Issue Date | Title | Author(s) |
2018-09-15 | Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server | Fu, A; Li, S; Yu, S; Zhang, Y; Sun, Y |
2018-02-15 | DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems | Fu, A; Li, Y; Yu, S; Yu, Y; Zhang, G |
2019-12-01 | Privacy preserving fog-enabled dynamic data aggregation in mobile phone sensing | Li, X; Zhou, L; Fu, A; Yu, S; Su, M; Yang, W |
2021-02-04 | Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system | Zhou, L; Fu, A; Mu, Y; Wang, H; Yu, S; Sun, Y |
2022-01-01 | A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects | Kuang, B; Fu, A; Susilo, W; Yu, S; Gao, Y |
2022-02-01 | NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users | Fu, A; Yu, S; Zhang, Y; Wang, H; Huang, C |
2022-01-01 | LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check | Chen, Z; Wang, S; Fu, A; Gao, Y; Yu, S; Deng, RH |
2021-01-01 | DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication | Chen, S; Fu, A; Yu, S; Ke, H; Su, M |
2022-01-01 | Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices | Zhou, L; Fu, A; Yang, G; Gao, Y; Yu, S; Deng, RH |
2023-10-01 | DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things | Dong, Q; Zheng, X; Fu, A; Su, M; Zhou, L; Yu, S |