
Junbin Fang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j20]Yong Zhang
, Yongsheng Chen, Huixin Xu, Junbin Fang, Zijian Zhao, Weipeng Hu, Xiaoqin Yang, Jia Ye, Yun Cheng, Jiayin Wang, Weiqiang Sun, Jian Wang, Huanming Yang, Jing Yan, Lin Fang
:
SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles. BMC Bioinform. 21(1): 295 (2020) - [j19]Junbin Fang
, Guikai Xi, Rong Li, Qian Chen, Puxi Lin, Sijin Li, Zoe Lin Jiang
, Siu-Ming Yiu:
Coarse-to-fine two-stage semantic video carving approach in digital forensics. Comput. Secur. 97: 101942 (2020) - [j18]Zoe Lin Jiang
, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Zechao Liu, Junbin Fang
, Siu-Ming Yiu, Xuan Wang:
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518: 168-180 (2020) - [j17]Wen Lei, Zhihuang Xie, Yuzhong Li, Junbin Fang
, Weiqiang Shen:
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation. Quantum Inf. Process. 19(11): 1-12 (2020) - [c20]Aiping Li, Junbin Fang, Qianye Jiang, Bin Zhou, Yan Jia:
A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks. WISE (2) 2020: 227-239 - [i2]Junbin Fang, Dominique Unruh, Jian Weng, Jun Yan, Dehua Zhou:
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? IACR Cryptol. ePrint Arch. 2020: 621 (2020)
2010 – 2019
- 2019
- [j16]Zhengzhong Yi, Junbin Fang
, Puxi Lin, Xiao-jun Wen, Zoe Lin Jiang, Xuan Wang:
Efficient quantum key distribution protocol based on classical-quantum polarized channels. Quantum Inf. Process. 18(12): 356 (2019) - [c19]Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. DSC 2019: 480-486 - [c18]Zhentian Xiong, Zoe Lin Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang:
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique. NSS 2019: 272-287 - [c17]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - 2018
- [j15]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang:
JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018) - [j14]Xiao-jun Wen, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe Lin Jiang, Jun-bin Fang:
Quantum solution for secure information transmission of wearable devices. Int. J. Distributed Sens. Networks 14(5) (2018) - [j13]Yongzhi Chen, Xiao-jun Wen, Zhiwei Sun, Zoe Lin Jiang, Junbin Fang:
A sensitive information protection scheme in wearable devices based on quantum entanglement. Int. J. Distributed Sens. Networks 14(10) (2018) - [j12]Ye Li, Zoe Lin Jiang
, Xuan Wang
, Jun-bin Fang, En Zhang
, Xianmin Wang
:
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 2385150:1-2385150:10 (2018) - [c16]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. ICA3PP (4) 2018: 447-460 - [c15]Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang:
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. NSS 2018: 484-490 - [c14]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - 2017
- [j11]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang, Jun-bin Fang:
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities. Pervasive Mob. Comput. 39: 52-64 (2017) - [j10]Cong Zuo, Kaitai Liang
, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [c13]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - [c12]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. ISPEC 2017: 525-538 - [p1]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - 2016
- [j9]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
, Man Ho Au
, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j8]Liyang Yu, Huanran Wang, Qi Han, Xiamu Niu, Siu-Ming Yiu, Jun-bin Fang, Zhifang Wang:
Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205: 84-91 (2016) - [j7]Xiaoqing Tan, Xiaoqian Zhang, Junbin Fang:
Perfect quantum teleportation by four-particle cluster state. Inf. Process. Lett. 116(5): 347-350 (2016) - [j6]Qing-bin Luo, Guowu Yang, Kun She, Xiaoyu Li, Jun-bin Fang:
Quantum homomorphic signature based on Bell-state measurement. Quantum Inf. Process. 15(12): 5051-5061 (2016) - [c11]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. ACISP (1) 2016: 40-56 - [c10]Jiageng Chen, Jesen Teh
, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - [c9]Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. AsiaCCS 2016: 889-894 - [c8]Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang:
A Revocable Outsourcing Attribute-Based Encryption Scheme. CloudComp 2016: 145-161 - [i1]Jun-bin Fang, Zhen Che, Xiaolong Yu, Zhe Chen, Zoe Lin Jiang, Siu-Ming Yiu, Kui Ren, Xiaoqing Tan:
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes. CoRR abs/1608.07202 (2016) - 2015
- [c7]Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu:
Fragmented JPEG File Recovery Using Pseudo Headers. IFIP Int. Conf. Digital Forensics 2015: 215-231 - [c6]Xiaoyan Liu, Zoe Lin Jiang, Siu-Ming Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Jun-bin Fang:
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks. MSN 2015: 124-133 - 2014
- [j5]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang
, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j4]Man Ho Au
, Joseph K. Liu
, Jun-bin Fang, Zoe Lin Jiang, Willy Susilo, Jianying Zhou:
A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Trans. Veh. Technol. 63(1): 3-18 (2014) - 2013
- [j3]Xiao-jun Wen, Yongzhi Chen, Jun-bin Fang:
An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1): 549-558 (2013) - [j2]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, K. P. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c5]Y. Liang, K. P. Chow, Lucas Chi Kwong Hui, Jun-bin Fang, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. COMPSAC Workshops 2013: 16-20 - [c4]Shao-sheng Jiang, Rui-nan Chi, Xiao-jun Wen, Jun-bin Fang:
An Implementation Scheme of BB84-Protocol-Based Quantum Key Distribution System. EMC/HumanCom 2013: 973-978 - [c3]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, K. P. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - 2012
- [c2]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - 2011
- [j1]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [c1]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-08 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint