Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 233 | 2020 |
Privacy-preserving federated learning in fog computing C Zhou, A Fu, S Yu, W Yang, H Wang, Y Zhang IEEE Internet of Things Journal 7 (11), 10782-10793, 2020 | 224 | 2020 |
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT A Fu, X Zhang, N Xiong, Y Gao, H Wang, J Zhang IEEE Transactions on Industrial Informatics 18 (5), 3316-3326, 2020 | 218 | 2020 |
NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users A Fu, S Yu, Y Zhang, H Wang, C Huang IEEE Transactions on Big Data 8 (1), 14-24, 2017 | 151 | 2017 |
A privacy-preserving and verifiable federated learning scheme X Zhang, A Fu, H Wang, C Zhou, Z Chen ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 105 | 2020 |
Data integrity verification of the outsourced big data in the cloud environment: A survey L Zhou, A Fu, S Yu, M Su, B Kuang Journal of Network and Computer Applications 122, 1-15, 2018 | 99 | 2018 |
ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms B Kuang, A Fu, S Yu, G Yang, M Su, Y Zhang IEEE Internet of Things Journal 6 (5), 8372-8383, 2019 | 85 | 2019 |
Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics L Zhou, A Fu, G Yang, H Wang, Y Zhang IEEE Transactions on Dependable and Secure Computing 19 (2), 1118-1132, 2020 | 81 | 2020 |
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti Computer Communications 162, 212-224, 2020 | 73 | 2020 |
Provable data possession with outsourced data transfer H Wang, D He, A Fu, Q Li, Q Wang IEEE Transactions on Services Computing 14 (6), 1929-1939, 2019 | 73 | 2019 |
A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks A Fu, S Lan, B Huang, Z Zhu, Y Zhang IEEE Communications Letters 16 (11), 1744-1747, 2012 | 72 | 2012 |
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects B Kuang, A Fu, W Susilo, S Yu, Y Gao Computers & Security 112, 102498, 2022 | 71 | 2022 |
Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system L Zhou, A Fu, Y Mu, H Wang, S Yu, Y Sun Information Sciences 545, 254-276, 2021 | 54 | 2021 |
SeShare: Secure cloud data sharing based on blockchain and public auditing L Huang, G Zhang, S Yu, A Fu, J Yearwood Concurrency and Computation: Practice and Experience 31 (22), e4359, 2019 | 53 | 2019 |
A fast handover authentication mechanism based on ticket for IEEE 802.16 m A Fu, Y Zhang, Z Zhu, X Liu IEEE Communications Letters 14 (12), 1134-1136, 2010 | 52 | 2010 |
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems A Fu, Y Li, S Yu, Y Yu, G Zhang Journal of Network and Computer Applications 104, 97-106, 2018 | 48 | 2018 |
A privacy‐preserving group authentication protocol for machine‐type communication in LTE/LTE‐A networks A Fu, J Song, S Li, G Zhang, Y Zhang Security and Communication Networks 9 (13), 2002-2014, 2016 | 47 | 2016 |
Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization A Fu, Z Chen, Y Mu, W Susilo, Y Sun, J Wu IEEE Transactions on Services Computing 15 (1), 266-278, 2019 | 46 | 2019 |
An efficient handover authentication scheme with privacy preservation for IEEE 802.16 m network A Fu, Y Zhang, Z Zhu, Q Jing, J Feng Computers & Security 31 (6), 741-749, 2012 | 46 | 2012 |
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection S Chen, A Fu, J Shen, S Yu, H Wang, H Sun Journal of Network and Computer Applications 168, 102736, 2020 | 44 | 2020 |