Fanyu Kong
Orcid: 0000-0003-1369-6855Affiliations:
- Shandong University, Jinan, China
According to our database1,
Fanyu Kong
authored at least 82 papers
between 2006 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
Expert Syst. Appl., 2026
Comput. Stand. Interfaces, 2026
2025
HPformer: Low-Parameter Transformer With Temporal Dependency Hierarchical Propagation for Health Informatics.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2025
Multimodal contrastive learning with hyperbolic geometry for KG-based game recommendation.
Knowl. Inf. Syst., November, 2025
IEEE Internet Things J., June, 2025
How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing.
IEEE Internet Things J., June, 2025
Efficient privacy-preserving outsourcing of imbalanced clustering in cloud computing.
J. Inf. Secur. Appl., 2025
IEEE Internet Things J., 2025
Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data.
Future Gener. Comput. Syst., 2025
Comput. Secur., 2025
Privacy-Preserving Gait Authentication Scheme Based on Partial Euclidean Distance in Cloud Computing.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2025
Hyperboloid-Aware Cross-Community Knowledge Graph Contrastive Learning for Paper Recommendation.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
2024
DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting.
World Wide Web (WWW), July, 2024
IEEE Trans. Dependable Secur. Comput., 2024
J. Inf. Secur. Appl., 2024
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data.
Inf. Sci., 2024
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024
DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph.
Future Gener. Comput. Syst., 2024
CoRR, 2024
Comput. Secur., 2024
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024
Optimized verifiable delegated private set intersection on outsourced private datasets.
Comput. Secur., 2024
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023
MVIRA: A model based on Missing Value Imputation and Reliability Assessment for mortality risk prediction.
Int. J. Medical Informatics, October, 2023
Shortest path core-selection incentive for federated learning platform with medical applications.
Comput. Biol. Medicine, October, 2023
IEEE Syst. J., June, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023
Mixed-Curvature Manifolds Interaction Learning for Knowledge Graph-aware Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE Global Communications Conference, 2023
A Collaborative Cross-Attention Drug Recommendation Model Based on Patient and Medical Relationship Representations.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
IEEE Internet Things J., 2022
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022
Comput. Secur., 2022
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022
2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Comput. Secur., 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
J. Internet Serv. Inf. Secur., 2020
2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
2017
J. Internet Serv. Inf. Secur., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2015
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Inf. Sci., 2014
2012
J. Syst. Softw., 2012
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
Inf. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
Proceedings of the Information Security, 14th International Conference, 2011
2010
J. Networks, 2010
2009
J. Softw., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008
J. Commun., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Inf. Process. Lett., 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006