Fanyu Kong

Orcid: 0000-0003-1369-6855

Affiliations:
  • Shandong University, Jinan, China


According to our database1, Fanyu Kong authored at least 82 papers between 2006 and 2026.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Optimized homomorphic linear computation in privacy-preserving CNN inference.
Expert Syst. Appl., 2026

Blockchain-aided secure and fair multi-view data outsourcing computation scheme.
Comput. Stand. Interfaces, 2026

2025
HPformer: Low-Parameter Transformer With Temporal Dependency Hierarchical Propagation for Health Informatics.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2025

Multimodal contrastive learning with hyperbolic geometry for KG-based game recommendation.
Knowl. Inf. Syst., November, 2025

Privacy-Preserving Edge-Aided Eigenvalue Decomposition in Internet of Things.
IEEE Internet Things J., June, 2025

How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing.
IEEE Internet Things J., June, 2025

Efficient privacy-preserving outsourcing of imbalanced clustering in cloud computing.
J. Inf. Secur. Appl., 2025

Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis.
IEEE Internet Things J., 2025

Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data.
Future Gener. Comput. Syst., 2025

SMCD: Privacy-preserving deep learning based malicious code detection.
Comput. Secur., 2025

Privacy-Preserving Gait Authentication Scheme Based on Partial Euclidean Distance in Cloud Computing.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2025

Hyperboloid-Aware Cross-Community Knowledge Graph Contrastive Learning for Paper Recommendation.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting.
World Wide Web (WWW), July, 2024

Secure Outsourcing Evaluation for Sparse Decision Trees.
IEEE Trans. Dependable Secur. Comput., 2024

Secure outsourced decryption for FHE-based privacy-preserving cloud computing.
J. Inf. Secur. Appl., 2024

Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data.
Inf. Sci., 2024

Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024

DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph.
Future Gener. Comput. Syst., 2024

Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System.
CoRR, 2024

PVFL: Verifiable federated learning and prediction with privacy-preserving.
Comput. Secur., 2024

Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024

Optimized verifiable delegated private set intersection on outsourced private datasets.
Comput. Secur., 2024

Privacy-preserving Deep Learning for Autism Spectrum Disorder Classification.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Privacy-Preserving Group Closeness Maximization.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023

MVIRA: A model based on Missing Value Imputation and Reliability Assessment for mortality risk prediction.
Int. J. Medical Informatics, October, 2023

Shortest path core-selection incentive for federated learning platform with medical applications.
Comput. Biol. Medicine, October, 2023

Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network.
IEEE Syst. J., June, 2023

A verifiable and privacy-preserving framework for federated recommendation system.
J. Ambient Intell. Humaniz. Comput., 2023

Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023

Mixed-Curvature Manifolds Interaction Learning for Knowledge Graph-aware Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Multi-hop Relational Graph Attention Network for Text-to-SQL Parsing.
Proceedings of the International Joint Conference on Neural Networks, 2023

Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

SecureGAN: Secure Three-Party GAN Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

FedADP: Communication-Efficient by Model Pruning for Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

A Collaborative Cross-Attention Drug Recommendation Model Based on Patient and Medical Relationship Representations.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things.
IEEE Internet Things J., 2022

Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022

Privacy-Preserving Convolution Neural Network Inference with Edge-assistance.
Comput. Secur., 2022

Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network.
Comput. Secur., 2021

Modification and Performance Improvement of Paillier Homomorphic Cryptosystem.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020

2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

2017
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2015
Moment invariants under similarity transformation.
Pattern Recognit., 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

2012
Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw., 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012

2011
New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
Proceedings of the Information Security, 14th International Conference, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw., 2009

Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun., 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007

Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett., 2006

Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...