Fanyu Kong

Orcid: 0000-0003-1369-6855

According to our database1, Fanyu Kong authored at least 103 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Edge Perception Temporal Data Anomaly Detection Method Based on BiLSTM-Attention in Smart City Big Data Environment.
J. Circuits Syst. Comput., August, 2024

DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting.
World Wide Web (WWW), July, 2024

Secure Outsourcing Evaluation for Sparse Decision Trees.
IEEE Trans. Dependable Secur. Comput., 2024

Single-machine scheduling with coupled task and rejection.
Math. Found. Comput., 2024

Secure outsourced decryption for FHE-based privacy-preserving cloud computing.
J. Inf. Secur. Appl., 2024

Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data.
Inf. Sci., 2024

Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024

DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph.
Future Gener. Comput. Syst., 2024

Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System.
CoRR, 2024

PVFL: Verifiable federated learning and prediction with privacy-preserving.
Comput. Secur., 2024

Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024

Optimized verifiable delegated private set intersection on outsourced private datasets.
Comput. Secur., 2024

Unraveling the role of tissue colonized microbiome in ovarian cancer progression.
Comput. Biol. Medicine, 2024

Privacy-preserving Deep Learning for Autism Spectrum Disorder Classification.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Privacy-Preserving Group Closeness Maximization.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023

MVIRA: A model based on Missing Value Imputation and Reliability Assessment for mortality risk prediction.
Int. J. Medical Informatics, October, 2023

Shortest path core-selection incentive for federated learning platform with medical applications.
Comput. Biol. Medicine, October, 2023

Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network.
IEEE Syst. J., June, 2023

Multitasking scheduling with alternate periods.
J. Comb. Optim., April, 2023

Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time.
Asia Pac. J. Oper. Res., February, 2023

OceanBase Paetica: A Hybrid Shared-nothing/Shared-everything Database for Supporting Single Machine and Distributed Cluster.
Proc. VLDB Endow., 2023

EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records.
npj Digit. Medicine, 2023

A verifiable and privacy-preserving framework for federated recommendation system.
J. Ambient Intell. Humaniz. Comput., 2023

Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023

Mixed-Curvature Manifolds Interaction Learning for Knowledge Graph-aware Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Multi-hop Relational Graph Attention Network for Text-to-SQL Parsing.
Proceedings of the International Joint Conference on Neural Networks, 2023

Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

LCL: A Lock Chain Length-based Distributed Algorithm for Deadlock Detection and Resolution.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

SecureGAN: Secure Three-Party GAN Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

FedADP: Communication-Efficient by Model Pruning for Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

A Collaborative Cross-Attention Drug Recommendation Model Based on Patient and Medical Relationship Representations.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things.
IEEE Internet Things J., 2022

Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022

Privacy-Preserving Convolution Neural Network Inference with Edge-assistance.
Comput. Secur., 2022

Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network.
Comput. Secur., 2021

Modification and Performance Improvement of Paillier Homomorphic Cryptosystem.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Adsorption Properties of Pd3-Modified Double-Vacancy Defect Graphene toward SF6 Decomposition Products.
Sensors, 2020

Multimedia data fusion method based on wireless sensor network in intelligent transportation system.
Multim. Tools Appl., 2020

Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020

A Delay-Tolerant Data Transmission Scheme for Internet of Vehicles Based on Software Defined Cloud-Fog Networks.
IEEE Access, 2020

Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

基于时空特征挖掘的交通流量预测方法 (Traffic Flow Prediction Method Based on Spatio-Temporal Feature Mining).
计算机科学, 2019

A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment.
IEEE Access, 2019

Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

2018
Wireless Charger Placement and Power Allocation for Maximizing Charging Quality.
IEEE Trans. Mob. Comput., 2018

基于Space-P复杂网络模型的城市公交网络特性分析 (Characteristic Analysis of Urban Public Transport Networks Based on Space-P Complex Network Model).
计算机科学, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

2017
Optimizing Itinerary Selection and Charging Association for Mobile Chargers.
IEEE Trans. Mob. Comput., 2017

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

Networklet: Concept and Deployment.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Modeling and Deploying Networklet.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
DietCam: Multiview Food Recognition Using a Multikernel SVM.
IEEE J. Biomed. Health Informatics, 2016

2015
Moment invariants under similarity transformation.
Pattern Recognit., 2015

DietCam: Multi-view regular shape food recognition with a camera phone.
Pervasive Mob. Comput., 2015

P<sup>3</sup>: Joint optimization of charger placement and power allocation for wireless power transfer.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

2012
DietCam: Automatic dietary assessment with mobile camera phones.
Pervasive Mob. Comput., 2012

Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw., 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012

2011
New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
Proceedings of the Information Security, 14th International Conference, 2011

DietCam: Regular Shape Food Recognition with a Camera Phone.
Proceedings of the International Conference on Body Sensor Networks, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010

Lattice-Based Proxy Signature.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw., 2009

New left-to-right minimal weight signed-digit radix-r representation.
Comput. Electr. Eng., 2009

HealthAware: Tackling obesity with health aware smart phone systems.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

A 3D object model for wireless camera networks with network constraints.
Proceedings of the Third ACM/IEEE International Conference on Distributed Smart Cameras, 2009

Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Cryptanalysis of a Type of CRT-Based RSA Algorithms.
J. Comput. Sci. Technol., 2008

How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun., 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007

Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis of wrNAF and SPA Resistant Scalar Multiplication.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett., 2006

Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...