Follow
shaojing fu
shaojing fu
National University of defense Technology
No verified email
Title
Cited by
Cited by
Year
A lightweight privacy-preserving CNN feature extraction framework for mobile sensing
K Huang, X Liu, S Fu, D Guo, M Xu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1441-1455, 2019
1542019
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service
Y Luo, X Jia, S Fu, M Xu
IEEE Transactions on Information Forensics and Security 14 (7), 1791-1802, 2018
982018
Balanced rotation symmetric Boolean functions with maximum algebraic immunity
S Fu, L Qu, C Li, B Sun
IET information security 5 (2), 93-99, 2011
632011
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain
S Fan, S Fu, H Xu, X Cheng
Information Processing & Management 58 (4), 102587, 2021
592021
Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage
L Yuchuan, F Shaojing, X Ming, W Dongsheng
China Communications 11 (11), 114-124, 2014
432014
Construction of rotation symmetric Boolean functions with maximum algebraic immunity
S Fu, C Li, K Matsuura, L Qu
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
432009
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
Y Luo, M Xu, K Huang, D Wang, S Fu
Computers & Security 73, 492-506, 2018
422018
New permutation trinomials constructed from fractional polynomials
K Li, L Qu, C Li, S Fu
arXiv preprint arXiv:1605.06216, 2016
422016
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
K Huang, M Xian, S Fu, J Liu
IET Communications 8 (12), 2106-2113, 2014
422014
Generalized pattern matching string search on encrypted data in cloud systems
D Wang, X Jia, C Wang, K Yang, S Fu, M Xu
2015 IEEE Conference on Computer Communications (INFOCOM), 2101-2109, 2015
382015
Achieving privacy-preserving and lightweight truth discovery in mobile crowdsensing
J Tang, S Fu, X Liu, Y Luo, M Xu
IEEE Transactions on Knowledge and Data Engineering 34 (11), 5140-5153, 2021
362021
Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations
Y Yu, Y Luo, D Wang, S Fu, M Xu
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
342016
Efficient integrity auditing for shared data in the cloud with secure user revocation
Y Luo, M Xu, S Fu, D Wang, J Deng
2015 IEEE Trustcom/BigDataSE/ISPA 1, 434-442, 2015
342015
Enabling assured deletion in the cloud storage by overwriting
Y Luo, M Xu, S Fu, D Wang
Proceedings of the 4th ACM international workshop on security in cloud …, 2016
322016
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity
SJ Fu, C Li, K Matsuura, LJ Qu
Science China Information Sciences 56, 1-9, 2013
262013
On the number of rotation symmetric Boolean functions
SJ Fu, C Li, LJ Qu
Science China Information Sciences 53, 537-545, 2010
252010
Expose your mask: smart Ponzi schemes detection on blockchain
S Fan, S Fu, H Xu, C Zhu
2020 international joint conference on neural networks (IJCNN), 1-7, 2020
242020
FPDA: Fault-tolerant and privacy-enhanced data aggregation scheme in fog-assisted smart grid
L Wu, M Xu, S Fu, Y Luo, Y Wei
IEEE Internet of Things Journal 9 (7), 5254-5265, 2021
202021
A note on vectorial bent functions
D Dong, X Zhang, L Qu, S Fu
Information Processing Letters 113 (22-24), 866-870, 2013
202013
Efficient and generalized geometric range search on encrypted spatial data in the cloud
Y Luo, S Fu, D Wang, M Xu, X Jia
2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 1-10, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20