<?xml version="1.0"?>
<dblpperson name="Hang Tu" pid="33/19" n="18">
<person key="homepages/33/19" mdate="2009-06-08">
<author pid="33/19">Hang Tu</author>
</person>
<r><article key="journals/ijon/TuLLZ26" mdate="2026-01-07">
<author orcid="0009-0003-3771-0225" pid="33/19">Hang Tu</author>
<author pid="57/3505-3">Peng Liang 0003</author>
<author pid="30/1548">Xiaoguang Lu</author>
<author pid="91/6896-1">Huimin Zhao 0001</author>
<title>MGCFDN: Image copy-move forgery detection method based on multi-granularity feature consistency.</title>
<pages>132029</pages>
<year>2026</year>
<volume>664</volume>
<journal>Neurocomputing</journal>
<ee>https://doi.org/10.1016/j.neucom.2025.132029</ee>
<url>db/journals/ijon/ijon664.html#TuLLZ26</url>
<stream>streams/journals/ijon</stream>
</article>
</r>
<r><article key="journals/es/LiangTHL25" mdate="2026-02-01">
<author pid="57/3505-3">Peng Liang 0003</author>
<author orcid="0009-0003-3771-0225" pid="33/19">Hang Tu</author>
<author orcid="0000-0002-8080-082X" pid="03/6772">Amir Hussain 0001</author>
<author pid="178/3150">Ziyuan Li</author>
<title>MTFDN: An image copy-move forgery detection method based on multi-task learning.</title>
<year>2025</year>
<month>February</month>
<volume>42</volume>
<journal>Expert Syst. J. Knowl. Eng.</journal>
<number>2</number>
<ee>https://doi.org/10.1111/exsy.13729</ee>
<url>db/journals/es/es42.html#LiangTHL25</url>
<stream>streams/journals/es</stream>
</article>
</r>
<r><article key="journals/sensors/LiangLTZ24" mdate="2025-03-11">
<author pid="57/3505-3">Peng Liang 0003</author>
<author orcid="0009-0004-7118-4633" pid="178/3150">Ziyuan Li</author>
<author orcid="0009-0003-3771-0225" pid="33/19">Hang Tu</author>
<author pid="91/6896-1">Huimin Zhao 0001</author>
<title>LBRT: Local-Information-Refined Transformer for Image Copy-Move Forgery Detection.</title>
<pages>4143</pages>
<year>2024</year>
<month>July</month>
<volume>24</volume>
<journal>Sensors</journal>
<number>13</number>
<ee type="oa">https://doi.org/10.3390/s24134143</ee>
<url>db/journals/sensors/sensors24.html#LiangLTZ24</url>
<stream>streams/journals/sensors</stream>
</article>
</r>
<r><article key="journals/istr/YuCTYZ23" mdate="2023-03-28">
<author orcid="0000-0002-2965-9971" pid="286/6202">Jiarui Yu</author>
<author pid="81/254">Jingsong Cui</author>
<author pid="33/19">Hang Tu</author>
<author pid="42/8089">Chunwu Yu</author>
<author pid="165/8236">Man Zhou</author>
<title>A SM2 based efficient and lightweight batch verification approach for IC cards.</title>
<pages>103409</pages>
<year>2023</year>
<month>March</month>
<volume>73</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2022.103409</ee>
<url>db/journals/istr/istr73.html#YuCTYZ23</url>
</article>
</r>
<r><inproceedings key="conf/ica3pp/XieTLC23" mdate="2024-04-01">
<author orcid="0009-0001-4707-7203" pid="357/3164">Yukang Xie</author>
<author pid="33/19">Hang Tu</author>
<author orcid="0000-0002-8979-5094" pid="06/2123-3">Qin Liu 0003</author>
<author pid="266/3934">Changrong Chen</author>
<title>A Pipelined AES and SM4 Hardware Implementation for Multi-tasking Virtualized Environments.</title>
<pages>275-291</pages>
<year>2023</year>
<booktitle>ICA3PP (2)</booktitle>
<ee>https://doi.org/10.1007/978-981-97-0801-7_16</ee>
<crossref>conf/ica3pp/2023-2</crossref>
<url>db/conf/ica3pp/ica3pp2023-2.html#XieTLC23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/msn/WangZTLZ23" mdate="2025-11-16">
<author pid="203/1571">Xingying Wang</author>
<author pid="225/4017">Linwen Zhang</author>
<author pid="33/19">Hang Tu</author>
