default search action
Anmin Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j71]Benxuan Huang, Lihui Pang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
Sponge Attack Against Multi-Exit Networks With Data Poisoning. IEEE Access 12: 33843-33851 (2024) - [j70]Yifan Zhu, Huaibing Peng, Anmin Fu, Wei Yang, Hua Ma, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
Towards robustness evaluation of backdoor defense on quantized deep learning models. Expert Syst. Appl. 255: 124599 (2024) - [j69]Yiyu Yang, Jice Wang, Peng Liu, Anmin Fu, Yuqing Zhang:
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms. IEEE Internet Things J. 11(22): 36841-36857 (2024) - [j68]Jiayun Yan, Jie Chen, Chen Qian, Anmin Fu, Haifeng Qian:
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing. J. Syst. Archit. 153: 103190 (2024) - [j67]Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yang, Anmin Fu:
Towards Interpretable Machine-Learning-Based DDoS Detection. SN Comput. Sci. 5(1): 115 (2024) - [j66]Cheng Wu, Qifan Yu, Shaoning Li, Anmin Fu, Mengguang Liao, Lelin Li:
Geometric Positioning Verification of Spaceborne Photon-Counting Lidar Data Based on Terrain Feature Identification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 19408-19419 (2024) - [j65]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. IEEE Trans. Dependable Secur. Comput. 21(3): 1155-1172 (2024) - [j64]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. IEEE Trans. Inf. Forensics Secur. 19: 104-119 (2024) - [j63]Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. IEEE Trans. Inf. Forensics Secur. 19: 455-468 (2024) - [j62]Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. IEEE Trans. Inf. Forensics Secur. 19: 2356-2369 (2024) - [j61]Qihao Dong, Shengyuan Yang, Zhiyang Dai, Yansong Gao, Shang Wang, Yuan Cao, Anmin Fu, Willy Susilo:
CareFL: Contribution Guided Byzantine-Robust Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 9714-9729 (2024) - [c35]Yang Lei, Jingtian Zhou, Jinmei Pan, Chuan Xiong, Guangcai Xu, Jiancheng Shi, Zhenzhan Wang, Anmin Fu:
Altay 2024: Synergetic Spaceborne Airborne Field Snow Campaign. IGARSS 2024: 1661-1664 - [c34]Yang Lei, Yanghai Yu, Weiliang Li, Jiancheng Shi, Anmin Fu, Jie Xu:
Tropical Forest Height Inversion in Hainan Province of China Using the Chinese Lutan-1 Spaceborne L-Band Bistatic SAR Interferometry. IGARSS 2024: 2285-2289 - [c33]Jie Wan, Changcheng Wang, Anmin Fu, Yu Liu, Yi Li, Zhiqiang Xiong, Tao Zhang:
Vegetation Height and Underlying Terrain Inversion Using Lutan-1 Spaceborne Bistatic InSAR Data Over Forested Areas. IGARSS 2024: 3557-3560 - [c32]Changlong Yu, Bo Zhang, Boyu Kuang, Anmin Fu:
SNIPER: Detect Complex Attacks Accurately from Traffic. ISPEC 2024: 205-221 - [c31]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. SP 2024: 3311-3326 - [i22]Na Li, Chunyi Zhou, Yansong Gao, Hui Chen, Anmin Fu, Zhi Zhang, Yu Shui:
Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects. CoRR abs/2403.08254 (2024) - [i21]Zhiyang Dai, Chunyi Zhou, Anmin Fu:
Decaf: Data Distribution Decompose Attack against Federated Learning. CoRR abs/2405.15316 (2024) - [i20]Chunyi Zhou, Anmin Fu, Zhiyang Dai:
TruVRF: Towards Triple-Granularity Verification on Machine Unlearning. CoRR abs/2408.06063 (2024) - 2023
- [j60]Wei Yang, Xinguang Xiang, Chanying Huang, Anmin Fu, Yiyuan Yang:
MCA-Based Multi-Channel Fusion Attacks Against Cryptographic Implementations. IEEE J. Emerg. Sel. Topics Circuits Syst. 13(2): 476-488 (2023) - [j59]Qiaohan Chu, Anmin Fu, Haifeng Qian, Jie Chen:
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality. IET Inf. Secur. 2023: 1-17 (2023) - [j58]Qihao Dong, Xu Zheng, Anmin Fu, Mang Su, Lei Zhou, Shui Yu:
DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things. IEEE Internet Things J. 10(19): 16907-16916 (2023) - [j57]Zhenzhu Chen, Jie Wu, Anmin Fu, Mang Su, Robert H. Deng:
MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN. Knowl. Based Syst. 270: 110527 (2023) - [j56]Shaoning Li, Qifan Yu, Anmin Fu, Guo Zhang:
