关注
Xingbing Fu
Xingbing Fu
在 hdu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Model of the intrusion detection system based on the integration of spatial-temporal features
J Zhang, Y Ling, X Fu, X Yang, G Xiong, R Zhang
Computers & Security 89, 101681, 2020
1372020
Large universe attribute based access control with efficient decryption in cloud storage system
X Fu, X Nie, T Wu, F Li
Journal of Systems and Software 135, 157-164, 2018
572018
The robust deep learning–based schemes for intrusion detection in internet of things environments
X Fu, N Zhou, L Jiao, H Li, J Zhang
Annals of Telecommunications 76 (5), 273-285, 2021
442021
A privacy-preserving RLWE-based remote biometric authentication scheme for single and multi-server environments
H Yao, C Wang, X Fu, C Liu, B Wu, F Li
IEEE Access 7, 109597-109611, 2019
252019
Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices
Y Mao, X Fu, C Guo, G Wu
Transactions on Emerging Telecommunications Technologies 30 (11), e3531, 2019
232019
A secure and lightweight fine-grained data sharing scheme for mobile cloud computing
H Li, C Lan, X Fu, C Wang, F Li, H Guo
Sensors 20 (17), 4720, 2020
222020
Attribute Based Encryption with Efficient Revocation from Lattices.
K Yang, G Wu, C Dong, X Fu, F Li, T Wu
Int. J. Netw. Secur. 22 (1), 161-170, 2020
222020
ECC-based lightweight authentication and access control scheme for IoT E-healthcare
H Yao, Q Yan, X Fu, Z Zhang, C Lan
Soft Computing 26 (9), 4441-4461, 2022
182022
Offline/Online lattice-based ciphertext policy attribute-based encryption
X Fu, Y Wang, L You, J Ning, Z Hu, F Li
Journal of Systems Architecture 130, 102684, 2022
152022
A survey of lattice based expressive attribute based encryption
X Fu, Y Ding, H Li, J Ning, T Wu, F Li
Computer Science Review 43, 100438, 2022
132022
Ciphertext policy attribute based encryption with immediate attribute revocation for fine-grained access control in cloud storage
X Fu, Z Wu
2013 International Conference on Communications, Circuits and Systems …, 2013
132013
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage
H Li, Y Wang, X Fu, C Lan, C Wang, F Li, H Guo
Journal of Information Security and Applications 61, 102927, 2021
92021
Black box traceable ciphertext policy attribute-based encryption scheme
X Fu, X Nie, F Li
Information 6 (3), 481-493, 2015
72015
Multi-user searchable symmetric encryption with dynamic updates for cloud computing
C Guo, X Fu, Y Mao, G Wu, F Li, T Wu
Information 9 (10), 242, 2018
62018
Unidirectional proxy re-encryption for access structure transformation in attribute-based encryption schemes
XB Fu
International Journal of Network Security 17 (2), 142-149, 2015
62015
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
X Zhang, X Fu, L Hong, Y Liu, L Wang
International Journal of Distributed Sensor Networks 16 (6), 1550147720928733, 2020
52020
Cryptanalysis and improvement of a remote anonymous authentication protocol for mobile multi-server environments
H Yao, X Fu, C Wang, C Meng, B Hai, S Zhu
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019
42019
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
X Fu, S Zeng, F Li
Int. J. Netw. Secur. 17 (6), 661-671, 2015
42015
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks
X Fu, C Jiang, C Li, J Li, X Zhu, F Li
Expert Systems with Applications 249, 123675, 2024
32024
Experimental study on the influence of satellite spoofing on power timing synchronization
J Zhang, X Luo, X Fu, X Wang, C Guo, Y Bai
International Journal of Network Security 22 (6), 954-960, 2020
32020
系统目前无法执行此操作,请稍后再试。
文章 1–20