<author orcid="0000-0002-8979-5094" pid="06/2123-3">Qin Liu 0003</author>
<author pid="165/8236-4">Man Zhou 0004</author>
<title>Smart Card Auto-Selection Using GPS and WiFi Fingerprints for Smartphones.</title>
<pages>714-721</pages>
<year>2023</year>
<booktitle>MSN</booktitle>
<ee>https://doi.org/10.1109/MSN60784.2023.00104</ee>
<crossref>conf/msn/2023</crossref>
<url>db/conf/msn/msn2023.html#WangZTLZ23</url>
</inproceedings>
</r>
<r><article key="journals/tcyb/Chen00WQT22" mdate="2025-10-11">
<author orcid="0000-0002-3824-4049" pid="99/6879-20">Jia Chen 0020</author>
<author orcid="0000-0001-9376-818X" pid="23/7268">Ming Zhong 0002</author>
<author orcid="0000-0002-9059-330X" pid="l/JianxinLi">Jianxin Li 0001</author>
<author orcid="0000-0002-5356-7268" pid="04/6192-1">Dianhui Wang 0001</author>
<author orcid="0000-0003-4667-5794" pid="17/5583">Tieyun Qian</author>
<author pid="33/19">Hang Tu</author>
<title>Effective Deep Attributed Network Representation Learning With Topology Adapted Smoothing.</title>
<pages>5935-5946</pages>
<year>2022</year>
<volume>52</volume>
<journal>IEEE Trans. Cybern.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TCYB.2021.3064092</ee>
<ee>https://www.wikidata.org/entity/Q114084872</ee>
<url>db/journals/tcyb/tcyb52.html#Chen00WQT22</url>
</article>
</r>
<r><article key="journals/ijes/CuiT19" mdate="2020-09-11">
<author pid="81/254">Jingsong Cui</author>
<author pid="33/19">Hang Tu</author>
<title>Efficient authentication scheme for vehicular ad-hoc networks with batch verification using bilinear pairings.</title>
<pages>363-373</pages>
<year>2019</year>
<volume>11</volume>
<journal>Int. J. Embed. Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1504/IJES.2019.099404</ee>
<url>db/journals/ijes/ijes11.html#CuiT19</url>
</article>
</r>
<r><article key="journals/ijesdf/LiZT19" mdate="2023-08-28">
<author pid="53/2189">Li Li</author>
<author pid="226/5464">Siqin Zhou</author>
<author pid="33/19">Hang Tu</author>
<title>Fingerprint authentication based on fuzzy extractor in the mobile device.</title>
<pages>321-337</pages>
<year>2019</year>
<volume>11</volume>
<journal>Int. J. Electron. Secur. Digit. Forensics</journal>
<number>3</number>
<ee>https://doi.org/10.1504/IJESDF.2019.100479</ee>
<ee>https://www.wikidata.org/entity/Q114965010</ee>
<url>db/journals/ijesdf/ijesdf11.html#LiZT19</url>
</article>
</r>
<r><inproceedings key="conf/msn/CuiSLTW19" mdate="2022-06-24">
<author pid="81/254">Jingsong Cui</author>
<author pid="187/0466">Zhiqi Song</author>
<author orcid="0000-0002-8979-5094" pid="06/2123-3">Qin Liu 0003</author>
<author pid="33/19">Hang Tu</author>
<author pid="35/8397">Tianyu Wang</author>
<title>A Generalized Obfuscation Method to Protect Software of Mobile Apps.</title>
<pages>31-36</pages>
<year>2019</year>
<booktitle>MSN</booktitle>
<ee>https://doi.org/10.1109/MSN48538.2019.00020</ee>
<crossref>conf/msn/2019</crossref>
<url>db/conf/msn/msn2019.html#CuiSLTW19</url>
</inproceedings>
</r>
<r><article key="journals/ijesdf/CuiT18" mdate="2023-08-28">
<author pid="81/254">Jingsong Cui</author>
<author pid="33/19">Hang Tu</author>
<title>Secure and efficient authentication scheme for access control in mobile pay-TV systems.</title>
<pages>292-310</pages>
<year>2018</year>
<volume>10</volume>
<journal>Int. J. Electron. Secur. Digit. Forensics</journal>
<number>3</number>
<ee>https://doi.org/10.1504/IJESDF.2018.10013063</ee>
<ee>https://www.wikidata.org/entity/Q114965073</ee>
<url>db/journals/ijesdf/ijesdf10.html#CuiT18</url>
</article>
</r>
<r><article key="journals/mta/TuKKS15" mdate="2020-05-11">
