default search action
Shaojing Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Haoran Xu, Yongjun Wang, Zhiyuan Jiang, Shuhui Fan, Shaojing Fu, Peidai Xie:
Fuzzing JavaScript engines with a syntax-aware neural program model. Comput. Secur. 144: 103947 (2024) - [j64]Nan Jia, Shaojing Fu, Guangquan Xu, Kai Huang, Ming Xu:
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices. Digit. Commun. Networks 10(4): 895-903 (2024) - [j63]Xinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo:
BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning. Frontiers Comput. Sci. 18(5): 185810 (2024) - [j62]Jiao Du, Ziwei Zhao, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-Correlation Immune Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1241-1246 (2024) - [j61]Jiao Du, Lin Li, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions with odd number of variables. Theor. Comput. Sci. 991: 114429 (2024) - [j60]Liqiang Wu, Shaojing Fu, Yuchuan Luo, Hongyang Yan, Heyuan Shi, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(1): 270-283 (2024) - [j59]Liqiang Wu, Shaojing Fu, Yuchuan Luo, Ming Xu:
SecTCN: Privacy-Preserving Short-Term Residential Electrical Load Forecasting. IEEE Trans. Ind. Informatics 20(2): 2508-2518 (2024) - [j58]Huali Xu, Li Liu, Shuaifeng Zhi, Shaojing Fu, Zhuo Su, Ming-Ming Cheng, Yongxiang Liu:
Enhancing Information Maximization With Distance-Aware Contrastive Learning for Source-Free Cross-Domain Few-Shot Learning. IEEE Trans. Image Process. 33: 2058-2073 (2024) - [c55]Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:
Feistel-Like Structures Revisited: Classification and Cryptanalysis. CRYPTO (4) 2024: 275-304 - [c54]Yu Chen, Lin Liu, Rongmao Chen, Shaojing Fu, Yuexiang Yang, Jiangyong Shi, Liangzhong He:
Speedy Privacy-Preserving Skyline Queries on Outsourced Data. ESORICS (2) 2024: 430-450 - [c53]Shuhui Fan, Haoran Xu, Shaojing Fu, Yuchuan Luo, Ming Xu:
Edge-feature Modeling-based Topological Graph Neural Networks for Phishing Scams Detection on Ethereum. IWQoS 2024: 1-10 - [c52]Luming Yang, Yongjun Wang, Lin Liu, Junjie Huang, Shaojing Fu:
ExpMD: an Explainable Framework for Traffic Identification Based on Multi-Domain Features. IWQoS 2024: 1-10 - [i7]Huali Xu, Li Liu, Shuaifeng Zhi, Shaojing Fu, Zhuo Su, Ming-Ming Cheng, Yongxiang Liu:
Enhancing Information Maximization with Distance-Aware Contrastive Learning for Source-Free Cross-Domain Few-Shot Learning. CoRR abs/2403.01966 (2024) - 2023
- [j57]Luming Yang, Shaojing Fu, Yongjun Wang, Kaitai Liang, Fan Mo, Bo Liu:
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic. Comput. J. 66(5): 1213-1227 (2023) - [j56]Xinyi Huang, Yuchuan Luo, Lin Liu, Wentao Zhao, Shaojing Fu:
Randomization is all you need: A privacy-preserving federated learning framework for news recommendation. Inf. Sci. 637: 118943 (2023) - [j55]Shaojing Fu, XueLun Huang, Lin Liu, Yuchuan Luo:
BFCRI: A Blockchain-Based Framework for Crowdsourcing With Reputation and Incentive. IEEE Trans. Cloud Comput. 11(2): 2158-2174 (2023) - [j54]Lin Liu, Jinshu Su, Ximeng Liu, Rongmao Chen, Xinyi Huang, Guang Kou, Shaojing Fu:
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. IEEE Trans. Cloud Comput. 11(3): 3211-3225 (2023) - [j53]Yuchuan Luo, Shaojing Fu, Xiaohua Jia, Ming Xu, Yingwen Chen:
P2Ride: Practical and Privacy-Preserving Ride-Matching Scheme for Ridesharing. IEEE Trans. Intell. Transp. Syst. 24(3): 3584-3593 (2023) - [j52]Liqiang Wu, Heyuan Shi, Shaojing Fu, Yuchuan Luo, Ming Xu:
p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid. IEEE Trans. Smart Grid 14(3): 2301-2312 (2023) - [c51]Jianchao Tang, Shaojing Fu, Ximeng Liu, Yuchuan Luo, Ming Xu:
Achieving Privacy-preserving and Lightweight Truth Discovery in Mobile Crowdsensing (Extended abstract). ICDE 2023: 3797-3798 - [c50]Songwei Luo, Shaojing Fu, Yuchuan Luo, Lin Liu, Yanxiang Deng, Shixiong Wang:
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data. NSS 2023: 195-216 - [c49]Yanxiang Deng, Lin Liu, Shaojing Fu, Yuchuan Luo, Wei Wu, Shixiong Wang:
