Issue Date | Title | Author(s) |
2022-01-01 | A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects | Kuang, B; Fu, A; Susilo, W; Yu, S; Gao, Y |
2018-01-01 | AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data | Ke, H; Fu, A; Yu, S; Chen, S |
2018-01-01 | Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute | Huang, L; Zhang, G; Yu, S; Fu, A; Yearwood, J |
2018-11-15 | Data integrity verification of the outsourced big data in the cloud environment: A survey | Zhou, L; Fu, A; Yu, S; Su, M; Kuang, B |
2018-02-15 | DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems | Fu, A; Li, Y; Yu, S; Yu, Y; Zhang, G |
2021-01-01 | DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication | Chen, S; Fu, A; Yu, S; Ke, H; Su, M |
2019 | EAPA: Efficient Attestation Resilient to Physical Attacks for
IoT Devices | Yan, W; Fu, A; Mu, Y; Zhe, X; Yu, S; Kuang, B |
2022-01-01 | Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices | Zhou, L; Fu, A; Yang, G; Gao, Y; Yu, S; Deng, RH |
2022-01-01 | LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check | Chen, Z; Wang, S; Fu, A; Gao, Y; Yu, S; Deng, RH |
2021-02-04 | Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system | Zhou, L; Fu, A; Mu, Y; Wang, H; Yu, S; Sun, Y |
2018-07-27 | New algorithm for secure outsourcing of modular exponentiation with optimal checkability based on single untrusted server | Zhu, Y; Fu, A; Yu, S; Yu, Y; Li, S; Chen, Z |
2022-02-01 | NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users | Fu, A; Yu, S; Zhang, Y; Wang, H; Huang, C |
2019-12-01 | Privacy preserving fog-enabled dynamic data aggregation in mobile phone sensing | Li, X; Zhou, L; Fu, A; Yu, S; Su, M; Yang, W |
2018-09-15 | Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server | Fu, A; Li, S; Yu, S; Zhang, Y; Sun, Y |
2020-11-01 | Privacy-Preserving Federated Learning in Fog Computing | Zhou, C; Fu, A; Yu, S; Yang, W; Wang, H; Zhang, Y |
2020-10-15 | RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection | Chen, S; Fu, A; Shen, J; Yu, S; Wang, H; Sun, H |