Name
Affiliation
Papers
ANMIN FU
Chinese Acad Sci, State Key Lab Remote Sensing Sci, Inst Remote Sensing Applicat, Beijing 100101, Peoples R China
47
Collaborators
Citations 
PageRank 
88
156
19.17
Referers 
Referees 
References 
375
744
367
Search Limit
100744
Title
Citations
PageRank
Year
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check00.342022
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics10.352022
Towards privacy-preserving and verifiable federated matrix factorization00.342022
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users160.562022
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices00.342022
ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality00.342021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system10.372021
Cca-Secure And Revocable Certificateless Encryption With Ciphertext Evolution00.342020
Revocable identity-based encryption with server-aided ciphertext evolution00.342020
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.00.342020
Side-Channel Leakage Detection Based on Constant Parameter Channel Model00.342020
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis00.342020
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection10.382020
SeShare: Secure cloud data sharing based on blockchain and public auditing40.382019
Privacy Preserving Fog-enabled Dynamic Data Aggregation in Mobile Phone Sensing00.342019
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices30.372019
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage00.342019
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.20.352018
Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.10.352018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.30.372018
AQ-DP - A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.00.342018
A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing00.342018
Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.00.342018
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.10.342018
Revocable Certificateless Encryption With Ciphertext Evolution00.342018
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.50.382018
Short Text Understanding Based on Conceptual and Semantic Enrichment.00.342018
Cca-Secure Revocable Identity-Based Encryption With Ciphertext Evolution In The Cloud00.342018
Privacy-Preserving Public Auditing For Non-Manager Group40.382017
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server50.402017
Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data.30.412017
Resource-centric Dynamic Access Control in Cloud00.342016
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China70.552015
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement100.572015
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks30.432014
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.30.382014
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol10.352013
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents30.442013
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol00.342013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks50.422013
An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks50.422012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.200.832012
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network130.582012
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks100.642011
Security Issues And Solutions Of The Key Management Protocols In Ieee 802.16j Multi-Hop Relay Network00.342011
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m200.832010
Forest Cover Classification With MODIS Images in Northeastern Asia60.582010