Privacy Preserving Outsourced K-means Clustering Using Kd-tree. ProvSec 2023: 345-364 - [c48]Luming Yang, Yongjun Wang, Shaojing Fu, Lin Liu, Yuchuan Luo:
EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis. SECON 2023: 537-545 - [c47]Xinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo, Luming Yang:
EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPC. TrustCom 2023: 28-37 - [c46]Yuting Yang, Lin Liu, Shaojing Fu, Jun-Jie Huang, Yuchuan Luo:
SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis. TrustCom 2023: 1119-1126 - 2022
- [j51]Shaojing Fu, Chao Zhang, Weijun Ao:
Searchable encryption scheme for multiple cloud storage using double-layer blockchain. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j50]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Tianyin Wang, Shanqi Pang:
A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 93-99 (2022) - [j49]Xueling Zhu, Shaojing Fu, Huaping Hu, Qing Wu, Bo Liu:
Efficient boolean SSE: A novel encrypted database (EDB) for biometric authentication. Int. J. Intell. Syst. 37(12): 10317-10335 (2022) - [j48]Liqiang Wu, Ming Xu, Shaojing Fu, Yuchuan Luo, Yuechuan Wei:
FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid. IEEE Internet Things J. 9(7): 5254-5265 (2022) - [j47]Jiao Du, Ziyu Chen, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix. Theor. Comput. Sci. 919: 80-91 (2022) - [j46]Jianchao Tang, Shaojing Fu, Ximeng Liu, Yuchuan Luo, Ming Xu:
Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile Crowdsensing. IEEE Trans. Knowl. Data Eng. 34(11): 5140-5153 (2022) - [j45]Luming Yang, Shaojing Fu, Xuyun Zhang, Shize Guo, Yongjun Wang, Chi Yang:
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection. World Wide Web 25(5): 2139-2161 (2022) - [c45]Shuhui Fan, Shaojing Fu, Yuchuan Luo, Haoran Xu, Xuyun Zhang, Ming Xu:
Smart Contract Scams Detection with Topological Data Analysis on Account Interaction. CIKM 2022: 468-477 - [c44]Yinqiu Wang, Yuchuan Luo, Lin Liu, Shaojing Fu:
pCOVID: A Privacy-Preserving COVID-19 Inference Framework. ICA3PP 2022: 21-42 - [c43]Jingnan Huang, Yuchuan Luo, Ming Xu, Shaojing Fu, Kai Huang:
Accelerating Privacy-Preserving Image Retrieval with Multi-Index Hashing. SEC 2022: 492-497 - [c42]Yuchuan Luo, Dongsheng Wang, Shaojing Fu, Ming Xu, Yingwen Chen, Kai Huang:
Approximate Shortest Distance Queries with Advanced Graph Analytics over Large-scale Encrypted Graphs. MSN 2022: 287-294 - [c41]Xu Yang, Yuchuan Luo, Ming Xu, Shaojing Fu, Yingwen Chen:
Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation. WASA (1) 2022: 401-412 - [i6]Mantun Chen, Yongxin Chen, Yongjun Wang, Peidai Xie, Shaojing Fu, Xiatian Zhu:
End-to-End Multi-Tab Website Fingerprinting Attack: A Detection Perspective. CoRR abs/2203.06376 (2022) - 2021
- [j44]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen:
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem. Adv. Math. Commun. 15(3): 441-469 (2021) - [j43]Xi Chen, Longjiang Qu, Shaojing Fu, Chao Li:
The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions. Discret. Appl. Math. 289: 477-491 (2021) - [j42]Shuhui Fan, Shaojing Fu, Haoran Xu, Xiaochun Cheng:
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain. Inf. Process. Manag. 58(4): 102587 (2021) - [j41]Shaojing Fu, Qi Zhang, Nan Jia, Ming Xu:
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data. Mob. Networks Appl. 26(4): 1574-1585 (2021) - [j40]Kai Huang, Ximeng Liu, Shaojing Fu, Deke Guo, Ming Xu:
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing. IEEE Trans. Dependable Secur. Comput. 18(3): 1441-1455 (2021) - [j39]Junxin Huang, Yuchuan Luo, Shaojing Fu, Ming Xu, Bowen Hu:
pRide: Privacy-Preserving Online Ride Hailing Matching System With Prediction. IEEE Trans. Veh. Technol. 70(8): 7413-7425 (2021) - [c40]Baolai Wang, Shaojing Fu, Xuyun Zhang, Tao Xie, Lingjuan Lyu, Yuchuan Luo:
Reliable and Privacy-Preserving Task Matching in Blockchain-Based Crowdsourcing. CIKM 2021: 1879-1888 - [c39]Lijie Chen, Shaojing Fu, Lin Liu, Yuchuan Luo, Wentao Zhao:
