Junbin Fang
Orcid: 0000-0002-0730-8732
According to our database1,
Junbin Fang
authored at least 66 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Educ., February, 2024
Impulse Response Modeling and Dynamic Analysis for SIMO UOWC Systems Enhanced by RIS-Equipped UUVs.
IEEE Trans. Veh. Technol., 2024
IEEE Trans. Netw. Sci. Eng., 2024
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion.
IACR Cryptol. ePrint Arch., 2024
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation.
IACR Cryptol. ePrint Arch., 2024
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
Expert Syst. Appl., 2024
AI-Based Advanced Approaches and Dry Eye Disease Detection Based on Multi-Source Evidence: Cases, Applications, Issues, and Future Directions.
Big Data Min. Anal., 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation.
CoRR, 2023
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
2022
Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution.
Quantum Inf. Process., 2022
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Proceedings of the IEEE International Conference on Trust, 2022
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Proceedings of the 33rd International Symposium on Algorithms and Computation, 2022
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
2021
Small-Signal Stability Analysis Method for Hybrid AC-DC Systems With Multiple DC Buses.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021
2020
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation.
Quantum Inf. Process., 2020
Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020
Comput. Secur., 2020
SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles.
BMC Bioinform., 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Efficient quantum key distribution protocol based on classical-quantum polarized channels.
Quantum Inf. Process., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.
Proceedings of the Network and System Security - 13th International Conference, 2019
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Int. J. Distributed Sens. Networks, 2018
A sensitive information protection scheme in wearable devices based on quantum entanglement.
Int. J. Distributed Sens. Networks, 2018
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Pers. Ubiquitous Comput., 2017
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
Quantum Inf. Process., 2016
Inf. Process. Lett., 2016
Neurocomputing, 2016
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
2014
IEEE Trans. Veh. Technol., 2014
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014
2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013
Quantum Inf. Process., 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2012
Proceedings of the Advances in Digital Forensics VIII, 2012
2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011