Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Clayton D. Scott
Zhanqiang Zhang
muljowidodo kartidjo
Duzgun, H.Sebnem
Jean Jourdan
Matias Valdenegro-Toro
Roland Zumkeller
Maximilian Dürr
Dan Graur
Justin Paul
Home
/
Author
/
ANMIN FU
Author Info
Open Visualization
Name
Affiliation
Papers
ANMIN FU
Chinese Acad Sci, State Key Lab Remote Sensing Sci, Inst Remote Sensing Applicat, Beijing 100101, Peoples R China
47
Collaborators
Citations
PageRank
88
156
19.17
Referers
Referees
References
375
744
367
Search Limit
100
744
Publications (47 rows)
Collaborators (88 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check
0
0.34
2022
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics
1
0.35
2022
Towards privacy-preserving and verifiable federated matrix factorization
0
0.34
2022
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
16
0.56
2022
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices
0
0.34
2022
ACTracker: A Fast and Efficient Attack Investigation Method Based on Event Causality
0
0.34
2021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system
1
0.37
2021
Cca-Secure And Revocable Certificateless Encryption With Ciphertext Evolution
0
0.34
2020
Revocable identity-based encryption with server-aided ciphertext evolution
0
0.34
2020
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
0
0.34
2020
Side-Channel Leakage Detection Based on Constant Parameter Channel Model
0
0.34
2020
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis
0
0.34
2020
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection
1
0.38
2020
SeShare: Secure cloud data sharing based on blockchain and public auditing
4
0.38
2019
Privacy Preserving Fog-enabled Dynamic Data Aggregation in Mobile Phone Sensing
0
0.34
2019
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices
3
0.37
2019
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
0
0.34
2019
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.
2
0.35
2018
Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks.
1
0.35
2018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
3
0.37
2018
AQ-DP - A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.
0
0.34
2018
A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
0
0.34
2018
Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.
0
0.34
2018
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
1
0.34
2018
Revocable Certificateless Encryption With Ciphertext Evolution
0
0.34
2018
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
5
0.38
2018
Short Text Understanding Based on Conceptual and Semantic Enrichment.
0
0.34
2018
Cca-Secure Revocable Identity-Based Encryption With Ciphertext Evolution In The Cloud
0
0.34
2018
Privacy-Preserving Public Auditing For Non-Manager Group
4
0.38
2017
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server
5
0.40
2017
Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data.
3
0.41
2017
Resource-centric Dynamic Access Control in Cloud
0
0.34
2016
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China
7
0.55
2015
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
10
0.57
2015
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks
3
0.43
2014
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
3
0.38
2014
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol
1
0.35
2013
Cryptanalysis of a new circular quantum secret sharing protocol for remote agents
3
0.44
2013
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol
0
0.34
2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks
5
0.42
2013
An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks
5
0.42
2012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
20
0.83
2012
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
13
0.58
2012
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks
10
0.64
2011
Security Issues And Solutions Of The Key Management Protocols In Ieee 802.16j Multi-Hop Relay Network
0
0.34
2011
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m
20
0.83
2010
Forest Cover Classification With MODIS Images in Northeastern Asia
6
0.58
2010
1