<author pid="33/19">Hang Tu</author>
<author orcid="0000-0002-3020-3947" pid="04/8395">Neeraj Kumar 0001</author>
<author pid="24/4665">Jongsung Kim</author>
<author orcid="0000-0003-0971-8548" pid="37/4024">Jungtaek Seo</author>
<title>A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.</title>
<pages>6365-6377</pages>
<year>2015</year>
<volume>74</volume>
<journal>Multim. Tools Appl.</journal>
<number>16</number>
<ee>https://doi.org/10.1007/s11042-015-2470-3</ee>
<url>db/journals/mta/mta74.html#TuKKS15</url>
</article>
</r>
<r><article key="journals/ppna/TuKCR15" mdate="2021-10-04">
<author pid="33/19">Hang Tu</author>
<author orcid="0000-0002-3020-3947" pid="04/8395">Neeraj Kumar 0001</author>
<author pid="31/1108">Naveen K. Chilamkurti</author>
<author pid="73/4067">Seungmin Rho</author>
<title>An improved authentication protocol for session initiation protocol using smart card.</title>
<pages>903-910</pages>
<year>2015</year>
<volume>8</volume>
<journal>Peer-to-Peer Netw. Appl.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s12083-014-0248-4</ee>
<url>db/journals/ppna/ppna8.html#TuKCR15</url>
</article>
</r>
<r><article key="journals/ijesdf/QiaoT14" mdate="2023-08-28">
<author pid="164/1190">Pengshuai Qiao</author>
<author pid="33/19">Hang Tu</author>
<title>A security enhanced password authentication and update scheme based on elliptic curve cryptography.</title>
<pages>130-139</pages>
<year>2014</year>
<volume>6</volume>
<journal>Int. J. Electron. Secur. Digit. Forensics</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJESDF.2014.063109</ee>
<ee>https://www.wikidata.org/entity/Q114595756</ee>
<url>db/journals/ijesdf/ijesdf6.html#QiaoT14</url>
</article>
</r>
<r><article key="journals/itc/TuSHC14" mdate="2023-08-28">
<author pid="33/19">Hang Tu</author>
<author pid="02/3062">Han Shen</author>
<author pid="87/7765">Debiao He</author>
<author pid="21/5301-2">Jianhua Chen 0002</author>
<title>Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol.</title>
<pages>57-63</pages>
<year>2014</year>
<volume>43</volume>
<journal>Inf. Technol. Control.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.5755/j01.itc.43.1.5322</ee>
<ee>https://www.wikidata.org/entity/Q114570149</ee>
<url>db/journals/itc/itc43.html#TuSHC14</url>
</article>
</r>
<r><article key="journals/tjs/ZuoKTSCR14" mdate="2020-07-01">
<author pid="151/4693">Liming Zuo</author>
<author orcid="0000-0002-3020-3947" pid="04/8395">Neeraj Kumar 0001</author>
<author pid="33/19">Hang Tu</author>
<author pid="53/9927">Ankit Singh</author>
<author pid="31/1108">Naveen K. Chilamkurti</author>
<author pid="73/4067">Seungmin Rho</author>
<title>Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system.</title>
<pages>177-199</pages>
<year>2014</year>
<volume>70</volume>
<journal>J. Supercomput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11227-014-1149-2</ee>
<url>db/journals/tjs/tjs70.html#ZuoKTSCR14</url>
</article>
</r>
<r><article key="journals/tjs/TuKHKL14" mdate="2023-08-28">
<author pid="33/19">Hang Tu</author>
<author orcid="0000-0002-3020-3947" pid="04/8395">Neeraj Kumar 0001</author>
<author pid="87/7765">Debiao He</author>
<author pid="24/4665">Jongsung Kim</author>
<author orcid="0000-0003-4292-5792" pid="93/3417">Changhoon Lee</author>
<title>An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.</title>
<pages>224-235</pages>
<year>2014</year>
<volume>70</volume>
<journal>J. Supercomput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11227-014-1198-6</ee>
<ee>https://www.wikidata.org/entity/Q114689268</ee>
