Privacy-preserving federated learning in fog computing C Zhou, A Fu, S Yu, W Yang, H Wang, Y Zhang IEEE Internet of Things Journal 7 (11), 10782-10793, 2020 | 203 | 2020 |
Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 197 | 2020 |
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT A Fu, X Zhang, N Xiong, Y Gao, H Wang, J Zhang IEEE Transactions on Industrial Informatics 18 (5), 3316-3326, 2020 | 185 | 2020 |
NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users A Fu, S Yu, Y Zhang, H Wang, C Huang IEEE Transactions on Big Data 8 (1), 14-24, 2017 | 145 | 2017 |
Data integrity verification of the outsourced big data in the cloud environment: A survey L Zhou, A Fu, S Yu, M Su, B Kuang Journal of Network and Computer Applications 122, 1-15, 2018 | 91 | 2018 |
A privacy-preserving and verifiable federated learning scheme X Zhang, A Fu, H Wang, C Zhou, Z Chen ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 83 | 2020 |
Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics L Zhou, A Fu, G Yang, H Wang, Y Zhang IEEE Transactions on Dependable and Secure Computing 19 (2), 1118-1132, 2020 | 73 | 2020 |
ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms B Kuang, A Fu, S Yu, G Yang, M Su, Y Zhang IEEE Internet of Things Journal 6 (5), 8372-8383, 2019 | 73 | 2019 |
A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks A Fu, S Lan, B Huang, Z Zhu, Y Zhang IEEE Communications Letters 16 (11), 1744-1747, 2012 | 71 | 2012 |
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti Computer Communications 162, 212-224, 2020 | 66 | 2020 |
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects B Kuang, A Fu, W Susilo, S Yu, Y Gao Computers & Security 112, 102498, 2022 | 61 | 2022 |
Provable data possession with outsourced data transfer H Wang, D He, A Fu, Q Li, Q Wang IEEE Transactions on Services Computing 14 (6), 1929-1939, 2019 | 61 | 2019 |
A fast handover authentication mechanism based on ticket for IEEE 802.16 m A Fu, Y Zhang, Z Zhu, X Liu IEEE Communications Letters 14 (12), 1134-1136, 2010 | 52 | 2010 |
Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system L Zhou, A Fu, Y Mu, H Wang, S Yu, Y Sun Information Sciences 545, 254-276, 2021 | 51 | 2021 |
SeShare: Secure cloud data sharing based on blockchain and public auditing L Huang, G Zhang, S Yu, A Fu, J Yearwood Concurrency and Computation: Practice and Experience 31 (22), e4359, 2019 | 51 | 2019 |
A privacy‐preserving group authentication protocol for machine‐type communication in LTE/LTE‐A networks A Fu, J Song, S Li, G Zhang, Y Zhang Security and Communication Networks 9 (13), 2002-2014, 2016 | 47 | 2016 |
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems A Fu, Y Li, S Yu, Y Yu, G Zhang Journal of Network and Computer Applications 104, 97-106, 2018 | 46 | 2018 |
An efficient handover authentication scheme with privacy preservation for IEEE 802.16 m network A Fu, Y Zhang, Z Zhu, Q Jing, J Feng Computers & Security 31 (6), 741-749, 2012 | 46 | 2012 |
Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization A Fu, Z Chen, Y Mu, W Susilo, Y Sun, J Wu IEEE Transactions on Services Computing 15 (1), 266-278, 2019 | 42 | 2019 |
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks A Fu, N Qin, Y Wang, Q Li, G Zhang Wireless Networks, 1-12, 2016 | 41 | 2016 |