# Shaojing Fu

According to our database

Collaborative distances:

^{1}, Shaojing Fu authored at least 96 papers between 2008 and 2022.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2022

FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.

World Wide Web, 2022

Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile Crowdsensing.

IEEE Trans. Knowl. Data Eng., 2022

Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix.

Theor. Comput. Sci., 2022

FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid.

IEEE Internet Things J., 2022

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

CoRR, 2022

Searchable encryption scheme for multiple cloud storage using double-layer blockchain.

Concurr. Comput. Pract. Exp., 2022

Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation.

Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Smart Contract Scams Detection with Topological Data Analysis on Account Interaction.

Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021

IEEE Trans. Veh. Technol., 2021

A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing.

IEEE Trans. Dependable Secur. Comput., 2021

A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data.

Mob. Networks Appl., 2021

Inf. Process. Manag., 2021

The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.

Discret. Appl. Math., 2021

Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.

Adv. Math. Commun., 2021

Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic.

Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020

Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks.

Secur. Commun. Networks, 2020

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Des. Codes Cryptogr., 2020

Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing.

Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic.

Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof.

Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

2019

pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service.

IEEE Trans. Inf. Forensics Secur., 2019

IEEE Access, 2019

Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

pRide: private ride request for online ride hailing service with secure hardware enclave.

Proceedings of the International Symposium on Quality of Service, 2019

Proceedings of the Database Systems for Advanced Applications, 2019

Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018

Two Constructions of Semi-Bent Functions with Perfect Three-Level Additive Autocorrelation.

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.

IACR Cryptol. ePrint Arch., 2018

Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing.

Comput. Secur., 2018

Sci. China Inf. Sci., 2018

Sci. China Inf. Sci., 2018

A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement.

Proceedings of the Security and Privacy in Communication Networks, 2018

A Co-occurrence Matrix Based Multi-keyword Ranked Search Scheme over Encrypted Cloud Data.

Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Sci. China Inf. Sci., 2017

Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

Efficient and generalized geometric range search on encrypted spatial data in the cloud.

Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud.

Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud.

Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016

Constructions of <i>p</i>-variable 1-resilient rotation symmetric functions over <i>GF(p)</i>.

Secur. Commun. Networks, 2016

New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing.

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

CoRR, 2016

New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽<sub>p</sub>.

Sci. China Inf. Sci., 2016

Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage.

Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations.

Proceedings of the 2016 IEEE International Conference on Communications, 2016

Proceedings of the 2016 IEEE International Conference on Communications, 2016

Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation.

Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014

Inf. Sci., 2014

Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor.

IET Commun., 2014

Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage.

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

IACR Cryptol. ePrint Arch., 2014

Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage.

Proceedings of the IEEE International Conference on Communications, 2014

2013

Math. Comput. Model., 2013

Inf. Process. Lett., 2013

IET Commun., 2013

Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.

Sci. China Inf. Sci., 2013

Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012

New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.

Math. Comput. Model., 2012

Math. Comput. Model., 2012

New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties.

Int. J. Found. Comput. Sci., 2012

IET Commun., 2012

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Des. Codes Cryptogr., 2012

Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011

J. Inf. Sci. Eng., 2011

IET Inf. Secur., 2011

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.

Appl. Math. Lett., 2011

2010

Inf. Process. Lett., 2010

Sci. China Inf. Sci., 2010

2009

Proceedings of the Information Security Applications, 10th International Workshop, 2009

Proceedings of the Information Security, 12th International Conference, 2009

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.

Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008

IACR Cryptol. ePrint Arch., 2008

Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Proceedings of the Cryptology and Network Security, 7th International Conference, 2008