Anmin Fu

Orcid: 0000-0002-1632-5737

According to our database1, Anmin Fu authored at least 126 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures.
ACM Comput. Surv., March, 2025

2024
Uncovering Access Token Security Flaws in Multiuser Scenario of Smart Home Platforms.
IEEE Internet Things J., November, 2024

Towards Interpretable Machine-Learning-Based DDoS Detection.
SN Comput. Sci., January, 2024

Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024

On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses.
IEEE Trans. Inf. Forensics Secur., 2024

NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
IEEE Trans. Inf. Forensics Secur., 2024

CareFL: Contribution Guided Byzantine-Robust Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Quantization Backdoors to Deep Learning Commercial Frameworks.
IEEE Trans. Dependable Secur. Comput., 2024

Geometric Positioning Verification of Spaceborne Photon-Counting Lidar Data Based on Terrain Feature Identification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing.
J. Syst. Archit., 2024

Towards robustness evaluation of backdoor defense on quantized deep learning models.
Expert Syst. Appl., 2024

TruVRF: Towards Triple-Granularity Verification on Machine Unlearning.
CoRR, 2024

Decaf: Data Distribution Decompose Attack against Federated Learning.
CoRR, 2024

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects.
CoRR, 2024

Sponge Attack Against Multi-Exit Networks With Data Poisoning.
IEEE Access, 2024

DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SNIPER: Detect Complex Attacks Accurately from Traffic.
Proceedings of the Information Security Practice and Experience, 2024

Vegetation Height and Underlying Terrain Inversion Using Lutan-1 Spaceborne Bistatic InSAR Data Over Forested Areas.
Proceedings of the IGARSS 2024, 2024

Altay 2024: Synergetic Spaceborne Airborne Field Snow Campaign.
Proceedings of the IGARSS 2024, 2024

Tropical Forest Height Inversion in Hainan Province of China Using the Chinese Lutan-1 Spaceborne L-Band Bistatic SAR Interferometry.
Proceedings of the IGARSS 2024, 2024

Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things.
IEEE Internet Things J., October, 2023

MLMSA: Multilabel Multiside-Channel-Information Enabled Deep Learning Attacks on APUF Variants.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., September, 2023

MCA-Based Multi-Channel Fusion Attacks Against Cryptographic Implementations.
IEEE J. Emerg. Sel. Topics Circuits Syst., June, 2023

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

A Calibration Method for Large-Footprint Full-Waveform Airborne Laser Altimeter without a Calibration Field.
Remote. Sens., 2023

MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN.
Knowl. Based Syst., 2023

Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality.
IET Inf. Secur., 2023

Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys.
IACR Cryptol. ePrint Arch., 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

PPA: Preference Profiling Attack Against Federated Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

TECIS: The First Mission Towards Forest Carbon Mapping By Combination Of Lidar And Multi-Angle Optical Observations.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization.
IEEE Trans. Serv. Comput., 2022

VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022

Design and Evaluate Recomposited OR-AND-XOR-PUF.
IEEE Trans. Emerg. Top. Comput., 2022

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022

Towards privacy-preserving and verifiable federated matrix factorization.
Knowl. Based Syst., 2022

Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest.
IEEE Internet Things J., 2022

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.
CoRR, 2022

MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants.
CoRR, 2022

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.
CoRR, 2022

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
CoRR, 2022

Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System.
CoRR, 2022

Systematically Evaluation of Challenge Obfuscated APUFs.
CoRR, 2022

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World.
CoRR, 2022

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Comput. Secur., 2022

FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Comput. Secur., 2022

WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Provable Data Possession with Outsourced Data Transfer.
IEEE Trans. Serv. Comput., 2021

Estimating the Impact of Land Cover Change on Soil Erosion Using Remote Sensing and GIS Data by USLE Model and Scenario Design.
Sci. Program., 2021

DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication.
Soft Comput., 2021

Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021

Secure and verifiable outsourced data dimension reduction on dynamic data.
Inf. Sci., 2021

Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things.
IEEE Internet Things J., 2021

NTD: Non-Transferability Enabled Backdoor Detection.
CoRR, 2021

Design and Evaluate Recomposited OR-AND-XOR-PUF.
CoRR, 2021

Quantization Backdoors to Deep Learning Models.
CoRR, 2021

ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2020
Revocable identity-based encryption with server-aided ciphertext evolution.
Theor. Comput. Sci., 2020

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT.
Inf. Sci., 2020

Privacy-Preserving Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution.
Int. J. Found. Comput. Sci., 2020

VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review.
CoRR, 2020

DO-RA: Data-oriented runtime attestation for IoT devices.
Comput. Secur., 2020

FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain.
Comput. Commun., 2020

Improving Efficiency of Key Enumeration Based on Side-Channel Analysis.
Proceedings of the 19th IEEE International Conference on Trust, 2020

High-Speed Network Attack Detection Framework Based on Optimized Feature Selection.
Proceedings of the Security and Privacy in Digital Economy, 2020

Side-Channel Leakage Detection Based on Constant Parameter Channel Model.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Privacy-Preserving and Verifiable Federated Learning Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage.
J. Circuits Syst. Comput., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

SeShare: Secure cloud data sharing based on blockchain and public auditing.
Concurr. Comput. Pract. Exp., 2019

Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.
Wirel. Pers. Commun., 2018

Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2018

Data integrity verification of the outsourced big data in the cloud environment: A survey.
J. Netw. Comput. Appl., 2018

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
J. Netw. Comput. Appl., 2018

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud.
IEEE Access, 2018

New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.
Proceedings of the IEEE Global Communications Conference, 2018

Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.
Proceedings of the IEEE Global Communications Conference, 2018

A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Short Text Understanding Based on Conceptual and Semantic Enrichment.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Revocable Certificateless Encryption with Ciphertext Evolution.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.
Wirel. Networks, 2017

Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data.
Remote. Sens., 2017

CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server.
Digit. Commun. Networks, 2017

Forest height estimation based on uav lidar simulated waveform.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-preserving public auditing for non-manager group.
Proceedings of the IEEE International Conference on Communications, 2017

Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
Secur. Commun. Networks, 2016

Resource-centric Dynamic Access Control in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China.
Remote. Sens., 2015

Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement.
Quantum Inf. Process., 2015

LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议 (Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks).
计算机科学, 2015

异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks).
计算机科学, 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
KSII Trans. Internet Inf. Syst., 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013

Cryptanalysis of a new circular quantum secret sharing protocol for remote agents.
Quantum Inf. Process., 2013

A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Commun. Lett., 2012

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012

An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Security Issues and Solutions of the Key Management Protocols in IEEE 802.16j Multi-Hop Relay Network.
IEICE Trans. Commun., 2011

EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks.
Proceedings of the Global Communications Conference, 2011

2010
Forest Cover Classification With MODIS Images in Northeastern Asia.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2010

A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m.
IEEE Commun. Lett., 2010


  Loading...