Cai Fu

According to our database1, Cai Fu authored at least 33 papers between 2005 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Sec. Comput., 2019

Search engine: The social relationship driving power of Internet of Things.
Future Generation Comp. Syst., 2019

Differentially Private Matrix Completion via Distributed Matrix Factorization.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Generation Comp. Syst., 2017

Virtualization of the Encryption Card for Trust Access in Cloud Computing.
IEEE Access, 2017

The Impact of the Collective Influence of Search Engines on Social Networks.
IEEE Access, 2017

Malware Discrimination Based on Reversed Association Task.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Search engine drives the evolution of social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Communication Systems, 2016

Communities Evolution Analysis Based on Events in Dynamic Complex Network.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Multidimensional Trust Evaluation Model Based on Redemption and Data Aggregation.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Search Engine: A Hidden Power for Virus Propagation in Community Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Evolutionary Virus Immune Strategy Based on Community Vitality.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

K-clique community detection based on union-find.
Proceedings of the International Conference on Computer, 2014

Community Vitality in Dynamic Temporal Networks.
IJDSN, 2013

Virus propagation power of the dynamic network.
EURASIP J. Wireless Comm. and Networking, 2013

Efficient Fair UC-Secure Two-Party Computation on Committed Inputs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Projection Pursuit Based Wormhole Detection in Ad Hoc Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Task-based behavior detection of illegal codes.
Mathematical and Computer Modelling, 2012

GRAP: Grey risk assessment based on projection in ad hoc networks.
J. Parallel Distrib. Comput., 2011

A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks.
Int. J. Comput. Intell. Syst., 2011

An Efficient Protocol for the Commit-Prove-Fair-Open functionality.
IACR Cryptology ePrint Archive, 2011

Secure Authentication Scheme based on IBE.
JNW, 2010

A hybrid game model based on reputation for spectrum allocation in wireless networks.
Computer Communications, 2010

A more efficient accountable authority IBE scheme under the DL assumption.
SCIENCE CHINA Information Sciences, 2010

A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Grey Theory Based Nodes Risk Assessment in P2P Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Secure OLSR.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005