


default search action
Fanyu Kong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Fanyu Kong 0001
— Chongqing Technology and Business University, Chongqing, China - Fanyu Kong 0002
— Shandong University, Jinan, China - Fanyu Kong 0003
— Minzu University of China, Beijing, China - Fanyu Kong 0004
— OceanBase, Ant Group, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j19]Xiangbin Yu
, Fanyu Kong, Shihao Yan
:
Performance Analysis of STAR-RIS-Aided RSMA System With Hardware Impairment. IEEE Commun. Lett. 29(7): 1554-1558 (2025)
[j18]Fanyu Kong, Jiaxin Song, Cuixia Miao
, Yuzhong Zhang:
Scheduling problems with rejection in green manufacturing industry. J. Comb. Optim. 49(4): 63 (2025)
[j17]Jiaxin Song, Cuixia Miao, Fanyu Kong:
Uniform-machine scheduling problems in green manufacturing system. Math. Found. Comput. 8(5): 689-700 (2025)
[j16]Jiaxin Song, Cuixia Miao
, Fanyu Kong:
Scheduling with step learning and job rejection. Oper. Res. 25(1): 6 (2025)
[i1]Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang:
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds. CoRR abs/2508.12832 (2025)- 2024
[j15]Meng Li, Guoyou He, Fanyu Kong, Ping Wang
, Cui Han, Qingbin Ding, Honghong Jiang, Suo Deng:
Unraveling the role of tissue colonized microbiome in ovarian cancer progression. Comput. Biol. Medicine 177: 108641 (2024)
[j14]Fanyu Kong, Cuixia Miao, Yujia Huo, Jiaxin Song:
Single-machine scheduling with coupled task and rejection. Math. Found. Comput. 7(3): 328-335 (2024)- 2023
[j13]Cuixia Miao, Fanyu Kong, Juan Zou, Ran Ma, Yujia Huo:
Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time. Asia Pac. J. Oper. Res. 40(1): 2240011:1-2240011:13 (2023)
[j12]Yujia Huo, Cuixia Miao
, Fanyu Kong, Yuzhong Zhang:
Multitasking scheduling with alternate periods. J. Comb. Optim. 45(3): 92 (2023)
[j11]Jinsung Yoon
, Michel J. Mizrahi, Nahid Farhady Ghalaty, Thomas Jarvinen, Ashwin S. Ravi, Peter Brune, Fanyu Kong, Dave Anderson, George Lee, Arie Meir, Farhana Bandukwala, Elli Kanal, Sercan Ö. Arik
, Tomas Pfister:
EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records. npj Digit. Medicine 6 (2023)
[j10]Zhifeng Yang, Quanqing Xu, Shanyan Gao, Chuanhui Yang, Guoping Wang, Yuzhong Zhao, Fanyu Kong, Hao Liu, Wanhong Wang, Jinliang Xiao:
OceanBase Paetica: A Hybrid Shared-nothing/Shared-everything Database for Supporting Single Machine and Distributed Cluster. Proc. VLDB Endow. 16(12): 3728-3740 (2023)
[c13]Zhenkun Yang, Chen Qian, Xuwang Teng, Fanyu Kong, Fusheng Han, Quanqing Xu:
LCL: A Lock Chain Length-based Distributed Algorithm for Deadlock Detection and Resolution. ICDE 2023: 151-163- 2020
[j9]Jie Li, Lei Pang, Fuwei Cai, Xieyu Yuan, Fanyu Kong:
Adsorption Properties of Pd3-Modified Double-Vacancy Defect Graphene toward SF6 Decomposition Products. Sensors 20(15): 4188 (2020)
[c12]Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. TrustCom 2020: 243-249
2010 – 2019
- 2019
[j8]Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li, Fanyu Kong:
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. J. Supercomput. 75(6): 3099-3122 (2019)
[c11]Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou:
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. ICCNS 2019: 123-127- 2018
[j7]Sheng Zhang
, Zhuzhong Qian
, Jie Wu, Fanyu Kong, Sanglu Lu:
Wireless Charger Placement and Power Allocation for Maximizing Charging Quality. IEEE Trans. Mob. Comput. 17(6): 1483-1496 (2018)- 2017
[j6]Sheng Zhang, Zhuzhong Qian, Jie Wu, Fanyu Kong, Sanglu Lu:
Optimizing Itinerary Selection and Charging Association for Mobile Chargers. IEEE Trans. Mob. Comput. 16(10): 2833-2846 (2017)
[c10]Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu:
Modeling and Deploying Networklet. GLOBECOM 2017: 1-6
[c9]Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu:
Networklet: Concept and Deployment. ICDCS 2017: 2624-2625- 2016
[j5]Hongsheng He, Fanyu Kong, Jindong Tan
:
DietCam: Multiview Food Recognition Using a Multikernel SVM. IEEE J. Biomed. Health Informatics 20(3): 848-855 (2016)- 2015
[j4]Fanyu Kong, Hongsheng He, Hollie A. Raynor
, Jindong Tan
:
DietCam: Multi-view regular shape food recognition with a camera phone. Pervasive Mob. Comput. 19: 108-121 (2015)
[c8]Sheng Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu:
P3: Joint optimization of charger placement and power allocation for wireless power transfer. INFOCOM 2015: 2344-2352- 2012
[j3]Fanyu Kong, Jindong Tan
:
DietCam: Automatic dietary assessment with mobile camera phones. Pervasive Mob. Comput. 8(1): 147-163 (2012)- 2011
[c7]Fanyu Kong, Jindong Tan
:
DietCam: Regular Shape Food Recognition with a Camera Phone. BSN 2011: 127-132- 2010
[c6]Yali Jiang, Fanyu Kong, Xiuling Ju:
Lattice-Based Proxy Signature. CIS 2010: 382-385
2000 – 2009
- 2009
[j2]Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
New left-to-right minimal weight signed-digit radix-r representation. Comput. Electr. Eng. 35(1): 150-158 (2009)
[c5]Fanyu Kong, Jindong Tan
:
A 3D object model for wireless camera networks with network constraints. ICDSC 2009: 1-8
[c4]Chunming Gao, Fanyu Kong, Jindong Tan
:
HealthAware: Tackling obesity with health aware smart phone systems. ROBIO 2009: 1549-1554- 2008
[j1]Baodong Qin, Ming Li, Fanyu Kong:
Cryptanalysis of a Type of CRT-Based RSA Algorithms. J. Comput. Sci. Technol. 23(2): 214-221 (2008)- 2007
[c3]Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. SNPD (2) 2007: 143-148
[c2]Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. SNPD (3) 2007: 279-284- 2005
[c1]Fanyu Kong, Daxing Li:
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. CANS 2005: 223-235
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-13 01:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