A Calibration Method for Large-Footprint Full-Waveform Airborne Laser Altimeter without a Calibration Field. Remote. Sens. 15(11): 2789 (2023) - [j55]Huming Qiu, Hua Ma, Zhi Zhang, Yansong Gao, Yifeng Zheng, Anmin Fu, Pan Zhou, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1185-1198 (2023) - [j54]Yansong Gao, Jianrong Yao, Lihui Pang, Wei Yang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott:
MLMSA: Multilabel Multiside-Channel-Information Enabled Deep Learning Attacks on APUF Variants. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(9): 2863-2876 (2023) - [j53]Boyu Kuang, Anmin Fu, Yansong Gao, Yuqing Zhang, Jianying Zhou, Robert H. Deng:
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(4): 2954-2969 (2023) - [j52]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023) - [j51]Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng:
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(5): 4325-4342 (2023) - [c30]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. AsiaCCS 2023: 938-950 - [c29]Yong Pang, Tao Yu, Wen Jia, Xiaojun Li, Zengyuan Li, Anmin Fu, Fayun Wu, Xiaotong Liu, Xinwei Zhang, Jin Huang, Tao He:
TECIS: The First Mission Towards Forest Carbon Mapping By Combination Of Lidar And Multi-Angle Optical Observations. IGARSS 2023: 1890-1893 - [c28]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. NDSS 2023 - [c27]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. SRDS 2023: 82-92 - [i19]Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit Ahmet Çamtepe, Anmin Fu, Yansong Gao:
Vertical Federated Learning: Taxonomies, Threats, and Prospects. CoRR abs/2302.01550 (2023) - [i18]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. CoRR abs/2309.11894 (2023) - [i17]Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2023: 180 (2023) - 2022
- [j50]Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Comput. Secur. 112: 102498 (2022) - [j49]Anmin Fu, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. Comput. Secur. 116: 102666 (2022) - [j48]Jinpeng Hou, Mang Su, Anmin Fu, Yan Yu:
Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest. IEEE Internet Things J. 9(22): 22158-22172 (2022) - [j47]Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, Yansong Gao:
Towards privacy-preserving and verifiable federated matrix factorization. Knowl. Based Syst. 250: 109193 (2022) - [j46]Anmin Fu, Shui Yu, Yuqing Zhang, Huaqun Wang, Chanying Huang:
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users. IEEE Trans. Big Data 8(1): 14-24 (2022) - [j45]Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. IEEE Trans. Dependable Secur. Comput. 19(2): 1118-1132 (2022) - [j44]Jianrong Yao, Lihui Pang, Yang Su, Zhi Zhang, Wei Yang, Anmin Fu, Yansong Gao:
Design and Evaluate Recomposited OR-AND-XOR-PUF. IEEE Trans. Emerg. Top. Comput. 10(2): 662-677 (2022) - [j43]Zhenzhu Chen, Shang Wang, Anmin Fu, Yansong Gao, Shui Yu, Robert H. Deng:
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check. IEEE Trans. Inf. Forensics Secur. 17: 2000-2014 (2022) - [j42]Anmin Fu, Xianglong Zhang, Naixue Xiong, Yansong Gao, Huaqun Wang, Jing Zhang:
VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT. IEEE Trans. Ind. Informatics 18(5): 3316-3326 (2022) - [j41]Anmin Fu, Zhenzhu Chen, Yi Mu, Willy Susilo, Yinxia Sun, Jie Wu:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - [c26]Xu Zheng, Qihao Dong, Anmin Fu:
WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning. INFOCOM Workshops 2022: 1-6 - [i16]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022) - [i15]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. CoRR abs/2202.04856 (2022) - [i14]Yansong Gao, Jianrong Yao, Lihui Pang, Zhi Zhang, Anmin Fu, Naixue Xiong, Hyoungshick Kim:
Systematically Evaluation of Challenge Obfuscated APUFs. CoRR abs/2203.15316 (2022) - [i13]Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, Yansong Gao:
