Junsong Fu

Orcid: 0000-0002-6674-3873

Affiliations:
  • Beijing University of Posts and Telecommunications, School of Cyberspace Security, Beijing, China
  • Beijing Jiaotong University, School of Electronic and Information Engineering, Beijing, China (PhD 2018)


According to our database1, Junsong Fu authored at least 42 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT.
Concurr. Comput. Pract. Exp., November, 2024

Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol.
IEEE Trans. Veh. Technol., August, 2024

KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., June, 2024

A formal security analysis of the fast authentication procedure based on the security context in 5G networks.
Soft Comput., February, 2024

Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain.
Veh. Commun., 2024

Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm.
IEEE Trans. Inf. Forensics Secur., 2024

A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023

Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems.
IEEE J. Biomed. Health Informatics, February, 2023

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

An Attack to One-Tap Authentication Services in Cellular Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Multiuser Personalized Ciphertext Retrieval Scheme Based on Deep Learning.
IEEE Internet Things J., 2023

3D-IDS: Doubly Disentangled Dynamic Intrusion Detection.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Defending Trace-Back Attack in 3D Wireless Internet of Things.
IEEE/ACM Trans. Netw., 2022

An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things.
Int. J. Intell. Syst., 2022

Attacks Against Security Context in 5G Network.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

A Static Method to Discover Deserialization Gadget Chains in Java Programs.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

2021
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure.
Secur. Commun. Networks, 2021

Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet.
Mob. Networks Appl., 2021

Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing.
Complex., 2021

2020
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing.
Sensors, 2020

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations.
Future Gener. Comput. Syst., 2020

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme.
IEEE Access, 2020

A Novel Web Anomaly Detection Approach Based on Semantic Structure.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

2019
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing.
IEEE Access, 2019

2018
Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing.
IEEE Trans. Ind. Informatics, 2018

Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Source-location privacy full protection in wireless sensor networks.
Inf. Sci., 2018

2016
A Method of Data Aggregation for Wearable Sensor Systems.
Sensors, 2016

k-Nearest neighbors tracking in wireless sensor networks with coverage holes.
Pers. Ubiquitous Comput., 2016

Green alarm systems driven by emergencies in industrial wireless sensor networks.
IEEE Commun. Mag., 2016

2015
ICA: An Incremental Clustering Algorithm Based on OPTICS.
Wirel. Pers. Commun., 2015

Random and Directed Walk-Based Top- Queries in Wireless Sensor Networks.
Sensors, 2015

Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks.
Sensors, 2015

2014
An Integrated Model for Robust Multisensor Data Fusion.
Sensors, 2014

2013
A Novel Mechanism for Fire Detection in Subway Transportation Systems Based on Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

An Energy-Efficient Motion Strategy for Mobile Sensors in Mixed Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013


  Loading...