Fanyu Kong

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds.
CoRR, August, 2025

Performance Analysis of STAR-RIS-Aided RSMA System With Hardware Impairment.
IEEE Commun. Lett., July, 2025

Scheduling problems with rejection in green manufacturing industry.
J. Comb. Optim., May, 2025

Scheduling with step learning and job rejection.
Oper. Res., March, 2025

Uniform-machine scheduling problems in green manufacturing system.
Math. Found. Comput., 2025

2024
Single-machine scheduling with coupled task and rejection.
Math. Found. Comput., 2024

Unraveling the role of tissue colonized microbiome in ovarian cancer progression.
Comput. Biol. Medicine, 2024

2023
Multitasking scheduling with alternate periods.
J. Comb. Optim., April, 2023

Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time.
Asia Pac. J. Oper. Res., February, 2023

OceanBase Paetica: A Hybrid Shared-nothing/Shared-everything Database for Supporting Single Machine and Distributed Cluster.
Proc. VLDB Endow., 2023

EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records.
npj Digit. Medicine, 2023

LCL: A Lock Chain Length-based Distributed Algorithm for Deadlock Detection and Resolution.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

2020
Adsorption Properties of Pd3-Modified Double-Vacancy Defect Graphene toward SF6 Decomposition Products.
Sensors, 2020

Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

2018
Wireless Charger Placement and Power Allocation for Maximizing Charging Quality.
IEEE Trans. Mob. Comput., 2018

2017
Optimizing Itinerary Selection and Charging Association for Mobile Chargers.
IEEE Trans. Mob. Comput., 2017

Networklet: Concept and Deployment.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Modeling and Deploying Networklet.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
DietCam: Multiview Food Recognition Using a Multikernel SVM.
IEEE J. Biomed. Health Informatics, 2016

2015
DietCam: Multi-view regular shape food recognition with a camera phone.
Pervasive Mob. Comput., 2015

P<sup>3</sup>: Joint optimization of charger placement and power allocation for wireless power transfer.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2012
DietCam: Automatic dietary assessment with mobile camera phones.
Pervasive Mob. Comput., 2012

2011
DietCam: Regular Shape Food Recognition with a Camera Phone.
Proceedings of the International Conference on Body Sensor Networks, 2011

2010
Lattice-Based Proxy Signature.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
New left-to-right minimal weight signed-digit radix-r representation.
Comput. Electr. Eng., 2009

HealthAware: Tackling obesity with health aware smart phone systems.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

A 3D object model for wireless camera networks with network constraints.
Proceedings of the Third ACM/IEEE International Conference on Distributed Smart Cameras, 2009

2008
Cryptanalysis of a Type of CRT-Based RSA Algorithms.
J. Comput. Sci. Technol., 2008

2007
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2005
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...