Towards Privacy-Preserving and Verifiable Federated Matrix Factorization. CoRR abs/2204.01601 (2022) - [i12]Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yanga, Anmin Fu:
Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System. CoRR abs/2204.02255 (2022) - [i11]Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. CoRR abs/2204.06273 (2022) - [i10]Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo:
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences. CoRR abs/2206.00145 (2022) - [i9]Yansong Gao, Jianrong Yao, Lihui Pang, Wei Yang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott:
MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants. CoRR abs/2207.09744 (2022) - [i8]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. CoRR abs/2209.02339 (2022) - 2021
- [j40]Zhenzhu Chen, Anmin Fu, Yinghui Zhang, Zhe Liu, Fanjian Zeng, Robert H. Deng:
Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things. IEEE Internet Things J. 8(7): 5839-5849 (2021) - [j39]Lei Zhou, Anmin Fu, Yi Mu, Huaqun Wang, Shui Yu, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j38]Zhenzhu Chen, Anmin Fu, Robert H. Deng, Ximeng Liu, Yang Yang, Yinghui Zhang:
Secure and verifiable outsourced data dimension reduction on dynamic data. Inf. Sci. 573: 182-193 (2021) - [j37]Si Chen, Anmin Fu, Shui Yu, Haifeng Ke, Mang Su:
DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication. Soft Comput. 25(11): 7325-7339 (2021) - [j36]Anmin Fu, Yulin Cai, Tao Sun, Feng Li:
Estimating the Impact of Land Cover Change on Soil Erosion Using Remote Sensing and GIS Data by USLE Model and Scenario Design. Sci. Program. 2021: 6633428:1-6633428:10 (2021) - [j35]Huaqun Wang, Debiao He, Anmin Fu, Qi Li, Qihua Wang:
Provable Data Possession with Outsourced Data Transfer. IEEE Trans. Serv. Comput. 14(6): 1929-1939 (2021) - [c25]Erteng Hu, Anmin Fu, Zhiyi Zhang, Linjie Zhang, Yantao Guo, Yin Liu:
ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality. INFOCOM Workshops 2021: 1-6 - [i7]Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things. CoRR abs/2105.03822 (2021) - [i6]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Models. CoRR abs/2108.09187 (2021) - [i5]Jianrong Yao, Lihui Pang, Zhi Zhang, Wei Yang, Anmin Fu, Yansong Gao:
Design and Evaluate Recomposited OR-AND-XOR-PUF. CoRR abs/2110.00909 (2021) - [i4]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Backdoor Detection. CoRR abs/2111.11157 (2021) - 2020
- [j34]Abdullah Al-Noman Patwary, Anmin Fu, Sudheer Kumar Battula, Ranesh Kumar Naha, Saurabh Garg, Aniket Mahanti:
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. Comput. Commun. 162: 212-224 (2020) - [j33]Boyu Kuang, Anmin Fu, Lu Zhou, Willy Susilo, Yuqing Zhang:
DO-RA: Data-oriented runtime attestation for IoT devices. Comput. Secur. 97: 101945 (2020) - [j32]Yinxia Sun, Futai Zhang, Anmin Fu, Zhe Xia:
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution. Int. J. Found. Comput. Sci. 31(2): 175-191 (2020) - [j31]Chunyi Zhou, Anmin Fu, Shui Yu, Wei Yang, Huaqun Wang, Yuqing Zhang:
Privacy-Preserving Federated Learning in Fog Computing. IEEE Internet Things J. 7(11): 10782-10793 (2020) - [j30]Mang Su, Bo Zhou, Anmin Fu, Yan Yu, Gongxuan Zhang:
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT. Inf. Sci. 527: 533-547 (2020) - [j29]Si Chen, Anmin Fu, Jian Shen, Shui Yu, Huaqun Wang, Huaijiang Sun:
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection. J. Netw. Comput. Appl. 168: 102736 (2020) - [j28]Yinxia Sun, Yi Mu, Willy Susilo, Futai Zhang, Anmin Fu:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020) - [c24]Zheng Lian, Mang Su, Anmin Fu, Huaqun Wang, Chunyi Zhou:
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud. ICC 2020: 1-6 - [c23]Xianglong Zhang, Anmin Fu, Huaqun Wang, Chunyi Zhou, Zhenzhu Chen:
A Privacy-Preserving and Verifiable Federated Learning Scheme. ICC 2020: 1-6 - [c22]Lei Zhou, Anmin Fu, Jingyu Feng, Chunyi Zhou:
An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR. ICC 2020: 1-6 - [c21]Wei Yang, Hailong Zhang, Yansong Gao, Anmin Fu, Songjie Wei:
