Anmin Fu
Orcid: 0000-0002-1632-5737
According to our database1,
Anmin Fu
authored at least 126 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures.
ACM Comput. Surv., March, 2025
2024
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms.
IEEE Internet Things J., November, 2024
SN Comput. Sci., January, 2024
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Geometric Positioning Verification of Spaceborne Photon-Counting Lidar Data Based on Terrain Feature Identification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing.
J. Syst. Archit., 2024
Expert Syst. Appl., 2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Information Security Practice and Experience, 2024
Vegetation Height and Underlying Terrain Inversion Using Lutan-1 Spaceborne Bistatic InSAR Data Over Forested Areas.
Proceedings of the IGARSS 2024, 2024
Proceedings of the IGARSS 2024, 2024
Tropical Forest Height Inversion in Hainan Province of China Using the Chinese Lutan-1 Spaceborne L-Band Bistatic SAR Interferometry.
Proceedings of the IGARSS 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things.
IEEE Internet Things J., October, 2023
MLMSA: Multilabel Multiside-Channel-Information Enabled Deep Learning Attacks on APUF Variants.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., September, 2023
IEEE J. Emerg. Sel. Topics Circuits Syst., June, 2023
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Calibration Method for Large-Footprint Full-Waveform Airborne Laser Altimeter without a Calibration Field.
Remote. Sens., 2023
MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN.
Knowl. Based Syst., 2023
IET Inf. Secur., 2023
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys.
IACR Cryptol. ePrint Arch., 2023
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
TECIS: The First Mission Towards Forest Carbon Mapping By Combination Of Lidar And Multi-Angle Optical Observations.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization.
IEEE Trans. Serv. Comput., 2022
VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Emerg. Top. Comput., 2022
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022
Knowl. Based Syst., 2022
IEEE Internet Things J., 2022
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022
MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants.
CoRR, 2022
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022
CoRR, 2022
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Comput. Secur., 2022
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Comput. Secur., 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
Estimating the Impact of Land Cover Change on Soil Erosion Using Remote Sensing and GIS Data by USLE Model and Scenario Design.
Sci. Program., 2021
DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication.
Soft Comput., 2021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
2020
Theor. Comput. Sci., 2020
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT.
Inf. Sci., 2020
IEEE Internet Things J., 2020
Int. J. Found. Comput. Sci., 2020
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020
CoRR, 2020
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review.
CoRR, 2020
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain.
Comput. Commun., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage.
J. Circuits Syst. Comput., 2019
IEEE Internet Things J., 2019
Concurr. Comput. Pract. Exp., 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
2018
Wirel. Pers. Commun., 2018
Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2018
Data integrity verification of the outsourced big data in the cloud environment: A survey.
J. Netw. Comput. Appl., 2018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Netw. Comput. Appl., 2018
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud.
IEEE Access, 2018
New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.
Wirel. Networks, 2017
Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data.
Remote. Sens., 2017
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server.
Digit. Commun. Networks, 2017
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017
IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Secur. Commun. Networks, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China.
Remote. Sens., 2015
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement.
Quantum Inf. Process., 2015
LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议 (Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks).
计算机科学, 2015
异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks).
计算机科学, 2015
2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
KSII Trans. Internet Inf. Syst., 2014
2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013
Quantum Inf. Process., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Commun. Lett., 2012
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012
An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012
2011
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the Global Communications Conference, 2011
2010
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2010
IEEE Commun. Lett., 2010