Fuyou Miao
Orcid: 0000-0001-8682-6003
According to our database1,
Fuyou Miao
authored at least 54 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'.
IET Inf. Secur., March, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Residue Number System with Nonpairwise-Prime Moduli.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
The Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Usage of Application-driven Ternary Divide-and-conquer Architecture of Heterogeneous Internet of Things in Environmental Monitoring.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
An Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023
2022
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor.
Frontiers Comput. Sci., 2022
A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022
2021
Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Inf. Theory, 2021
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021
A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021
Frontiers Comput. Sci., 2021
Proceedings of the Information Security - 24th International Conference, 2021
A Certificate Authority Domain-based Cross-domain Authentication Scheme for Virtual Enterprise Using Identity Based Encryption.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021
2020
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.
IEEE Syst. J., 2020
Quantum Inf. Process., 2020
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security.
Quantum Inf. Process., 2020
Inf. Process. Lett., 2020
Int. J. Netw. Secur., 2020
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020
2019
Des. Codes Cryptogr., 2019
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem.
Discret. Appl. Math., 2019
CoRR, 2019
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
2018
Quantum Inf. Process., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Aspect Level Sentiment Classification with Memory Network Using Word Sentiment Vectors and a New Attention Mechanism AM-PPOSC.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Building Sentiment Lexicon with Representation Learning Based on Contrast and Label of Sentiment.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
2017
IEEE J. Sel. Areas Commun., 2017
Proceedings of the Intelligent Computing, Networked Control, and Their Engineering Applications, 2017
Proceedings of the VI International Conference on Network, Communication and Computing, 2017
2016
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
2014
Secur. Commun. Networks, 2014
Inf. Process. Lett., 2014
Int. J. Netw. Secur., 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013
2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012
2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008