Junbin Fang

Orcid: 0000-0002-0730-8732

According to our database1, Junbin Fang authored at least 60 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Task-Driven ADDIE-Twist Model With a Teach-Study Double-Helix Structure.
IEEE Trans. Educ., February, 2024

Impulse Response Modeling and Dynamic Analysis for SIMO UOWC Systems Enhanced by RIS-Equipped UUVs.
IEEE Trans. Veh. Technol., 2024

2023
Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023

FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation.
CoRR, 2023

State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
CoRR, 2023

Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Secure HARQ-IR-Aided Terahertz Communications.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution.
Quantum Inf. Process., 2022

Privacy-Preserving Distributed Machine Learning Made Faster.
CoRR, 2022

MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Proceedings of the IEEE International Conference on Trust, 2022

How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Proceedings of the 33rd International Symposium on Algorithms and Computation, 2022

Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022

Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Small-Signal Stability Analysis Method for Hybrid AC-DC Systems With Multiple DC Buses.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021

2020
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation.
Quantum Inf. Process., 2020

Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020

Coarse-to-fine two-stage semantic video carving approach in digital forensics.
Comput. Secur., 2020

SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles.
BMC Bioinform., 2020

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Efficient quantum key distribution protocol based on classical-quantum polarized channels.
Quantum Inf. Process., 2019

A Secure Decentralized Trustless E-Voting System Based on Smart Contract.
Proceedings of the 18th IEEE International Conference On Trust, 2019

SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Quantum solution for secure information transmission of wearable devices.
Int. J. Distributed Sens. Networks, 2018

A sensitive information protection scheme in wearable devices based on quantum entanglement.
Int. J. Distributed Sens. Networks, 2018

JPEG image width estimation for file carving.
IET Image Process., 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT.
Proceedings of the Network and System Security - 12th International Conference, 2018

Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Pers. Ubiquitous Comput., 2017

A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone.
Proceedings of the Mobile Security and Privacy, 2017

2016
Quantum homomorphic signature based on Bell-state measurement.
Quantum Inf. Process., 2016

Perfect quantum teleportation by four-particle cluster state.
Inf. Process. Lett., 2016

Exposing frame deletion by detecting abrupt changes in video streams.
Neurocomputing, 2016

Recovery of heavily fragmented JPEG files.
Digit. Investig., 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

A Revocable Outsourcing Attribute-Based Encryption Scheme.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Veh. Technol., 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

An inter-bank E-payment protocol based on quantum proxy blind signature.
Quantum Inf. Process., 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

An Implementation Scheme of BB84-Protocol-Based Quantum Key Distribution System.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011


  Loading...