Chunfu Jia
Orcid: 0000-0002-5588-9690
According to our database1,
Chunfu Jia
authored at least 133 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
2024
J. Cloud Comput., December, 2024
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system.
J. Cloud Comput., December, 2024
J. Inf. Process. Syst., February, 2024
Inf. Sci., January, 2024
IEEE Trans. Sustain. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2024
A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks.
Proceedings of the IEEE International Conference on Communications, 2024
Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs.
Digit. Commun. Networks, October, 2023
A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model.
Neural Process. Lett., June, 2023
DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain.
IEEE Trans. Cloud Comput., 2023
Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs.
IEEE Trans. Cloud Comput., 2023
A Secure Client-Side Deduplication Scheme Based on Updatable Server-Aided Encryption.
IEEE Trans. Cloud Comput., 2023
PeerJ Comput. Sci., 2023
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm.
PeerJ Comput. Sci., 2022
Mob. Networks Appl., 2022
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.
Proceedings of the Security and Privacy in Communication Networks, 2022
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
2021
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation.
IEEE Trans. Inf. Forensics Secur., 2021
EAI Endorsed Trans. Security Safety, 2021
Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model.
Secur. Commun. Networks, 2021
Entropy, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Inf. Sci., 2020
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain.
Comput. Secur., 2020
Appl. Soft Comput., 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel.
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Sensors, 2018
Multim. Tools Appl., 2018
J. Netw. Comput. Appl., 2018
Inf. Sci., 2018
Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud.
Int. J. Web Grid Serv., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
MMB<sup>cloud</sup>-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Cloud Comput., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
CombinedPWD: A New Password Authentication Mechanism Using Separators Between Keystrokes.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2016
Soft Comput., 2016
New order preserving encryption model for outsourced databases in cloud environments.
J. Netw. Comput. Appl., 2016
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016
Comput. Stand. Interfaces, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Computers, 2015
J. High Speed Networks, 2015
J. Comput. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014
Int. J. Data Warehous. Min., 2014
Future Gener. Comput. Syst., 2014
Concurr. Comput. Pract. Exp., 2014
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
B-Mobishare: Privacy-Preserving Location Sharing Mechanism in Mobile Online Social Networks.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Secur. Commun. Networks, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012
A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Proceedings of the Computer Security - ESORICS 2011, 2011
2009
Proceedings of the Fifth International Conference on Natural Computation, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
The Application of the Relative Entropy Density Divergence in Intrusion Detection Models.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2004
Minimizing weighted earliness and tardiness penalties about a common due date on single machine with exponential processing times.
Proceedings of the 2004 American Control Conference, 2004
2003
Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003
Single machine scheduling with exponential processing times and a general form objective function.
Proceedings of the American Control Conference, 2003
2002
Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.
Proceedings of the American Control Conference, 2002
2001
Oper. Res. Lett., 2001
1998