<url>db/journals/tjs/tjs70.html#TuKHKL14</url>
</article>
</r>
<r><inproceedings key="conf/ices/HeLYZT07" mdate="2023-02-15">
<author pid="14/6610">Guoliang He</author>
<author pid="90/283-1">Yuanxiang Li 0001</author>
<author pid="70/5913">Li Yu</author>
<author pid="10/4661">Wei Zhang</author>
<author pid="33/19">Hang Tu</author>
<title>Design of Electronic Circuits Using a Divide-and-Conquer Approach.</title>
<pages>13-22</pages>
<year>2007</year>
<crossref>conf/ices/2007</crossref>
<booktitle>ICES</booktitle>
<ee>https://doi.org/10.1007/978-3-540-74626-3_2</ee>
<url>db/conf/ices/ices2007.html#HeLYZT07</url>
</inproceedings>
</r>
<coauthors n="40" nc="2">
<co c="0"><na f="c/Chen:Changrong" pid="266/3934">Changrong Chen</na></co>
<co c="0"><na f="c/Chen_0020:Jia" pid="99/6879-20">Jia Chen 0020</na></co>
<co c="0"><na f="c/Chen_0002:Jianhua" pid="21/5301-2">Jianhua Chen 0002</na></co>
<co c="0"><na f="c/Chilamkurti:Naveen_K=" pid="31/1108">Naveen K. Chilamkurti</na></co>
<co c="0"><na f="c/Cui:Jingsong" pid="81/254">Jingsong Cui</na></co>
<co c="0"><na f="h/He:Debiao" pid="87/7765">Debiao He</na></co>
<co c="0"><na f="h/He:Guoliang" pid="14/6610">Guoliang He</na></co>
<co c="1"><na f="h/Hussain_0001:Amir" pid="03/6772">Amir Hussain 0001</na></co>
<co c="0"><na f="k/Kim:Jongsung" pid="24/4665">Jongsung Kim</na></co>
<co c="0"><na f="k/Kumar_0001:Neeraj" pid="04/8395">Neeraj Kumar 0001</na></co>
<co c="0"><na f="l/Lee:Changhoon" pid="93/3417">Changhoon Lee</na></co>
<co c="0"><na f="l/Li_0001:Jianxin" pid="l/JianxinLi">Jianxin Li 0001</na></co>
<co c="0"><na f="l/Li:Li" pid="53/2189">Li Li</na></co>
<co c="0"><na f="l/Li_0001:Yuanxiang" pid="90/283-1">Yuanxiang Li 0001</na></co>
<co c="1"><na f="l/Li:Ziyuan" pid="178/3150">Ziyuan Li</na></co>
<co c="1"><na f="l/Liang_0003:Peng" pid="57/3505-3">Peng Liang 0003</na></co>
<co c="0"><na f="l/Liu_0003:Qin" pid="06/2123-3">Qin Liu 0003</na></co>
<co c="1"><na f="l/Lu:Xiaoguang" pid="30/1548">Xiaoguang Lu</na></co>
<co c="0"><na f="q/Qian:Tieyun" pid="17/5583">Tieyun Qian</na></co>
<co c="-1"><na f="q/Qiao:Pengshuai" pid="164/1190">Pengshuai Qiao</na></co>
<co c="0"><na f="r/Rho:Seungmin" pid="73/4067">Seungmin Rho</na></co>
<co c="0" n="2"><na f="s/Seo:Jung=Taek" pid="37/4024">Jung-Taek Seo</na><na>Jungtaek Seo</na></co>
<co c="0"><na f="s/Shen:Han" pid="02/3062">Han Shen</na></co>
<co c="0"><na f="s/Singh:Ankit" pid="53/9927">Ankit Singh</na></co>
<co c="0"><na f="s/Song:Zhiqi" pid="187/0466">Zhiqi Song</na></co>
<co c="0"><na f="w/Wang_0001:Dianhui" pid="04/6192-1">Dianhui Wang 0001</na></co>
<co c="0"><na f="w/Wang:Tianyu" pid="35/8397">Tianyu Wang</na></co>
<co c="0"><na f="w/Wang:Xingying" pid="203/1571">Xingying Wang</na></co>
<co c="0"><na f="x/Xie:Yukang" pid="357/3164">Yukang Xie</na></co>
<co c="0"><na f="y/Yu:Chunwu" pid="42/8089">Chunwu Yu</na></co>
<co c="0"><na f="y/Yu:Jiarui" pid="286/6202">Jiarui Yu</na></co>
<co c="0"><na f="y/Yu:Li" pid="70/5913">Li Yu</na></co>
<co c="0"><na f="z/Zhang:Linwen" pid="225/4017">Linwen Zhang</na></co>
<co c="0"><na f="z/Zhang:Wei" pid="10/4661">Wei Zhang</na></co>
<co c="1"><na f="z/Zhao_0001:Huimin" pid="91/6896-1">Huimin Zhao 0001</na></co>
<co c="0"><na f="z/Zhong_0002:Ming" pid="23/7268">Ming Zhong 0002</na></co>
<co c="0"><na f="z/Zhou:Man" pid="165/8236">Man Zhou</na></co>
<co c="0"><na f="z/Zhou_0004:Man" pid="165/8236-4">Man Zhou 0004</na></co>
<co c="0"><na f="z/Zhou:Siqin" pid="226/5464">Siqin Zhou</na></co>
<co c="0"><na f="z/Zuo:Liming" pid="151/4693">Liming Zuo</na></co>
</coauthors>
</dblpperson>