Side-Channel Leakage Detection Based on Constant Parameter Channel Model. ICCD 2020: 553-560 - [c20]Zhicheng Luo, Weijia Ding, Anmin Fu, Zhiyi Zhang, Linjie Zhang:
High-Speed Network Attack Detection Framework Based on Optimized Feature Selection. SPDE 2020: 65-78 - [c19]Wei Yang, Anmin Fu, Hailong Zhang, Chanying Huang:
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. TrustCom 2020: 54-61 - [i3]Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Kumar Garg, Md Anwarul Kaium Patwary, Erfan Aghasian:
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review. CoRR abs/2003.00395 (2020) - [i2]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020) - [i1]Anmin Fu, Xianglong Zhang, Naixue Xiong, Yansong Gao, Huaqun Wang:
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT. CoRR abs/2007.13585 (2020)
2010 – 2019
- 2019
- [j27]Longxia Huang, Gongxuan Zhang, Shui Yu, Anmin Fu, John Yearwood:
SeShare: Secure cloud data sharing based on blockchain and public auditing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j26]Boyu Kuang, Anmin Fu, Shui Yu, Guomin Yang, Mang Su, Yuqing Zhang:
ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms. IEEE Internet Things J. 6(5): 8372-8383 (2019) - [j25]Chanying Huang, Songjie Wei, Anmin Fu:
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage. J. Circuits Syst. Comput. 28(11): 1950186:1-1950186:18 (2019) - [c18]Wenwen Yan, Anmin Fu, Yi Mu, Zhe Xia, Shui Yu, Boyu Kuang:
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S&P@CCS 2019: 2-7 - [c17]Xiaobo Li, Lei Zhou, Anmin Fu, Shui Yu, Mang Su, Wei Yang:
Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing. GLOBECOM 2019: 1-6 - 2018
- [j24]Yinxia Sun, Willy Susilo, Futai Zhang, Anmin Fu:
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud. IEEE Access 6: 56977-56983 (2018) - [j23]Anmin Fu, Yiming Zhu, Guomin Yang, Shui Yu, Yan Yu:
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. Clust. Comput. 21(4): 1933-1947 (2018) - [j22]Anmin Fu, Yuhan Li, Shui Yu, Yan Yu, Gongxuan Zhang:
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw. Comput. Appl. 104: 97-106 (2018) - [j21]Anmin Fu, Shuai Li, Shui Yu, Yuqing Zhang, Yinxia Sun:
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118: 102-112 (2018) - [j20]Lei Zhou, Anmin Fu, Shui Yu, Mang Su, Boyu Kuang:
Data integrity verification of the outsourced big data in the cloud environment: A survey. J. Netw. Comput. Appl. 122: 1-15 (2018) - [j19]Jingyu Feng, Shaoping Li, Shaoqing Lv, Honggang Wang, Anmin Fu:
Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 67(9): 8276-8287 (2018) - [j18]Longxia Huang, Gongxuan Zhang, Anmin Fu:
Privacy-Preserving Public Auditing for Non-manager Group Shared Data. Wirel. Pers. Commun. 100(4): 1277-1294 (2018) - [c16]Yinxia Sun, Futai Zhang, Anmin Fu:
Revocable Certificateless Encryption with Ciphertext Evolution. ACISP 2018: 741-749 - [c15]Qiuyan Shi, Yongli Wang, Jianhong Sun, Anmin Fu:
Short Text Understanding Based on Conceptual and Semantic Enrichment. ADMA 2018: 329-338 - [c14]Chanying Huang, Songjie Wei, Kedong Yan, Gongxuan Zhang, Anmin Fu:
A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing. APSIPA 2018: 260-265 - [c13]Haifeng Ke, Anmin Fu, Shui Yu, Si Chen:
AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data. GLOBECOM 2018: 1-6 - [c12]Longxia Huang, Gongxuan Zhang, Shui Yu, Anmin Fu, John Yearwood:
Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute. GLOBECOM 2018: 206-212 - [c11]Zhenzhu Chen, Anmin Fu, Ke Xiao, Mang Su, Yan Yu, Yongli Wang:
Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing. ICC 2018: 1-6 - [c10]Yiming Zhu, Anmin Fu, Shui Yu, Yan Yu, Shuai Li, Zhenzhu Chen:
New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server. ICC 2018: 1-6 - 2017
- [j17]Shuai Li, Longxia Huang, Anmin Fu, John Yearwood:
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. Digit. Commun. Networks 3(4): 236-241 (2017) - [j16]Hong Chi, Guoqing Sun, Jinliang Huang, Rendong Li, Xianyou Ren, Wenjian Ni, Anmin Fu:
Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data. Remote. Sens. 9(7): 707 (2017) - [j15]Anmin Fu, Ningyuan Qin, Yongli Wang, Qianmu Li, Gongxuan Zhang:
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks. Wirel. Networks 23(7): 2165-2176 (2017) - [c9]Longxia Huang, Gongxuan Zhang, Anmin Fu:
Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group. ACSW 2017: 76:1-76:6 - [c8]Longxia Huang, Gongxuan Zhang, Anmin Fu:
Privacy-preserving public auditing for non-manager group. ICC 2017: 1-6 - [c7]Yuhan Li, Anmin Fu, Yan Yu, Gongxuan Zhang:
IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems. ICC 2017: 1-6 - [c6]Bowei Chen, Zengyuan Li, Yong Pang, Qingwang Liu, Xianlian Gao, Jinping Gao, Anmin Fu:
Forest height estimation based on uav lidar simulated waveform. IGARSS 2017: 2859-2862 - 2016
- [j14]Anmin Fu, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang:
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Secur. Commun. Networks 9(13): 2002-2014 (2016) - [c5]Mang Su, Anmin Fu, Yan Yu, Guozhen Shi:
Resource-centric Dynamic Access Control in Cloud. Trustcom/BigDataSE/ISPA 2016: 1957-1962 - 2015
- [j13]Shouguo Chen, Anmin Fu, Ningyuan Qin:
异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks). 计算机科学 42(3): 111-116 (2015) - [j12]Ningyuan Qin, Anmin Fu, Shouguo Chen:
LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议 (Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks). 计算机科学 42(8): 145-151 (2015) - [j11]Zhenchao Zhu, Aiqun Hu, Anmin Fu:
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 14(11): 4245-4254 (2015) - [j10]Hong Chi, Guoqing Sun, Jinliang Huang, Zhifeng Guo, Wenjian Ni, Anmin Fu:
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China. Remote. Sens. 7(5): 5534-5564 (2015) - 2014
- [j9]Anmin Fu, Gongxuan Zhang, Yan Yu, Zhenchao Zhu:
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks. KSII Trans. Internet Inf. Syst. 8(9): 3250-3265 (2014) - [j8]Anmin Fu, Gongxuan Zhang, Zhenchao Zhu, Yuqing Zhang:
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks. Wirel. Pers. Commun. 79(2): 1277-1299 (2014) - 2013
- [j7]Zhenchao Zhu, Aiqun Hu, Anmin Fu:
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents. Quantum Inf. Process. 12(2): 1173-1183 (2013) - [j6]Anmin Fu, Gongxuan Zhang, Yuqing Zhang, Zhenchao Zhu:
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks. Wirel. Pers. Commun. 70(4): 1793-1810 (2013) - [c4]Anmin Fu, Gongxuan Zhang, Zhenchao Zhu:
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol. TrustCom/ISPA/IUCC 2013: 310-314 - 2012
- [j5]Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Qi Jing, Jingyu Feng:
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Comput. Secur. 31(6): 741-749 (2012) - [j4]Anmin Fu, Shaohua Lan, Bo Huang, Zhenchao Zhu, Yuqing Zhang:
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks. IEEE Commun. Lett. 16(11): 1744-1747 (2012) - [c3]Qi Jing, Yuqing Zhang, Xuefeng Liu, Anmin Fu:
An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks. ICC 2012: 857-862 - 2011
- [j3]Anmin Fu, Yuqing Zhang, Jingyu Feng:
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network. IEICE Trans. Commun. 94-B(5): 1295-1302 (2011) - [c2]Qi Jing, Yuqing Zhang, Anmin Fu, Xuefeng Liu:
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks. GLOBECOM 2011: 1-6 - [c1]Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Jingyu Feng:
EKMP: An enhanced key management protocol for IEEE 802.16m. WCNC 2011: 1137-1142 - 2010
- [j2]Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Xuefeng Liu:
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m. IEEE Commun. Lett. 14(12): 1134-1136 (2010) - [j1]Anmin Fu, Guoqing Sun, Zhifeng Guo, Dianzhong Wang:
Forest Cover Classification With MODIS Images in Northeastern Asia. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 3(2): 178-189 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint