Segui
Anmin Fu(付安民)
Anmin Fu(付安民)
School of Computer Science and Engineering, Nanjing University of Science and Technology
Email verificata su njust.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
2332020
Privacy-preserving federated learning in fog computing
C Zhou, A Fu, S Yu, W Yang, H Wang, Y Zhang
IEEE Internet of Things Journal 7 (11), 10782-10793, 2020
2242020
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT
A Fu, X Zhang, N Xiong, Y Gao, H Wang, J Zhang
IEEE Transactions on Industrial Informatics 18 (5), 3316-3326, 2020
2182020
NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data 8 (1), 14-24, 2017
1512017
A privacy-preserving and verifiable federated learning scheme
X Zhang, A Fu, H Wang, C Zhou, Z Chen
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
1052020
Data integrity verification of the outsourced big data in the cloud environment: A survey
L Zhou, A Fu, S Yu, M Su, B Kuang
Journal of Network and Computer Applications 122, 1-15, 2018
992018
ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms
B Kuang, A Fu, S Yu, G Yang, M Su, Y Zhang
IEEE Internet of Things Journal 6 (5), 8372-8383, 2019
852019
Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics
L Zhou, A Fu, G Yang, H Wang, Y Zhang
IEEE Transactions on Dependable and Secure Computing 19 (2), 1118-1132, 2020
812020
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti
Computer Communications 162, 212-224, 2020
732020
Provable data possession with outsourced data transfer
H Wang, D He, A Fu, Q Li, Q Wang
IEEE Transactions on Services Computing 14 (6), 1929-1939, 2019
732019
A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks
A Fu, S Lan, B Huang, Z Zhu, Y Zhang
IEEE Communications Letters 16 (11), 1744-1747, 2012
722012
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
B Kuang, A Fu, W Susilo, S Yu, Y Gao
Computers & Security 112, 102498, 2022
712022
Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system
L Zhou, A Fu, Y Mu, H Wang, S Yu, Y Sun
Information Sciences 545, 254-276, 2021
542021
SeShare: Secure cloud data sharing based on blockchain and public auditing
L Huang, G Zhang, S Yu, A Fu, J Yearwood
Concurrency and Computation: Practice and Experience 31 (22), e4359, 2019
532019
A fast handover authentication mechanism based on ticket for IEEE 802.16 m
A Fu, Y Zhang, Z Zhu, X Liu
IEEE Communications Letters 14 (12), 1134-1136, 2010
522010
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems
A Fu, Y Li, S Yu, Y Yu, G Zhang
Journal of Network and Computer Applications 104, 97-106, 2018
482018
A privacy‐preserving group authentication protocol for machine‐type communication in LTE/LTE‐A networks
A Fu, J Song, S Li, G Zhang, Y Zhang
Security and Communication Networks 9 (13), 2002-2014, 2016
472016
Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization
A Fu, Z Chen, Y Mu, W Susilo, Y Sun, J Wu
IEEE Transactions on Services Computing 15 (1), 266-278, 2019
462019
An efficient handover authentication scheme with privacy preservation for IEEE 802.16 m network
A Fu, Y Zhang, Z Zhu, Q Jing, J Feng
Computers & Security 31 (6), 741-749, 2012
462012
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection
S Chen, A Fu, J Shen, S Yu, H Wang, H Sun
Journal of Network and Computer Applications 168, 102736, 2020
442020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20