Fucai Luo

Orcid: 0000-0001-7961-5750

According to our database1, Fucai Luo authored at least 36 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SVFL: Efficient Secure Aggregation and Verification for Cross-Silo Federated Learning.
IEEE Trans. Mob. Comput., January, 2024

On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing".
IEEE Trans. Inf. Forensics Secur., 2024

Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2024

Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024

2023
Multi-key Fully Homomorphic Encryption without CRS from RLWE.
Comput. Stand. Interfaces, August, 2023

ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

Generic Construction of Black-Box Traceable Attribute-Based Encryption.
IEEE Trans. Cloud Comput., 2023

Revocable attribute-based encryption from standard lattices.
Comput. Stand. Interfaces, 2023

FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning.
CoRR, 2023

ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning.
CoRR, 2023

FlowEmbed: Binary function embedding model based on relational control flow graph and byte sequence.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption.
IEEE Trans. Cloud Comput., 2022

P<sup>2</sup>SIM: Privacy-Preserving and Source-Reliable Incentive Mechanism for Mobile Crowdsensing.
IEEE Internet Things J., 2022

Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities.
IACR Cryptol. ePrint Arch., 2022

Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security.
Des. Codes Cryptogr., 2022

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing.
Comput. Stand. Interfaces, 2022

Provable Data Possession Schemes from Standard Lattices for Cloud Computing.
Comput. J., 2022

Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
An Efficient Parameter-Free Learning Automaton Scheme.
IEEE Trans. Neural Networks Learn. Syst., 2021

Attribute-based proxy re-encryption from standard lattices.
Theor. Comput. Sci., 2021

Revocable attribute-based proxy re-encryption.
J. Math. Cryptol., 2021

Attribute-based proxy re-signature from standard lattices and its applications.
Comput. Stand. Interfaces, 2021

Learning Based Efficient Federated Learning for Object Detection in MEC Against Jamming.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

Delay and Deployment Cost Optimization of Edge Computing based on C-RAN in Intelligent Plant.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
SecureBP from Homomorphic Encryption.
Secur. Commun. Networks, 2020

Mixed geometric loss for bounding box regression in object detection.
J. Electronic Imaging, 2020

Joint learning of interpretation and distillation.
CoRR, 2020

RALaaS: Resource-Aware Learning-as-a-Service in Edge-Cloud Collaborative Smart Connected Communities.
Proceedings of the IEEE Global Communications Conference, 2020

2019
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme.
Inf. Sci., 2019

Fully homomorphic encryption based on the ring learning with rounding problem.
IET Inf. Secur., 2019

2018
LWR-Based Fully Homomorphic Encryption, Revisited.
Secur. Commun. Networks, 2018

Electric Company Management Information System based on Unified Message Center.
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018

Verifiable Decryption for Fully Homomorphic Encryption.
Proceedings of the Information Security - 21st International Conference, 2018

Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.
Proceedings of the Information Security Practice and Experience, 2018

2016
Role-Based Signature and Its Security Proof.
J. Inf. Sci. Eng., 2016

2015
A Provable Data Possession Scheme with Data Hierarchy in Cloud.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...