Privacy-Preserving Swarm Learning Based on Homomorphic Encryption. ICA3PP (3) 2021: 509-523 - [c38]Luming Yang, Shaojing Fu, Yongjun Wang, Chao Li, Shanghuai Feng, Yuchuan Luo, Lin Liu:
Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic. ISPA/BDCloud/SocialCom/SustainCom 2021: 1126-1134 - [c37]Luming Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao:
A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance. MSN 2021: 1-8 - 2020
- [j38]Yunwen Liu, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. Des. Codes Cryptogr. 88(11): 2289-2311 (2020) - [j37]Shaojing Fu, Yunpeng Yu, Ming Xu:
A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 221-224 (2020) - [j36]Nan Jia, Shaojing Fu, Ming Xu:
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks. Secur. Commun. Networks 2020: 8872853:1-8872853:10 (2020) - [c36]Wenxiang Wu, Shaojing Fu, Yuchuan Luo:
Practical Privacy Protection Scheme In WiFi Fingerprint-based Localization. DSAA 2020: 699-708 - [c35]Xueling Zhu, Huaping Hu, Shaojing Fu, Qing Wu, Bo Liu:
Efficient Boolean SSE: A Novel Encrypted Database (EDB). FCS 2020: 373-387 - [c34]Shuhui Fan, Haoran Xu, Shaojing Fu, Ming Xu:
Smart Ponzi Scheme Detection using Federated Learning. HPCC/DSS/SmartCity 2020: 881-888 - [c33]Zhen Lin, Yuchuan Luo, Shaojing Fu, Tao Xie:
BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof. ICA3PP (3) 2020: 520-536 - [c32]Jingsheng Gao, Shaojing Fu, Yuchuan Luo, Tao Xie:
Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing. ICCCN 2020: 1-9 - [c31]Shuhui Fan, Shaojing Fu, Haoran Xu, Chengzhang Zhu:
Expose Your Mask: Smart Ponzi Schemes Detection on Blockchain. IJCNN 2020: 1-7 - [c30]Luming Yang, Shaojing Fu, Yuchuan Luo, Jiangyong Shi:
Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic. MSN 2020: 283-290 - [c29]Wenjing Zhang, Yuchuan Luo, Shaojing Fu, Tao Xie:
Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing. SECON 2020: 1-9 - [c28]Luming Yang, Yingming Zeng, Shaojing Fu, Yuchuan Luo:
Unsupervised Analysis of Encrypted Video Traffic Based on Levenshtein Distance. SocialSec 2020: 97-108 - [c27]Nan Jia, Shaojing Fu, Ming Xu:
Privacy-Preserving Nonlinear SVM Classifier Training Based on Blockchain. SocialSec 2020: 278-288
2010 – 2019
- 2019
- [j35]Jianchao Tang, Shaojing Fu, Ming Xu:
An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform. IEEE Access 7: 66242-66250 (2019) - [j34]Yuchuan Luo, Xiaohua Jia, Shaojing Fu, Ming Xu:
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service. IEEE Trans. Inf. Forensics Secur. 14(7): 1791-1802 (2019) - [c26]Jianchao Tang, Shaojing Fu, Ming Xu, Yuchuan Luo, Kai Huang:
Achieve Privacy-Preserving Truth Discovery in Crowdsensing Systems. CIKM 2019: 1301-1310 - [c25]Chao Zhang, Shaojing Fu, Weijun Ao:
A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage. CSS (1) 2019: 585-600 - [c24]Xiaochen Yang, Ming Xu, Shaojing Fu, Yuchuan Luo:
PDCS: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing. DASFAA (1) 2019: 227-243 - [c23]Yuchuan Luo, Xiaohua Jia, Huayi Duan, Cong Wang, Ming Xu, Shaojing Fu:
pRide: private ride request for online ride hailing service with secure hardware enclave. IWQoS 2019: 27:1-27:10 - [c22]Biao Yu, Yingwen Chen, Shaojing Fu, Wanrong Yu, Xiaoli Guo:
Building Trustful Crowdsensing Service on the Edge. WASA 2019: 445-457 - 2018
- [j33]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A better bound for implicit factorization problem with shared middle bits. Sci. China Inf. Sci. 61(3): 032109:1-032109:10 (2018) - [j32]Zhichao Yang, Shaojing Fu, Longjiang Qu, Chao Li:
A lower dimension lattice attack on NTRU. Sci. China Inf. Sci. 61(5): 059101:1-059101:3 (2018) - [j31]Yuchuan Luo, Ming Xu, Kai Huang, Dongsheng Wang, Shaojing Fu:
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73: 492-506 (2018) - [j30]Deng Tang, Shaojing Fu, Yang Yang:
