Fuyou Miao

Orcid: 0000-0001-8682-6003

According to our database1, Fuyou Miao authored at least 52 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'.
IET Inf. Secur., March, 2023

Automated Inference on Financial Security of Ethereum Smart Contracts.
Proceedings of the 32nd USENIX Security Symposium, 2023

Usage of Application-driven Ternary Divide-and-conquer Architecture of Heterogeneous Internet of Things in Environmental Monitoring.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

An Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023

2022
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor.
Frontiers Comput. Sci., 2022

An Automated Analyzer for Financial Security of Ethereum Smart Contracts.
CoRR, 2022

A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City.
IEEE Trans. Veh. Technol., 2021

New Results on Self-Dual Generalized Reed-Solomon Codes.
IEEE Trans. Inf. Theory, 2021

AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021

A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021

Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021

A proactive secret sharing scheme based on Chinese remainder theorem.
Frontiers Comput. Sci., 2021

Randomized Component Based Secure Secret Reconstruction in Insecure Networks.
Proceedings of the Information Security - 24th International Conference, 2021

A Certificate Authority Domain-based Cross-domain Authentication Scheme for Virtual Enterprise Using Identity Based Encryption.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.
IEEE Syst. J., 2020

Limiting Privacy Breaches in Average-Distance Query.
Secur. Commun. Networks, 2020

Quantum multiparty cryptosystems based on a homomorphic random basis encryption.
Quantum Inf. Process., 2020

A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security.
Quantum Inf. Process., 2020

Threshold changeable secret sharing with secure secret reconstruction.
Inf. Process. Lett., 2020

A Formal Framework of Shielding Systems by Stepwise Refinement.
Int. J. Netw. Secur., 2020

Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur., 2020

Static Analysis of Superfluous Network Transmissions in Android Applications.
Int. J. Netw. Secur., 2020

SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Proceedings of the 29th USENIX Security Symposium, 2020

Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

2019
A secure and efficient on-line/off-line group key distribution protocol.
Des. Codes Cryptogr., 2019

Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem.
Discret. Appl. Math., 2019

Tightly Coupled Secret Sharing and Its Application to Group Authentication.
CoRR, 2019

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2018
Threshold quantum secret sharing based on single qubit.
Quantum Inf. Process., 2018

Verifiable threshold quantum secret sharing with sequential communication.
Quantum Inf. Process., 2018

Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem.
IACR Cryptol. ePrint Arch., 2018

A Universal Secret Sharing Scheme with General Access Structure Based on CRT.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Aspect Level Sentiment Classification with Memory Network Using Word Sentiment Vectors and a New Attention Mechanism AM-PPOSC.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Building Sentiment Lexicon with Representation Learning Based on Contrast and Label of Sentiment.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Detecting Stubborn Permission Requests in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Identifying Superfluous Network Transmissions in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

2017
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers.
IEEE J. Sel. Areas Commun., 2017

Theme-Based Spider for Academic Paper.
Proceedings of the Intelligent Computing, Networked Control, and Their Engineering Applications, 2017

Community detection in complex networks using flow simulation.
Proceedings of the VI International Conference on Network, Communication and Computing, 2017

2016
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

2015
Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2015

2014
Verifiable secret sharing based on the Chinese remainder theorem.
Secur. Commun. Networks, 2014

Multilevel threshold secret sharing based on the Chinese Remainder Theorem.
Inf. Process. Lett., 2014

Weighted Secret Sharing Based on the Chinese Remainder Theorem.
Int. J. Netw. Secur., 2014

2013
Fine-Grained Refinement on TPM-Based Protocol Applications.
IEEE Trans. Inf. Forensics Secur., 2013

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013

2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2009
Transport Layer Security (TLS) Transport Mapping for Syslog.
RFC, March, 2009

2008
Probabilistic Route Mechanism of Considering Communication Time - PROPHETCCT.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...