


default search action
Peizhao Hu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Adam Caulfield, Nabiha Raza, Peizhao Hu:
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. ICICS (2) 2024: 87-106 - [i12]Haoran Li, Wei Fan, Yulin Chen, Jiayang Cheng, Tianshu Chu, Xuebing Zhou, Peizhao Hu, Yangqiu Song:
Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory. CoRR abs/2408.10053 (2024) - 2023
- [j15]Tham Nguyen, Naveen Karunanayake
, Sicong Wang, Suranga Seneviratne
, Peizhao Hu:
Privacy-preserving spam filtering using homomorphic and functional encryption. Comput. Commun. 197: 230-241 (2023) - [i11]Adam Caulfield, Nabiha Raza, Peizhao Hu:
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. IACR Cryptol. ePrint Arch. 2023: 120 (2023) - 2022
- [j14]Robert Podschwadt
, Daniel Takabi
, Peizhao Hu, Mohammad Hossein Rafiei
, Zhipeng Cai
:
A Survey of Deep Learning Architectures for Privacy-Preserving Machine Learning With Fully Homomorphic Encryption. IEEE Access 10: 117477-117500 (2022) - [j13]Wei Yin
, Peizhao Hu, Hongjian Zhou, Guoqiang Xing, Jiahui Wen:
Jamming attacks and defenses for fast association in IEEE 802.11ah networks. Comput. Networks 208: 108890 (2022) - [j12]Asma Aloufi
, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. ACM Comput. Surv. 54(9): 195:1-195:37 (2022) - 2021
- [j11]Asma Aloufi
, Peizhao Hu, Hang Liu, Sherman S. M. Chow
, Kim-Kwang Raymond Choo
:
Universal location referencing and homomorphic evaluation of geospatial query. Comput. Secur. 102: 102137 (2021) - [j10]Asma Aloufi
, Peizhao Hu
, Harry W. H. Wong
, Sherman S. M. Chow
:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1821-1835 (2021) - [i10]Robert Podschwadt, Daniel Takabi, Peizhao Hu:
SoK: Privacy-preserving Deep Learning with Homomorphic Encryption. CoRR abs/2112.12855 (2021) - 2020
- [j9]Srinath Obla
, Xinghan Gong, Asma Aloufi
, Peizhao Hu
, Daniel Takabi:
Effective Activation Functions for Homomorphic Evaluation of Deep Neural Networks. IEEE Access 8: 153098-153112 (2020) - [j8]Wei Yin, Peizhao Hu, Jiahui Wen, Hongjian Zhou:
ACK spoofing on MAC-layer rate control: Attacks and defenses. Comput. Networks 171: 107133 (2020) - [j7]Wei Yin, Peizhao Hu, Wenbo Wang
, Jiahui Wen, Hongjian Zhou:
FASUS: A fast association mechanism for 802.11ah networks. Comput. Networks 175: 107287 (2020) - [j6]Wei Yin
, Peizhao Hu, Jadwiga Indulska
, Marius Portmann
, Ying Mao:
MAC-layer rate control for 802.11 networks: a survey. Wirel. Networks 26(5): 3793-3830 (2020) - [i9]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey. CoRR abs/2007.09270 (2020) - [i8]Ying Mao, Peizhao Hu:
Enhancing Cloud Storage with Shareable Instances for Social Computing. CoRR abs/2010.13296 (2020)
2010 – 2019
- 2019
- [j5]Wenbo Wang
, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong
, Dusit Niyato
, Ping Wang, Yonggang Wen, Dong In Kim
:
A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks. IEEE Access 7: 22328-22370 (2019) - [c35]Mohamed Rahouti, Kaiqi Xiong, Tommy Chin, Peizhao Hu, Diogo Oliveira:
A Preemption-Based Timely Software Defined Networking Framework for Emergency Response Traffic Delivery. HPCC/SmartCity/DSS 2019: 452-459 - [c34]Kelsey Rook, Brendan Witt, Reynold Bailey, Joe Geigel
, Peizhao Hu, Ammina Kothari:
A Study of User Intent in Immersive Smart Spaces. PerCom Workshops 2019: 227-232 - [i7]Asma Aloufi, Peizhao Hu:
Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys. CoRR abs/1911.04101 (2019) - [i6]Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 819 (2019) - [i5]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow:
