Anmin Fu(付安民)
Anmin Fu(付安民)
School of Computer Science and Engineering, Nanjing University of Science and Technology
Verified email at - Homepage
Cited by
Cited by
Privacy-preserving federated learning in fog computing
C Zhou, A Fu, S Yu, W Yang, H Wang, Y Zhang
IEEE Internet of Things Journal 7 (11), 10782-10793, 2020
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT
A Fu, X Zhang, N Xiong, Y Gao, H Wang, J Zhang
IEEE Transactions on Industrial Informatics 18 (5), 3316-3326, 2020
NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data 8 (1), 14-24, 2017
Data integrity verification of the outsourced big data in the cloud environment: A survey
L Zhou, A Fu, S Yu, M Su, B Kuang
Journal of Network and Computer Applications 122, 1-15, 2018
A privacy-preserving and verifiable federated learning scheme
X Zhang, A Fu, H Wang, C Zhou, Z Chen
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms
B Kuang, A Fu, S Yu, G Yang, M Su, Y Zhang
IEEE Internet of Things Journal 6 (5), 8372-8383, 2019
A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks
A Fu, S Lan, B Huang, Z Zhu, Y Zhang
IEEE Communications Letters 16 (11), 1744-1747, 2012
Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics
L Zhou, A Fu, G Yang, H Wang, Y Zhang
IEEE Transactions on Dependable and Secure Computing 19 (2), 1118-1132, 2020
Provable data possession with outsourced data transfer
H Wang, D He, A Fu, Q Li, Q Wang
IEEE Transactions on Services Computing 14 (6), 1929-1939, 2019
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti
Computer Communications 162, 212-224, 2020
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
B Kuang, A Fu, W Susilo, S Yu, Y Gao
Computers & Security 112, 102498, 2022
A fast handover authentication mechanism based on ticket for IEEE 802.16 m
A Fu, Y Zhang, Z Zhu, X Liu
IEEE Communications Letters 14 (12), 1134-1136, 2010
Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system
L Zhou, A Fu, Y Mu, H Wang, S Yu, Y Sun
Information Sciences 545, 254-276, 2021
SeShare: Secure cloud data sharing based on blockchain and public auditing
L Huang, G Zhang, S Yu, A Fu, J Yearwood
Concurrency and Computation: Practice and Experience 31 (22), e4359, 2019
A privacy‐preserving group authentication protocol for machine‐type communication in LTE/LTE‐A networks
A Fu, J Song, S Li, G Zhang, Y Zhang
Security and Communication Networks 9 (13), 2002-2014, 2016
An efficient handover authentication scheme with privacy preservation for IEEE 802.16 m network
A Fu, Y Zhang, Z Zhu, Q Jing, J Feng
Computers & Security 31 (6), 741-749, 2012
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems
A Fu, Y Li, S Yu, Y Yu, G Zhang
Journal of Network and Computer Applications 104, 97-106, 2018
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
A Fu, N Qin, Y Wang, Q Li, G Zhang
Wireless Networks, 1-12, 2016
Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization
A Fu, Z Chen, Y Mu, W Susilo, Y Sun, J Wu
IEEE Transactions on Services Computing 15 (1), 266-278, 2019
The system can't perform the operation now. Try again later.
Articles 1–20