Shaojing Fu

According to our database1, Shaojing Fu authored at least 96 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022

Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., 2022

Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix.
Theor. Comput. Sci., 2022

FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid.
IEEE Internet Things J., 2022

A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

End-to-End Multi-Tab Website Fingerprinting Attack: A Detection Perspective.
CoRR, 2022

Searchable encryption scheme for multiple cloud storage using double-layer blockchain.
Concurr. Comput. Pract. Exp., 2022

Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Smart Contract Scams Detection with Topological Data Analysis on Account Interaction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
pRide: Privacy-Preserving Online Ride Hailing Matching System With Prediction.
IEEE Trans. Veh. Technol., 2021

A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2021

A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data.
Mob. Networks Appl., 2021

Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain.
Inf. Process. Manag., 2021

The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.
Discret. Appl. Math., 2021

Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.
Adv. Math. Commun., 2021

A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Privacy-Preserving Swarm Learning Based on Homomorphic Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Reliable and Privacy-Preserving Task Matching in Blockchain-Based Crowdsourcing.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks.
Secur. Commun. Networks, 2020

A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

The phantom of differential characteristics.
Des. Codes Cryptogr., 2020

Unsupervised Analysis of Encrypted Video Traffic Based on Levenshtein Distance.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Privacy-Preserving Nonlinear SVM Classifier Training Based on Blockchain.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Expose Your Mask: Smart Ponzi Schemes Detection on Blockchain.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Smart Ponzi Scheme Detection using Federated Learning.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Practical Privacy Protection Scheme In WiFi Fingerprint-based Localization.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

2019
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service.
IEEE Trans. Inf. Forensics Secur., 2019

An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform.
IEEE Access, 2019

Building Trustful Crowdsensing Service on the Edge.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

pRide: private ride request for online ride hailing service with secure hardware enclave.
Proceedings of the International Symposium on Quality of Service, 2019

PDCS: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing.
Proceedings of the Database Systems for Advanced Applications, 2019

A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Achieve Privacy-Preserving Truth Discovery in Crowdsensing Systems.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Two Constructions of Semi-Bent Functions with Perfect Three-Level Additive Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2018

Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing.
Comput. Secur., 2018

A lower dimension lattice attack on NTRU.
Sci. China Inf. Sci., 2018

A better bound for implicit factorization problem with shared middle bits.
Sci. China Inf. Sci., 2018

A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Co-occurrence Matrix Based Multi-keyword Ranked Search Scheme over Encrypted Cloud Data.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Practical privacy-preserving compressed sensing image recovery in the cloud.
Sci. China Inf. Sci., 2017

Semi-bent functions with perfect three-level additive autocorrelation.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

Efficient and generalized geometric range search on encrypted spatial data in the cloud.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Constructions of <i>p</i>-variable 1-resilient rotation symmetric functions over <i>GF(p)</i>.
Secur. Commun. Networks, 2016

New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

New Permutation Trinomials Constructed from Fractional Polynomials.
CoRR, 2016

New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽<sub>p</sub>.
Sci. China Inf. Sci., 2016

Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Structured queries with generalized pattern matching on encrypted cloud data.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Enabling Assured Deletion in the Cloud Storage by Overwriting.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
A New Attack on RSA with Known Middle Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Generalized pattern matching string search on encrypted data in cloud systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
A recursive construction of highly nonlinear resilient vectorial functions.
Inf. Sci., 2014

Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor.
IET Commun., 2014

Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

When a Boolean Function can be Expressed as the Sum of two Bent Functions.
IACR Cryptol. ePrint Arch., 2014

Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage.
Proceedings of the IEEE International Conference on Communications, 2014

2013
New constructions of semi-bent functions in polynomial forms.
Math. Comput. Model., 2013

A note on vectorial bent functions.
Inf. Process. Lett., 2013

Linear complexity of binary sequences with interleaved structure.
IET Commun., 2013

Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013

A Privacy-Preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Math. Comput. Model., 2012

On the number of rotation symmetric functions over GF(p).
Math. Comput. Model., 2012

New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties.
Int. J. Found. Comput. Sci., 2012

New constructions of low-correlation sequences with high-linear complexity.
IET Commun., 2012

A Comment on Algebraic Immunity of the Sum of Two Boolean Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

On Algebraic Property of T-Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Construction of highly nonlinear resilient S-boxes with given degree.
Des. Codes Cryptogr., 2012

Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011

Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Inf. Secur., 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011

2010
Enumeration of balanced symmetric functions over GF(p).
Inf. Process. Lett., 2010

On the number of rotation symmetric Boolean functions.
Sci. China Inf. Sci., 2010

2009
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A New Construction of Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security, 12th International Conference, 2009

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Enumeration of Balanced Symmetric Functions over GF(p).
IACR Cryptol. ePrint Arch., 2008

Construction of Resilient Functions with Multiple Cryptographic Criteria.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Enumeration of Homogeneous Rotation Symmetric Functions over Fp.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008


  Loading...