Shaojing Fu
Orcid: 0000-0002-7275-8190
According to our database1,
Shaojing Fu
authored at least 127 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning.
Frontiers Comput. Sci., October, 2024
IEEE Trans. Ind. Informatics, February, 2024
Enhancing Information Maximization With Distance-Aware Contrastive Learning for Source-Free Cross-Domain Few-Shot Learning.
IEEE Trans. Image Process., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Constructions of 2-resilient rotation symmetric Boolean functions with odd number of variables.
Theor. Comput. Sci., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices.
Digit. Commun. Networks, 2024
Comput. Secur., 2024
ExpMD: an Explainable Framework for Traffic Identification Based on Multi-Domain Features.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
Edge-feature Modeling-based Topological Graph Neural Networks for Phishing Scams Detection on Ethereum.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Randomization is all you need: A privacy-preserving federated learning framework for news recommendation.
Inf. Sci., August, 2023
p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid.
IEEE Trans. Smart Grid, May, 2023
Comput. J., May, 2023
P<sup>2</sup>Ride: Practical and Privacy-Preserving Ride-Matching Scheme for Ridesharing.
IEEE Trans. Intell. Transp. Syst., March, 2023
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Proceedings of the Provable and Practical Security, 2023
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data.
Proceedings of the Network and System Security - 17th International Conference, 2023
Achieving Privacy-preserving and Lightweight Truth Discovery in Mobile Crowdsensing (Extended abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
2022
Efficient boolean SSE: A novel encrypted database (EDB) for biometric authentication.
Int. J. Intell. Syst., December, 2022
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022
IEEE Trans. Knowl. Data Eng., 2022
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix.
Theor. Comput. Sci., 2022
FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid.
IEEE Internet Things J., 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
CoRR, 2022
Searchable encryption scheme for multiple cloud storage using double-layer blockchain.
Concurr. Comput. Pract. Exp., 2022
Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Approximate Shortest Distance Queries with Advanced Graph Analytics over Large-scale Encrypted Graphs.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Smart Contract Scams Detection with Topological Data Analysis on Account Interaction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
2021
IEEE Trans. Veh. Technol., 2021
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2021
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data.
Mob. Networks Appl., 2021
Inf. Process. Manag., 2021
The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.
Discret. Appl. Math., 2021
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.
Adv. Math. Commun., 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks.
Secur. Commun. Networks, 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020
2019
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Access, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
pRide: private ride request for online ride hailing service with secure hardware enclave.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the Database Systems for Advanced Applications, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
Two Constructions of Semi-Bent Functions with Perfect Three-Level Additive Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2018
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing.
Comput. Secur., 2018
Sci. China Inf. Sci., 2018
A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement.
Proceedings of the Security and Privacy in Communication Networks, 2018
A Co-occurrence Matrix Based Multi-keyword Ranked Search Scheme over Encrypted Cloud Data.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Sci. China Inf. Sci., 2017
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017
Efficient and generalized geometric range search on encrypted spatial data in the cloud.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
Constructions of <i>p</i>-variable 1-resilient rotation symmetric functions over <i>GF(p)</i>.
Secur. Commun. Networks, 2016
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽<sub>p</sub>.
Sci. China Inf. Sci., 2016
Proceedings of the Web-Age Information Management - 17th International Conference, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Inf. Sci., 2014
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor.
IET Commun., 2014
Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Math. Comput. Model., 2013
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Math. Comput. Model., 2012
Int. J. Found. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
2011
J. Inf. Sci. Eng., 2011
IET Inf. Secur., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011
2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008