Xingbing Fu
Orcid: 0000-0002-0025-8883
According to our database1,
Xingbing Fu
authored at least 24 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Serv. Comput., 2024
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.
Expert Syst. Appl., 2024
2022
Soft Comput., 2022
GPLFR - Global perspective and local flow registration-for forward-looking sonar images.
Neural Comput. Appl., 2022
J. Syst. Archit., 2022
Inf. Sci., 2022
Comput. Sci. Rev., 2022
Sets of Wide-Gap Frequency-Hopping Sequence With Optimal Maximum Hamming Correlation.
IEEE Access, 2022
2021
J. Inf. Secur. Appl., 2021
The robust deep learning-based schemes for intrusion detection in Internet of Things environments.
Ann. des Télécommunications, 2021
2020
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020
Int. J. Netw. Secur., 2020
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network.
Int. J. Distributed Sens. Networks, 2020
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT.
IACR Cryptol. ePrint Arch., 2020
Model of the intrusion detection system based on the integration of spatial-temporal features.
Comput. Secur., 2020
2019
Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices.
Trans. Emerg. Telecommun. Technol., 2019
A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments.
IEEE Access, 2019
Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018
Inf., 2018
2017
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.
Int. J. Netw. Secur., 2017
2015
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
Int. J. Netw. Secur., 2015
Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes.
Int. J. Netw. Secur., 2015