Junbin Fang

According to our database1, Junbin Fang authored at least 46 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Small-Signal Stability Analysis Method for Hybrid AC-DC Systems With Multiple DC Buses.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021

2020
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation.
Quantum Inf. Process., 2020

Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020

Coarse-to-fine two-stage semantic video carving approach in digital forensics.
Comput. Secur., 2020

SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles.
BMC Bioinform., 2020

A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Efficient quantum key distribution protocol based on classical-quantum polarized channels.
Quantum Inf. Process., 2019

A Secure Decentralized Trustless E-Voting System Based on Smart Contract.
Proceedings of the 18th IEEE International Conference On Trust, 2019

SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Quantum solution for secure information transmission of wearable devices.
Int. J. Distributed Sens. Networks, 2018

A sensitive information protection scheme in wearable devices based on quantum entanglement.
Int. J. Distributed Sens. Networks, 2018

JPEG image width estimation for file carving.
IET Image Process., 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT.
Proceedings of the Network and System Security - 12th International Conference, 2018

Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Pers. Ubiquitous Comput., 2017

A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone.
Proceedings of the Mobile Security and Privacy, 2017

2016
Quantum homomorphic signature based on Bell-state measurement.
Quantum Inf. Process., 2016

Perfect quantum teleportation by four-particle cluster state.
Inf. Process. Lett., 2016

Exposing frame deletion by detecting abrupt changes in video streams.
Neurocomputing, 2016

Recovery of heavily fragmented JPEG files.
Digit. Investig., 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

A Revocable Outsourcing Attribute-Based Encryption Scheme.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Veh. Technol., 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

An inter-bank E-payment protocol based on quantum proxy blind signature.
Quantum Inf. Process., 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

An Implementation Scheme of BB84-Protocol-Based Quantum Key Distribution System.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Towards a Better Similarity Measure for Keyword Profiling via Clustering.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011


  Loading...