Search

Current filters:
Add Filter:

Results

Customise results display
Item hits:
Issue DateTitleAuthor(s)
2018-09-15Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud serverFu, A; Li, S; Yu, S; Zhang, Y; Sun, Y
2018-02-15DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systemsFu, A; Li, Y; Yu, S; Yu, Y; Zhang, G
2019-12-01Privacy preserving fog-enabled dynamic data aggregation in mobile phone sensingLi, X; Zhou, L; Fu, A; Yu, S; Su, M; Yang, W
2021-02-04Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record systemZhou, L; Fu, A; Mu, Y; Wang, H; Yu, S; Sun, Y
2022-01-01A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospectsKuang, B; Fu, A; Susilo, W; Yu, S; Gao, Y
2022-02-01NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group UsersFu, A; Yu, S; Zhang, Y; Wang, H; Huang, C
2022-01-01LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency CheckChen, Z; Wang, S; Fu, A; Gao, Y; Yu, S; Deng, RH
2021-01-01DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publicationChen, S; Fu, A; Yu, S; Ke, H; Su, M
2022-01-01Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT DevicesZhou, L; Fu, A; Yang, G; Gao, Y; Yu, S; Deng, RH
2023-10-01DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of ThingsDong, Q; Zheng, X; Fu, A; Su, M; Zhou, L; Yu, S
Results 1-10 of 10 (Search time: 0.012 seconds).
  • previous
  • 1
  • next