Junsong Fu

Orcid: 0000-0002-2445-1987

According to our database1, Junsong Fu authored at least 27 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A formal security analysis of the fast authentication procedure based on the security context in 5G networks.
Soft Comput., February, 2024

Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023

Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems.
IEEE J. Biomed. Health Informatics, February, 2023

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

An Attack to One-Tap Authentication Services in Cellular Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Multiuser Personalized Ciphertext Retrieval Scheme Based on Deep Learning.
IEEE Internet Things J., 2023

3D-IDS: Doubly Disentangled Dynamic Intrusion Detection.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Defending Trace-Back Attack in 3D Wireless Internet of Things.
IEEE/ACM Trans. Netw., 2022

An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things.
Int. J. Intell. Syst., 2022

Attacks Against Security Context in 5G Network.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

A Static Method to Discover Deserialization Gadget Chains in Java Programs.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

2021
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure.
Secur. Commun. Networks, 2021

Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet.
Mob. Networks Appl., 2021

Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing.
Complex., 2021

2020
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing.
Sensors, 2020

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations.
Future Gener. Comput. Syst., 2020

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme.
IEEE Access, 2020

A Novel Web Anomaly Detection Approach Based on Semantic Structure.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

2019
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing.
IEEE Access, 2019

2018
Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing.
IEEE Trans. Ind. Informatics, 2018

Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Source-location privacy full protection in wireless sensor networks.
Inf. Sci., 2018


  Loading...