
, Yupeng Hu
:
Adaptive multi-source data fusion vessel trajectory prediction model for intelligent maritime traffic. Knowl. Based Syst. 277: 110799 (2023)
[j16]Hua Deng
, Zheng Qin
, Qianhong Wu, Robert H. Deng
, Zhenyu Guan
, Yupeng Hu
, Fangmin Li
:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. IEEE Trans. Dependable Secur. Comput. 20(2): 1364-1377 (2023)
[j15]Ye Xiao
, Xingchen Li
, Wen Yao
, Jin Chen
, Yupeng Hu
:
Bidirectional Data-Driven Trajectory Prediction for Intelligent Maritime Traffic. IEEE Trans. Intell. Transp. Syst. 24(2): 1773-1785 (2023)
[c13]Lantao Zheng, Wenxin Kuang, Qizhuang Liang, Wei Liang
, Qiao Hu, Wei Fu, Xiashu Ding, Bijiang Xu, Yupeng Hu:
Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training. CSCloud/EdgeCom 2023: 186-191- 2022
[j14]Qiao Hu
, Jingyi Zhang, Gerhard P. Hancke
, Yupeng Hu
, Wenjia Li
, Hongbo Jiang, Zheng Qin
:
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices. IEEE Internet Things J. 9(2): 1326-1338 (2022)
[j13]Wei Liang
, Songyou Xie
, Jiahong Cai, Jianbo Xu, Yupeng Hu
, Yang Xu
, Meikang Qiu
:
Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22123-22132 (2022)
[j12]Yupeng Hu
, Linjun Wu, Zhuojun Chen
, Yun Huang, Xiaolin Xu, Keqin Li
, Jiliang Zhang
:
STT-MRAM-Based Reliable Weak PUF. IEEE Trans. Computers 71(7): 1564-1574 (2022)
[j11]Linjun Wu
, Yupeng Hu
, Kehuan Zhang, Wenjia Li
, Xiaolin Xu, Wanli Chang
:
FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4433-4444 (2022)
[j10]Cheng Zhang
, Yang Xu
, Yupeng Hu
, Jiajing Wu
, Ju Ren
, Yaoxue Zhang
:
A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults. IEEE Trans. Cloud Comput. 10(4): 2252-2263 (2022)- 2021
[j9]Chenyue Zhang, Wenjia Li
, Yuansheng Luo
, Yupeng Hu
:
AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology. IEEE Internet Things J. 8(5): 3157-3169 (2021)
[j8]Wei Liang
, Zuoting Ning, Songyou Xie, Yupeng Hu, Shaofei Lu, Dafang Zhang:
Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems. Inf. Sci. 579: 468-482 (2021)
[j7]Yupeng Hu
, Yonghe Liu
, Wenjia Li
, Keqin Li
, Kenli Li
, Nong Xiao, Zheng Qin
:
Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems. IEEE Trans. Cloud Comput. 9(1): 386-400 (2021)
[j6]Yang Xu
, Xiaodan Yan
, Yulei Wu
, Yupeng Hu
, Wei Liang
, Jixin Zhang
:
Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 2946-2957 (2021)- 2020
[j5]Yupeng Hu
, Qian Li, Wei Xie, Zhenyu Ye:
An Ant Colony Optimization Based Data Update Scheme for Distributed Erasure-Coded Storage Systems. IEEE Access 8: 118696-118706 (2020)
[j4]Zhu Xiao
, Fancheng Li, Ronghui Wu, Hongbo Jiang
, Yupeng Hu
, Ju Ren
, Chenglin Cai, Arun Iyengar
:
TrajData: On Vehicle Trajectory Collection With Commodity Plug-and-Play OBU Devices. IEEE Internet Things J. 7(9): 9066-9079 (2020)
[j3]Haotian Wang
, Huigui Rong
, Qun Zhang, Daibo Liu, Chunhua Hu, Yupeng Hu
:
Good or Mediocre? A Deep Reinforcement Learning Approach for Taxi Revenue Efficiency Optimization. IEEE Trans. Netw. Sci. Eng. 7(4): 3018-3027 (2020)
[c12]Jiliang Zhang, Shuang Peng, Yupeng Hu, Fei Peng, Wei Hu, Jinmei Lai, Jing Ye, Xiangqi Wang:
HRAE: Hardware-assisted Randomization against Adversarial Example Attacks. ATS 2020: 1-6
[i1]Yupeng Hu, Zhe Jin, Wenjia Li, Yang Xiang, Jiliang Zhang:
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android. CoRR abs/2006.12831 (2020)
2010 – 2019
- 2019
[c11]Wei Li, Tianyun Zhang, Dafang Zhang, Yupeng Hu, Kun Xie, Ting Zhu:
Data Temperature-Aware Bloom Filters for Flash-Based Storage. HPCC/SmartCity/DSS 2019: 1421-1428
[p1]Yupeng Hu, Linjun Wu, Wenjia Li, Keqin Li, Yonghe Liu, Zheng Qin:
Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage. Smart Data 2019: 41-62- 2018
[j2]Lu Ou
, Hui Yin
, Zheng Qin
, Sheng Xiao
, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. Secur. Commun. Networks 2018: 4724815:1-4724815:11 (2018)- 2017
[c10]Guanchao Wen, Yupeng Hu, Chen Jiang, Na Cao, Zheng Qin:
A image texture and BP neural network basec malicious files detection technique for cloud storage systems. INFOCOM Workshops 2017: 426-431
[c9]Yupeng Hu, Wenjia Li, Mengyi Ma, Na Cao, Yonghe Liu, Zheng Qin, Jia Wang:
Toward Complex Search for Encrypted Cloud Data via Blind Index Storage. ISPA/IUCC 2017: 1-8- 2016
[c8]Yupeng Hu, Yonghe Liu, Wenjia Li
, Nong Xiao, Zheng Qin, Shu Yin:
Unequal Failure Protection Coding Technology for Cloud Storage Systems. CLUSTER 2016: 231-240
[c7]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Sheng Xiao, Yupeng Hu:
Malware Variant Detection Using Opcode Image Recognition with Small Training Sets. ICCCN 2016: 1-9
[c6]Lu Ou, Zheng Qin, Yonghe Liu, Hui Yin, Yupeng Hu, Hao Chen:
Multi-User Location Correlation Protection with Differential Privacy. ICPADS 2016: 422-429
[c5]Hui Yin, Zheng Qin, Jixin Zhang, Wenjie Li, Lu Ou, Yupeng Hu, Keqin Li:
Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing. ICPADS 2016: 761-768
[c4]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Yupeng Hu:
IRMD: Malware Variant Detection Using Opcode Image Recognition. ICPADS 2016: 1175-1180
[c3]You Liao, Yupeng Hu, Linjun Wu, Zheng Qin:
A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking. SpaCCS Workshops 2016: 361-370- 2015
[j1]Yupeng Hu, Shun Song, Sheng Xiao, Quan Xu, Nong Xiao, Zheng Qin:
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs. IEEE Trans. Circuits Syst. II Express Briefs 62-II(6): 578-582 (2015)
[c2]Huigui Rong, Liang Gong, Zheng Qin, Yupeng Hu, Chunhua Hu:
A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data. ICA3PP (1) 2015: 460-477
[c1]Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, Huigui Rong:
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data. ICA3PP (3) 2015: 667-681
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-13 23:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







