A lightweight privacy-preserving CNN feature extraction framework for mobile sensing K Huang, X Liu, S Fu, D Guo, M Xu IEEE Transactions on Dependable and Secure Computing 18 (3), 1441-1455, 2019 | 154 | 2019 |
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service Y Luo, X Jia, S Fu, M Xu IEEE Transactions on Information Forensics and Security 14 (7), 1791-1802, 2018 | 98 | 2018 |
Balanced rotation symmetric Boolean functions with maximum algebraic immunity S Fu, L Qu, C Li, B Sun IET information security 5 (2), 93-99, 2011 | 63 | 2011 |
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain S Fan, S Fu, H Xu, X Cheng Information Processing & Management 58 (4), 102587, 2021 | 59 | 2021 |
Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage L Yuchuan, F Shaojing, X Ming, W Dongsheng China Communications 11 (11), 114-124, 2014 | 43 | 2014 |
Construction of rotation symmetric Boolean functions with maximum algebraic immunity S Fu, C Li, K Matsuura, L Qu Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 43 | 2009 |
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing Y Luo, M Xu, K Huang, D Wang, S Fu Computers & Security 73, 492-506, 2018 | 42 | 2018 |
New permutation trinomials constructed from fractional polynomials K Li, L Qu, C Li, S Fu arXiv preprint arXiv:1605.06216, 2016 | 42 | 2016 |
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor K Huang, M Xian, S Fu, J Liu IET Communications 8 (12), 2106-2113, 2014 | 42 | 2014 |
Generalized pattern matching string search on encrypted data in cloud systems D Wang, X Jia, C Wang, K Yang, S Fu, M Xu 2015 IEEE Conference on Computer Communications (INFOCOM), 2101-2109, 2015 | 38 | 2015 |
Achieving privacy-preserving and lightweight truth discovery in mobile crowdsensing J Tang, S Fu, X Liu, Y Luo, M Xu IEEE Transactions on Knowledge and Data Engineering 34 (11), 5140-5153, 2021 | 36 | 2021 |
Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations Y Yu, Y Luo, D Wang, S Fu, M Xu 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 34 | 2016 |
Efficient integrity auditing for shared data in the cloud with secure user revocation Y Luo, M Xu, S Fu, D Wang, J Deng 2015 IEEE Trustcom/BigDataSE/ISPA 1, 434-442, 2015 | 34 | 2015 |
Enabling assured deletion in the cloud storage by overwriting Y Luo, M Xu, S Fu, D Wang Proceedings of the 4th ACM international workshop on security in cloud …, 2016 | 32 | 2016 |
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity SJ Fu, C Li, K Matsuura, LJ Qu Science China Information Sciences 56, 1-9, 2013 | 26 | 2013 |
On the number of rotation symmetric Boolean functions SJ Fu, C Li, LJ Qu Science China Information Sciences 53, 537-545, 2010 | 25 | 2010 |
Expose your mask: smart Ponzi schemes detection on blockchain S Fan, S Fu, H Xu, C Zhu 2020 international joint conference on neural networks (IJCNN), 1-7, 2020 | 24 | 2020 |
FPDA: Fault-tolerant and privacy-enhanced data aggregation scheme in fog-assisted smart grid L Wu, M Xu, S Fu, Y Luo, Y Wei IEEE Internet of Things Journal 9 (7), 5254-5265, 2021 | 20 | 2021 |
A note on vectorial bent functions D Dong, X Zhang, L Qu, S Fu Information Processing Letters 113 (22-24), 866-870, 2013 | 20 | 2013 |
Efficient and generalized geometric range search on encrypted spatial data in the cloud Y Luo, S Fu, D Wang, M Xu, X Jia 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 1-10, 2017 | 19 | 2017 |