Fanyu Kong
Orcid: 0000-0003-1369-6855
According to our database1,
Fanyu Kong
authored at least 103 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Edge Perception Temporal Data Anomaly Detection Method Based on BiLSTM-Attention in Smart City Big Data Environment.
J. Circuits Syst. Comput., August, 2024
DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting.
World Wide Web (WWW), July, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Math. Found. Comput., 2024
J. Inf. Secur. Appl., 2024
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data.
Inf. Sci., 2024
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024
DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph.
Future Gener. Comput. Syst., 2024
CoRR, 2024
Comput. Secur., 2024
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024
Optimized verifiable delegated private set intersection on outsourced private datasets.
Comput. Secur., 2024
Comput. Biol. Medicine, 2024
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023
MVIRA: A model based on Missing Value Imputation and Reliability Assessment for mortality risk prediction.
Int. J. Medical Informatics, October, 2023
Shortest path core-selection incentive for federated learning platform with medical applications.
Comput. Biol. Medicine, October, 2023
IEEE Syst. J., June, 2023
Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time.
Asia Pac. J. Oper. Res., February, 2023
OceanBase Paetica: A Hybrid Shared-nothing/Shared-everything Database for Supporting Single Machine and Distributed Cluster.
Proc. VLDB Endow., 2023
EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records.
npj Digit. Medicine, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023
Mixed-Curvature Manifolds Interaction Learning for Knowledge Graph-aware Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
LCL: A Lock Chain Length-based Distributed Algorithm for Deadlock Detection and Resolution.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE Global Communications Conference, 2023
A Collaborative Cross-Attention Drug Recommendation Model Based on Patient and Medical Relationship Representations.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
IEEE Internet Things J., 2022
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022
Comput. Secur., 2022
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022
2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Comput. Secur., 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
Adsorption Properties of Pd3-Modified Double-Vacancy Defect Graphene toward SF6 Decomposition Products.
Sensors, 2020
Multimedia data fusion method based on wireless sensor network in intelligent transportation system.
Multim. Tools Appl., 2020
J. Internet Serv. Inf. Secur., 2020
A Delay-Tolerant Data Transmission Scheme for Internet of Vehicles Based on Software Defined Cloud-Fog Networks.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
基于时空特征挖掘的交通流量预测方法 (Traffic Flow Prediction Method Based on Spatio-Temporal Feature Mining).
计算机科学, 2019
A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment.
IEEE Access, 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
2018
IEEE Trans. Mob. Comput., 2018
基于Space-P复杂网络模型的城市公交网络特性分析 (Characteristic Analysis of Urban Public Transport Networks Based on Space-P Complex Network Model).
计算机科学, 2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
2017
IEEE Trans. Mob. Comput., 2017
J. Internet Serv. Inf. Secur., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
IEEE J. Biomed. Health Informatics, 2016
2015
Pervasive Mob. Comput., 2015
P<sup>3</sup>: Joint optimization of charger placement and power allocation for wireless power transfer.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Inf. Sci., 2014
2012
Pervasive Mob. Comput., 2012
J. Syst. Softw., 2012
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
Inf. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the International Conference on Body Sensor Networks, 2011
2010
J. Networks, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
J. Softw., 2009
Comput. Electr. Eng., 2009
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009
Proceedings of the Third ACM/IEEE International Conference on Distributed Smart Cameras, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008
J. Commun., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Inf. Process. Lett., 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005