Xingbing Fu

Orcid: 0000-0002-0025-8883

According to our database1, Xingbing Fu authored at least 24 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation.
IEEE Trans. Serv. Comput., 2024

A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.
Expert Syst. Appl., 2024

2022
ECC-based lightweight authentication and access control scheme for IoT E-healthcare.
Soft Comput., 2022

GPLFR - Global perspective and local flow registration-for forward-looking sonar images.
Neural Comput. Appl., 2022

Offline/Online lattice-based ciphertext policy attribute-based encryption.
J. Syst. Archit., 2022

Complementary set encryption for privacy-preserving data consolidation.
Inf. Sci., 2022

A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022

Sets of Wide-Gap Frequency-Hopping Sequence With Optimal Maximum Hamming Correlation.
IEEE Access, 2022

2021
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage.
J. Inf. Secur. Appl., 2021

The robust deep learning-based schemes for intrusion detection in Internet of Things environments.
Ann. des Télécommunications, 2021

2020
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020

Attribute Based Encryption with Efficient Revocation from Lattices.
Int. J. Netw. Secur., 2020

Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network.
Int. J. Distributed Sens. Networks, 2020

Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT.
IACR Cryptol. ePrint Arch., 2020

Model of the intrusion detection system based on the integration of spatial-temporal features.
Comput. Secur., 2020

2019
Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices.
Trans. Emerg. Telecommun. Technol., 2019

A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments.
IEEE Access, 2019

Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018

Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing.
Inf., 2018

2017
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.
Int. J. Netw. Secur., 2017

2015
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme.
Inf., 2015

Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
Int. J. Netw. Secur., 2015

Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes.
Int. J. Netw. Secur., 2015


  Loading...