Two Constructions of Semi-Bent Functions with Perfect Three-Level Additive Autocorrelation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2402-2404 (2018) - [c21]Nan Jia, Shaojing Fu, Dongsheng Wang, Ming Xu:
A Co-occurrence Matrix Based Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. ICCCS (1) 2018: 36-49 - [c20]Qi Zhang, Shaojing Fu, Nan Jia, Ming Xu:
A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement. SecureComm (1) 2018: 588-604 - [i5]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2018: 568 (2018) - 2017
- [j29]Kai Huang, Ming Xu, Shaojing Fu, Dongsheng Wang:
Practical privacy-preserving compressed sensing image recovery in the cloud. Sci. China Inf. Sci. 60(9): 098103:1-098103:3 (2017) - [j28]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(10): 2113-2122 (2017) - [c19]Shaojing Fu, Yunpeng Yu, Ming Xu:
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud. SCC@AsiaCCS 2017: 27-33 - [c18]Shaojing Fu, Yunpeng Yu, Ming Xu:
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud. ICCCS (2) 2017: 3-15 - [c17]Yuchuan Luo, Shaojing Fu, Dongsheng Wang, Ming Xu, Xiaohua Jia:
Efficient and generalized geometric range search on encrypted spatial data in the cloud. IWQoS 2017: 1-10 - [c16]Deng Tang, Yang Yang, Shaojing Fu:
Semi-bent functions with perfect three-level additive autocorrelation. IWSDA 2017: 164-168 - 2016
- [j27]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Shanqi Pang:
New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽p. Sci. China Inf. Sci. 59(7): 079102:1-079102:3 (2016) - [j26]Shaojing Fu, Jiao Du, Longjiang Qu, Chao Li:
Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(4): 853-855 (2016) - [j25]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1584-1590 (2016) - [j24]Kai Huang, Ming Xu, Shaojing Fu, Yuchuan Luo:
An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(10): 1891-1894 (2016) - [j23]Jiao Du, Chao Li, Shaojing Fu, Shanqi Pang:
Constructions of p-variable 1-resilient rotation symmetric functions over GF(p). Secur. Commun. Networks 9(18): 5651-5658 (2016) - [c15]Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang:
Enabling Assured Deletion in the Cloud Storage by Overwriting. SCC@AsiaCCS 2016: 17-23 - [c14]Nan Jia, Xiaohua Jia, Dongsheng Wang, Shaojing Fu, Ming Xu:
Structured queries with generalized pattern matching on encrypted cloud data. ICC 2016: 1-7 - [c13]Yunpeng Yu, Yuchuan Luo, Dongsheng Wang, Shaojing Fu, Ming Xu:
Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. ICC 2016: 1-6 - [c12]Yuchuan Luo, Shaojing Fu, Kai Huang, Dongsheng Wang, Ming Xu:
Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage. Trustcom/BigDataSE/ISPA 2016: 623-629 - [c11]Kai Huang, Ming Xu, Shaojing Fu, Dongsheng Wang:
Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud. WAIM (2) 2016: 28-39 - [i4]Kangquan Li, Longjiang Qu, Chao Li, Shaojing Fu:
New Permutation Trinomials Constructed from Fractional Polynomials. CoRR abs/1605.06216 (2016) - 2015
- [j22]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A New Attack on RSA with Known Middle Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2677-2685 (2015) - [c10]Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu:
Generalized pattern matching string search on encrypted data in cloud systems. INFOCOM 2015: 2101-2109 - [c9]Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, Junquan Deng:
Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation. TrustCom/BigDataSE/ISPA (1) 2015: 434-442 - 2014
- [j21]Shaojing Fu, Dongsheng Wang, Ming Xu, Jiangchun Ren:
Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 418-420 (2014) - [j20]Kun Huang, Ming Xian, Shaojing Fu, Jian Liu:
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor. IET Commun. 8(12): 2106-2113 (2014) - [j19]Shaojing Fu, Chao Li, Longjiang Qu:
A recursive construction of highly nonlinear resilient vectorial functions. Inf. Sci. 269: 388-396 (2014) - [c8]Kun Huang, Jian Liu, Ming Xian, Huimei Wang, Shaojing Fu:
Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage. ICC Workshops 2014: 712-717 - [i3]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
