Model of the intrusion detection system based on the integration of spatial-temporal features J Zhang, Y Ling, X Fu, X Yang, G Xiong, R Zhang Computers & Security 89, 101681, 2020 | 137 | 2020 |
Large universe attribute based access control with efficient decryption in cloud storage system X Fu, X Nie, T Wu, F Li Journal of Systems and Software 135, 157-164, 2018 | 57 | 2018 |
The robust deep learning–based schemes for intrusion detection in internet of things environments X Fu, N Zhou, L Jiao, H Li, J Zhang Annals of Telecommunications 76 (5), 273-285, 2021 | 44 | 2021 |
A privacy-preserving RLWE-based remote biometric authentication scheme for single and multi-server environments H Yao, C Wang, X Fu, C Liu, B Wu, F Li IEEE Access 7, 109597-109611, 2019 | 25 | 2019 |
Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices Y Mao, X Fu, C Guo, G Wu Transactions on Emerging Telecommunications Technologies 30 (11), e3531, 2019 | 23 | 2019 |
A secure and lightweight fine-grained data sharing scheme for mobile cloud computing H Li, C Lan, X Fu, C Wang, F Li, H Guo Sensors 20 (17), 4720, 2020 | 22 | 2020 |
Attribute Based Encryption with Efficient Revocation from Lattices. K Yang, G Wu, C Dong, X Fu, F Li, T Wu Int. J. Netw. Secur. 22 (1), 161-170, 2020 | 22 | 2020 |
ECC-based lightweight authentication and access control scheme for IoT E-healthcare H Yao, Q Yan, X Fu, Z Zhang, C Lan Soft Computing 26 (9), 4441-4461, 2022 | 18 | 2022 |
Offline/Online lattice-based ciphertext policy attribute-based encryption X Fu, Y Wang, L You, J Ning, Z Hu, F Li Journal of Systems Architecture 130, 102684, 2022 | 15 | 2022 |
A survey of lattice based expressive attribute based encryption X Fu, Y Ding, H Li, J Ning, T Wu, F Li Computer Science Review 43, 100438, 2022 | 13 | 2022 |
Ciphertext policy attribute based encryption with immediate attribute revocation for fine-grained access control in cloud storage X Fu, Z Wu 2013 International Conference on Communications, Circuits and Systems …, 2013 | 13 | 2013 |
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage H Li, Y Wang, X Fu, C Lan, C Wang, F Li, H Guo Journal of Information Security and Applications 61, 102927, 2021 | 9 | 2021 |
Black box traceable ciphertext policy attribute-based encryption scheme X Fu, X Nie, F Li Information 6 (3), 481-493, 2015 | 7 | 2015 |
Multi-user searchable symmetric encryption with dynamic updates for cloud computing C Guo, X Fu, Y Mao, G Wu, F Li, T Wu Information 9 (10), 242, 2018 | 6 | 2018 |
Unidirectional proxy re-encryption for access structure transformation in attribute-based encryption schemes XB Fu International Journal of Network Security 17 (2), 142-149, 2015 | 6 | 2015 |
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network X Zhang, X Fu, L Hong, Y Liu, L Wang International Journal of Distributed Sensor Networks 16 (6), 1550147720928733, 2020 | 5 | 2020 |
Cryptanalysis and improvement of a remote anonymous authentication protocol for mobile multi-server environments H Yao, X Fu, C Wang, C Meng, B Hai, S Zhu 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019 | 4 | 2019 |
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data. X Fu, S Zeng, F Li Int. J. Netw. Secur. 17 (6), 661-671, 2015 | 4 | 2015 |
A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks X Fu, C Jiang, C Li, J Li, X Zhu, F Li Expert Systems with Applications 249, 123675, 2024 | 3 | 2024 |
Experimental study on the influence of satellite spoofing on power timing synchronization J Zhang, X Luo, X Fu, X Wang, C Guo, Y Bai International Journal of Network Security 22 (6), 954-960, 2020 | 3 | 2020 |