Anmin Fu

According to our database1, Anmin Fu authored at least 63 papers between 2010 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Estimating the Impact of Land Cover Change on Soil Erosion Using Remote Sensing and GIS Data by USLE Model and Scenario Design.
Sci. Program., 2021

Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021

Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things.
IEEE Internet Things J., 2021

2020
Revocable identity-based encryption with server-aided ciphertext evolution.
Theor. Comput. Sci., 2020

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT.
Inf. Sci., 2020

Privacy-Preserving Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution.
Int. J. Found. Comput. Sci., 2020

VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review.
CoRR, 2020

DO-RA: Data-oriented runtime attestation for IoT devices.
Comput. Secur., 2020

FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain.
Comput. Commun., 2020

Improving Efficiency of Key Enumeration Based on Side-Channel Analysis.
Proceedings of the 19th IEEE International Conference on Trust, 2020

High-Speed Network Attack Detection Framework Based on Optimized Feature Selection.
Proceedings of the Security and Privacy in Digital Economy, 2020

Side-Channel Leakage Detection Based on Constant Parameter Channel Model.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Privacy-Preserving and Verifiable Federated Learning Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage.
J. Circuits Syst. Comput., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

SeShare: Secure cloud data sharing based on blockchain and public auditing.
Concurr. Comput. Pract. Exp., 2019

Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.
Wirel. Pers. Commun., 2018

Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2018

Data integrity verification of the outsourced big data in the cloud environment: A survey.
J. Netw. Comput. Appl., 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Netw. Comput. Appl., 2018

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud.
IEEE Access, 2018

New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.
Proceedings of the IEEE Global Communications Conference, 2018

Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.
Proceedings of the IEEE Global Communications Conference, 2018

A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Short Text Understanding Based on Conceptual and Semantic Enrichment.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Revocable Certificateless Encryption with Ciphertext Evolution.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.
Wirel. Networks, 2017

Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data.
Remote. Sens., 2017

Forest height estimation based on uav lidar simulated waveform.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-preserving public auditing for non-manager group.
Proceedings of the IEEE International Conference on Communications, 2017

Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Secur. Commun. Networks, 2016

Resource-centric Dynamic Access Control in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China.
Remote. Sens., 2015

Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement.
Quantum Inf. Process., 2015

LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议 (Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks).
计算机科学, 2015

异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks).
计算机科学, 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
KSII Trans. Internet Inf. Syst., 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013

Cryptanalysis of a new circular quantum secret sharing protocol for remote agents.
Quantum Inf. Process., 2013

A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Commun. Lett., 2012

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012

An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011

EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks.
Proceedings of the Global Communications Conference, 2011

2010
Forest Cover Classification With MODIS Images in Northeastern Asia.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2010

A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m.
IEEE Commun. Lett., 2010


  Loading...