Name
Affiliation
Papers
FENGJUN LI
Pennsylvania State University, University Park, PA 16802, USA
53
Collaborators
Citations 
PageRank 
81
233
23.55
Referers 
Referees 
References 
675
1288
598
Search Limit
1001000
Title
Citations
PageRank
Year
Generative Memory-Guided Semantic Reasoning Model for Image Inpainting00.342022
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks00.342022
Exploiting Invariance of Mining Facial Landmarks00.342021
From Library Portability To Para-Rehosting: Natively Executing Microcontroller Software On Commodity Hardware20.392021
CONTRA: Defending Against Poisoning Attacks in Federated Learning20.462021
Two Souls in an Adversarial Image - Towards Universal Adversarial Example Detection using Multi-view Inconsistency.00.342021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures10.352021
WOLF - automated machine learning workflow management framework for malware detection and other applications.00.342020
Exploring the Security of Certificate Transparency in the Wild.00.342020
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields40.382020
Ticket Transparency: Accountable Single Sign-On With Privacy-Preserving Public Logs00.342019
#DontTweetThis: Scoring Private Information in Social Networks.00.342019
Content-Aware Trust Propagation Toward Online Review Spam Detection.00.342019
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method10.352019
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain40.452019
Secure Cryptography Infrastructures in the Cloud00.342019
Constructive function approximation by neural networks with optimized activation functions and fixed weights10.352019
Arcana: Enabling Private Posts On Public Microblog Platforms00.342019
Certificate Transparency in the Wild - Exploring the Reliability of Monitors.50.432019
Cloud-Assisted Privacy-Preserving Classification for IoT Applications.00.342018
Cyber-Physical Systems Security - A Survey.521.652017
Securing Smart Grid In-Network Aggregation through False Data Detection.00.342017
Understanding Rating Behavior Based On Moral Foundations: The Case Of Yelp Reviews00.342017
A Time-Synchronized Zigbee Building Network For Smart Water Management00.342017
A multi-cloud based privacy-preserving data publishing scheme for the internet of things.60.452016
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations00.342015
Trust-Aware Review Spam Detection20.372015
Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing.10.352015
mTor: A multipath Tor routing beyond bandwidth throttling40.382015
Privacy-preserving data sharing in Smart Grid systems40.392014
Sedb: Building Secure Database Services For Sensitive Data00.342014
virtio-ct: A Secure Cryptographic Token Service in Hypervisors.10.372014
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.00.342014
Detecting false data injection in smart grid in-network aggregation120.682013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing70.542013
Detecting review spam: Challenges and opportunities30.412012
Stalking online: on user privacy in social networks150.652012
Preserving data integrity for smart grid data aggregation291.152012
Privacy preserving group linkage20.382011
Secure and privacy-preserving information aggregation for smart grids431.612011
Application of generalized chebyshev neural network in air quality prediction00.342011
New threats to health data privacy.170.582011
Air quality prediction in yinchuan by using neural networks00.342010
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping10.362010
Approximation to Nonlinear Discrete-Time Systems by Recurrent Neural Networks.00.342009
Function Approximation by Neural Networks20.452008
The essential order of approximation for Suzuki's neural networks10.352008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering00.342008
Automaton segmentation: a new approach to preserve privacy in xml information brokering50.412007
The essential order of simultaneous approximation for neural networks10.352007
  • 1
  • 2