Liming Fang
Orcid: 0000-0002-1420-2047Affiliations:
- Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing, China
According to our database1,
Liming Fang
authored at least 102 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract.
IEEE Trans. Dependable Secur. Comput., 2024
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning.
Comput. Secur., 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Comput. Stand. Interfaces, August, 2023
J. Syst. Softw., 2023
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
FedNAT: Byzantine-robust Federated Learning through Activation-based Attention Transfer.
Proceedings of the IEEE International Conference on Data Mining, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems.
IEEE Internet Things J., 2022
CoRR, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Provable and Practical Security, 2022
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
2021
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images.
IEEE Trans. Parallel Distributed Syst., 2021
A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks.
IEEE Trans. Ind. Informatics, 2021
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Symmetry, 2021
FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning.
CoRR, 2021
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Ind. Informatics, 2020
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020
J. Parallel Distributed Comput., 2020
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020
A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020
Comput. Secur., 2020
IEEE Access, 2020
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data.
Proceedings of the 19th IEEE International Conference on Trust, 2020
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
2019
Sensors, 2019
Sensors, 2019
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019
Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing.
Int. J. Embed. Syst., 2019
2018
Secur. Commun. Networks, 2018
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018
Comput. Electr. Eng., 2018
2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Inf. Forensics Secur., 2017
Comput. Stand. Interfaces, 2017
2016
Comput. J., 2016
2015
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds.
Concurr. Comput. Pract. Exp., 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
Proceedings of the International Carnahan Conference on Security Technology, 2015
2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
Public key encryption with keyword search secure against keyword guessing attacks without random oracle.
Inf. Sci., 2013
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2013
2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search.
Theor. Comput. Sci., 2012
2011
J. Syst. Softw., 2011
2010
J. Digit. Content Technol. its Appl., 2010
J. Digit. Content Technol. its Appl., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007