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query. IACR Cryptol. ePrint Arch. 2019: 820 (2019) - 2018
- [i4]Wenbo Wang, Dinh Thai Hoang, Zehui Xiong, Dusit Niyato, Ping Wang, Peizhao Hu, Yonggang Wen:
A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks. CoRR abs/1805.02707 (2018) - [i3]Ying Mao, Jenna Oak, Anthony Pompili, Daniel Beer, Tao Han, Peizhao Hu:
DRAPS: Dynamic and Resource-Aware Placement Scheme for Docker Containers in a Heterogeneous Cluster. CoRR abs/1805.08598 (2018) - [i2]Wei Yin, Peizhao Hu, Jadwiga Indulska, Marius Portmann, Ying Mao:
MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward. CoRR abs/1807.02827 (2018) - [i1]Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial Query with User-Controlled Privacy. IACR Cryptol. ePrint Arch. 2018: 304 (2018) - 2017
- [j4]Mingyang Zhong, Jiahui Wen, Peizhao Hu
, Jadwiga Indulska
:
Advancing Android activity recognition service with Markov smoother: Practical solutions. Pervasive Mob. Comput. 38: 60-76 (2017) - [j3]Daisuke Kasamatsu, Peizhao Hu, Mohan Kumar:
Effective opportunistic dissemination of spatio-temporal contents in mobile environments. Pervasive Mob. Comput. 42: 27-44 (2017) - [c33]Ying Mao, Jenna Oak, Anthony Pompili, Daniel Beer, Tao Han, Peizhao Hu:
DRAPS: Dynamic and resource-aware placement scheme for docker containers in a heterogeneous cluster. IPCCC 2017: 1-8 - [c32]Daisuke Kasamatsu, Mohan Kumar, Peizhao Hu:
Service Compositions in Challenged Mobile Environments under Spatiotemporal Constraints. SMARTCOMP 2017: 1-8 - [c31]Peizhao Hu, Sherman S. M. Chow
, Asma Aloufi:
Geosocial query with user-controlled privacy. WISEC 2017: 163-172 - 2016
- [c30]Wenbo Wang, Pengda Huang
, Peizhao Hu, Jing Na
, Andres Kwasinski:
Learning in Markov Game for Femtocell Power Allocation with Limited Coordination. GLOBECOM 2016: 1-6 - [c29]Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, Stanislaw P. Radziszowski:
Homomorphic proximity computation in geosocial networks. INFOCOM Workshops 2016: 616-621 - [c28]Joe Geigel, Peizhao Hu, Ashita Khetan, Minseok Kwon, Susan Lakin, Veronica Lin, Robert McCartney, Stephen Petoniak, Matthew Tidridge, Katie Verrant:
PULSE: An infrastructure for collection of audience heartbeats for music visualization. PerCom Workshops 2016: 1-3 - [c27]Yogesh Jagadeesan, Peizhao Hu, Carlos R. Rivero
:
PLOMaR: An ontology framework for context modeling and reasoning on crowd-sensing platform. PerCom Workshops 2016: 1-6 - [c26]Peizhao Hu, Siyu Zhu:
POSTER: Location Privacy Using Homomorphic Encryption. SecureComm 2016: 758-761 - 2015
- [j2]Wei Yin, Peizhao Hu, Jadwiga Indulska
:
Rate control in the mac80211 framework: Overview, evaluation and improvements. Comput. Networks 81: 289-307 (2015) - [c25]Shiraz Qayyum, Peizhao Hu, Mohan Kumar:
COSC: Paths with Combined Optimal Stability and Capacity in opportunistic networks. LCN 2015: 526-534 - [c24]Mingyang Zhong, Jiahui Wen, Peizhao Hu, Jadwiga Indulska
:
Advancing Android activity recognition service with Markov smoother. PerCom Workshops 2015: 38-43 - 2014
- [c23]Mingyang Zhong, Jadwiga Indulska
, Peizhao Hu, Marius Portmann
, Mohan J. Kumar:
Development of Collaborative Video Streaming for Mobile Networks: From Overview to Prototype. UIC/ATC/ScalCom 2014: 372-377 - [c22]Mingyang Zhong, Peizhao Hu, Jadwiga Indulska
:
Revisited: Bandwidth estimation methods for mobile networks. WoWMoM 2014: 1-6 - [c21]Mingyang Zhong, Peizhao Hu, Jadwiga Indulska
, Mohan J. Kumar:
ColStream: Collaborative streaming of on-demand videos for mobile devices. WoWMoM 2014: 1-7 - 2013
- [c20]Ranjana Pathak, Peizhao Hu, Jadwiga Indulska
, Marius Portmann
, Saaidal Azzuhri
:
A performance study of hybrid protocols for opportunistic communications. LCN Workshops 2013: 9-16 - [c19]Ranjana Pathak, Peizhao Hu, Jadwiga Indulska
, Marius Portmann
:
Protocol for efficient opportunistic communication. LCN 2013: 244-247 - [c18]Ranjana Pathak, Peizhao Hu, Jadwiga Indulska
, Marius Portmann
, Wee Lum Tan
:
Towards efficient opportunistic communications: A hybrid approach. PerCom Workshops 2013: 255-260 - [c17]Steve Glass, Jonathan Guerin, Peizhao Hu, Marius Portmann
, Wee Lum Tan
:
Specification versus reality: Experimental evaluation of link capacity estimation in IEEE 802.11. WCNC 2013: 380-385 - 2012
- [c16]Jonathan Guerin, Steve Glass, Peizhao Hu, Wee Lum Tan
, Marius Portmann
:
Time-based and low-cost bandwidth estimation for IEEE 802.11 links. IWCMC 2012: 251-256 - [c15]Wei Yin, Peizhao Hu, Jadwiga Indulska
, Marius Portmann
, Jonathan Guerin:
Robust MAC-layer rate control mechanism for 802.11 wireless networks. LCN 2012: 419-427 - [c14]Peizhao Hu, Nick Symons, Jadwiga Indulska
, Marius Portmann
:
Share your view: Wireless multi-hop video streaming using Android phones. PerCom Workshops 2012: 782-787 - [c13]Wee Lum Tan
, Peizhao Hu, Marius Portmann
:
SNR-Based Link Quality Estimation. VTC Spring 2012: 1-5 - [c12]Wee Lum Tan
, Peizhao Hu, Marius Portmann
:
Experimental evaluation of measurement-based SINR interference models. WOWMOM 2012: 1-9 - 2011
- [c11]Wee Lum Tan
, Marius Portmann
, Peizhao Hu:
A Systematic Evaluation of Interference Characteristics in 802.11-Based Wireless Networks. AINA 2011: 646-652 - [c10]Wei Yin, Peizhao Hu, Jadwiga Indulska
, Konstanty Bialkowski
:
Performance of mac80211 rate control mechanisms. MSWiM 2011: 427-436 - 2010
- [j1]Peizhao Hu, Wee Lum Tan
, Ryan Wishart, Marius Portmann
, Jadwiga Indulska
:
MeshVision: an adaptive wireless mesh network video surveillance system. Multim. Syst. 16(4-5): 243-254 (2010) - [c9]Wei Yin, Konstanty Bialkowski
, Jadwiga Indulska
, Peizhao Hu:
Evaluations of MadWifi MAC layer rate control mechanisms. IWQoS 2010: 1-9 - [c8]Peizhao Hu, Konstanty Bialkowski
, Wee Lum Tan
, Marius Portmann
:
Evaluation of commercial wireless mesh technologies in a public safety context: Methodology, analysis and experience. MASS 2010: 606-611 - [c7]Peizhao Hu, Suan Khai Chong, Jadwiga Indulska
, Shonali Krishnaswamy:
Context-aware and resource efficient sensing infrastructure for context-aware applications. PerCom Workshops 2010: 492-498 - [c6]Wei Yin, Peizhao Hu, Jadwiga Indulska
, Konstanty Bialkowski
:
A Method to Improve Adaptability of the Minstrel MAC Rate Control Algorithm. UIC 2010: 504-518
2000 – 2009
- 2009
- [c5]Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portmann
, Jadwiga Indulska
:
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System. UIC 2009: 193-207 - 2008
- [c4]Peizhao Hu, Jadwiga Indulska
, Ricky Robinson:
An Autonomic Context Management System for Pervasive Computing. PerCom 2008: 213-223 - [c3]Peizhao Hu, Marius Portmann
, Ricky Robinson, Jadwiga Indulska
:
Context-aware routing in wireless mesh networks. CASEMANS 2008: 16-23 - 2006
- [c2]Jadwiga Indulska
, Karen Henricksen, Peizhao Hu:
Towards a Standards-Based Autonomic Context Management System. ATC 2006: 26-37 - [c1]Peizhao Hu, Jadwiga Indulska
, Ricky Robinson:
Reconfigurable middleware for sensor based applications. Middleware Doctoral Symposium 2006: 5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-03 20:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint