Personal information

China

Activities

Education and qualifications (2)

Nankai University: Tianjin, Tianjin, CN

2016-09-01 to present | Doctor (Computer and Information Security,)
Education
Source: Self-asserted source
Yanyu Huang

China University of Geosciences: Wuhan, Hubei, CN

2012-09-01 to 2016-06-30 | bachelor (Computer Science)
Education
Source: Self-asserted source
Yanyu Huang

Works (5)

DivORAM: Towards a practical oblivious RAM with variable block size

Information Sciences
2018 | Journal article
EID:

2-s2.0-85044306505

Contributors: Liu, Z.; Huang, Y.; Li, J.; Cheng, X.; Shen, C.
Source: Self-asserted source
Yanyu Huang via Scopus - Elsevier

Generalized Format-Preserving Encryption for Character Data

Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2018 | Book
EID:

2-s2.0-85034574043

Contributors: Huang, Y.; Li, B.; Liang, S.; Ma, H.; Liu, Z.
Source: Self-asserted source
Yanyu Huang via Scopus - Elsevier

HybridORAM: Practical oblivious cloud storage with constant bandwidth

Information Sciences
2018 | Journal article
EID:

2-s2.0-85042353901

Contributors: Li, B.; Huang, Y.; Liu, Z.; Li, J.; Tian, Z.; Yiu, S.-M.
Source: Self-asserted source
Yanyu Huang via Scopus - Elsevier

A mutation approach of detecting SQL injection vulnerabilities

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85034244235

Contributors: Huang, Y.; Fu, C.; Chen, X.; Guo, H.; He, X.; Li, J.; Liu, Z.
Source: Self-asserted source
Yanyu Huang via Scopus - Elsevier

The scheme of detecting encoded malicious web pages based on information entropy

Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
2016 | Conference paper
EID:

2-s2.0-85011074111

Contributors: Liang, S.; Ma, Y.; Huang, Y.; Guo, J.; Jia, C.
Source: Self-asserted source
Yanyu Huang via Scopus - Elsevier