When a Boolean Function can be Expressed as the Sum of two Bent Functions. IACR Cryptol. ePrint Arch. 2014: 48 (2014) - 2013
- [j18]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 56(3): 1-9 (2013) - [j17]Shaojing Fu, Chao Li, Longjiang Qu:
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 360-362 (2013) - [j16]Hai Xiong, Longjiang Qu, Chao Li, Shaojing Fu:
Linear complexity of binary sequences with interleaved structure. IET Commun. 7(15): 1688-1696 (2013) - [j15]Deshuai Dong, Xue Zhang, Longjiang Qu, Shaojing Fu:
A note on vectorial bent functions. Inf. Process. Lett. 113(22-24): 866-870 (2013) - [j14]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New constructions of semi-bent functions in polynomial forms. Math. Comput. Model. 57(5-6): 1139-1147 (2013) - [c7]Dongsheng Wang, Shaojing Fu, Ming Xu:
A Privacy-Preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data. CloudCom (1) 2013: 663-670 - 2012
- [j13]Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu:
Construction of highly nonlinear resilient S-boxes with given degree. Des. Codes Cryptogr. 64(3): 241-253 (2012) - [j12]Ruilin Li, Bing Sun, Chao Li, Shaojing Fu:
On Algebraic Property of T-Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 267-269 (2012) - [j11]Longjiang Qu, Shaojing Fu, Chunqing Wu:
A Comment on Algebraic Immunity of the Sum of Two Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1187-1188 (2012) - [j10]Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New constructions of low-correlation sequences with high-linear complexity. IET Commun. 6(18): 3309-3314 (2012) - [j9]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties. Int. J. Found. Comput. Sci. 23(3): 749-760 (2012) - [j8]Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong:
On the number of rotation symmetric functions over GF(p). Math. Comput. Model. 55(1-2): 142-150 (2012) - [j7]Peng Zhang, Deshuai Dong, Shaojing Fu, Chao Li:
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Math. Comput. Model. 55(3-4): 828-836 (2012) - [c6]Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang:
Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity. WISA 2012: 43-54 - [i2]Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New Constructions of Low Correlation Sequences with High Linear Complexity. IACR Cryptol. ePrint Arch. 2012: 161 (2012) - 2011
- [j6]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity. Appl. Math. Lett. 24(12): 2093-2096 (2011) - [j5]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 265-267 (2011) - [j4]Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:
Balanced rotation symmetric boolean functions with maximum algebraic immunity. IET Inf. Secur. 5(2): 93-99 (2011) - [j3]Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. J. Inf. Sci. Eng. 27(6): 1931-1942 (2011) - 2010
- [j2]Shaojing Fu, Chao Li, Longjiang Qu:
On the number of rotation symmetric Boolean functions. Sci. China Inf. Sci. 53(3): 537-545 (2010) - [j1]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Enumeration of balanced symmetric functions over GF(p). Inf. Process. Lett. 110(14-15): 544-548 (2010)
2000 – 2009
- 2009
- [c5]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. CANS 2009: 402-412 - [c4]Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li:
A New Construction of Boolean Functions with Maximum Algebraic Immunity. ISC 2009: 177-185 - [c3]Shaojing Fu, Longjiang Qu, Chao Li:
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. WISA 2009: 109-117 - 2008
- [c2]Chao Li, Shaojing Fu, Bing Sun:
Construction of Resilient Functions with Multiple Cryptographic Criteria. CANS 2008: 268-277 - [c1]Shaojing Fu, Chao Li, Bing Sun:
Enumeration of Homogeneous Rotation Symmetric Functions over Fp. CANS 2008: 278-284 - [i1]Shaojing Fu, Chao Li, Longjiang Qu, Ping Li:
Enumeration of Balanced Symmetric Functions over GF(p). IACR Cryptol. ePrint Arch. 2008: 372 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint