default search action
Fushan Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Chunzhi Zhao, Junqi Zhang, Jinzheng Cao, Qingfeng Cheng, Fushan Wei:
Implicit Factorization with Shared Any Bits. IACR Commun. Cryptol. 1(3): 8 (2024) - 2023
- [c22]Qingfeng Cheng, Chunzhi Zhao, Jinzheng Cao, Fushan Wei:
Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound. Inscrypt (2) 2023: 209-229 - [c21]Yuhan Song, Yuefei Zhu, Fushan Wei:
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions. ICICS 2023: 590-607 - 2022
- [j51]Yuhan Song, Fushan Wei, Kaijie Zhu, Yuefei Zhu:
Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner. IEEE Trans. Netw. Serv. Manag. 19(4): 3794-3809 (2022) - [j50]Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab:
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing. ACM Trans. Internet Techn. 22(2): 45:1-45:24 (2022) - [c20]Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu:
Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning. LCN 2022: 371-374 - 2021
- [j49]Fushan Wei, Pandi Vijayakumar, Neeraj Kumar, Ruijie Zhang, Qingfeng Cheng:
Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things. IEEE Internet Things J. 8(7): 5599-5606 (2021) - [j48]Jiaxing Guo, Chunxiang Gu, Xi Chen, Siqi Lu, Fushan Wei:
Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations. Inf. Technol. Control. 50(3): 570-587 (2021) - [j47]Binjie Chen, Fushan Wei, Chunxiang Gu:
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms. Secur. Commun. Networks 2021: 6643763:1-6643763:10 (2021) - [j46]Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei:
CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method. Sensors 21(24): 8231 (2021) - [j45]Fushan Wei, Sherali Zeadally, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [c19]Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei:
tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network. CCCI 2021: 1-5 - 2020
- [j44]Ding Wang, Peichang Zhang, Zeyu Yang, Fushan Wei, Cheng Wang:
A Novel Estimator for TDOA and FDOA Positioning of Multiple Disjoint Sources in the Presence of Calibration Emitters. IEEE Access 8: 1613-1643 (2020) - [j43]Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang:
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener. Comput. Syst. 109: 450-456 (2020) - [j42]Hui Zhang, Saru Kumari, Mohammad S. Obaidat, Fushan S. Wei:
Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing. IET Commun. 14(15): 2427-2433 (2020) - [j41]Ziwei Ye, Yuanbo Guo, Ankang Ju, Fushan Wei, Ruijie Zhang, Jun Ma:
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling. J. Organ. End User Comput. 32(3): 37-49 (2020) - [j40]Zeyu Yang, Ding Wang, Bin Yang, Fushan Wei:
Robust Direct position determination against sensor gain and phase errors with the use of calibration sources. Multidimens. Syst. Signal Process. 31(4): 1435-1468 (2020) - [j39]Fushan Wei, Pandi Vijayakumar, Qi Jiang, Ruijie Zhang:
A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks. IEEE Trans. Sustain. Comput. 5(2): 268-278 (2020) - [c18]Jiaxing Guo, Siqi Lu, Chunxiang Gu, Xi Chen, Fushan Wei:
Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things. NaNA 2020: 233-240
2010 – 2019
- 2019
- [j38]Jiaxing Guo, Chunxiang Gu, Xi Chen, Fushan Wei:
Model Learning and Model Checking of IPSec Implementations for Internet of Things. IEEE Access 7: 171322-171332 (2019) - [j37]Ding Wang, Jiexin Yin, Tao Zhang, Changgui Jia, Fushan Wei:
Iterative constrained weighted least squares estimator for TDOA and FDOA positioning of multiple disjoint sources in the presence of sensor position and velocity uncertainties. Digit. Signal Process. 92: 179-205 (2019) - [j36]Ding Wang, Jiexin Yin, Xin Chen, Changgui Jia, Fushan Wei:
On the use of calibration emitters for TDOA source localization in the presence of synchronization clock bias and sensor location errors. EURASIP J. Adv. Signal Process. 2019: 37 (2019) - [j35]Qi Jiang, Yuanyuan Qian, Jianfeng Ma, XinDi Ma, Qingfeng Cheng, Fushan Wei:
User centric three-factor authentication protocol for cloud-assisted wearable devices. Int. J. Commun. Syst. 32(6) (2019) - [c17]Ji Li, Chunxiang Gu, Fushan Wei, Xi Chen:
A Survey on Blockchain Anomaly Detection Using Data Mining Techniques. BlockSys 2019: 491-504 - 2018
- [j34]Fushan Wei, Pandi Vijayakumar, Jian Shen, Ruijie Zhang, Li Li:
A provably secure password-based anonymous authentication scheme for wireless body area networks. Comput. Electr. Eng. 65: 322-331 (2018) - [j33]Fushan Wei, Neeraj Kumar, Debiao He, Sang-Soo Yeo:
A general compiler for password-authenticated group key exchange protocol in the standard model. Discret. Appl. Math. 241: 78-86 (2018) - [j32]Fushan Wei, Ruijie Zhang, Chuangui Ma:
A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing. Fundam. Informaticae 157(1-2): 201-220 (2018) - [j31]Yinbin Miao, Jianfeng Ma, Fushan Wei, Kai Zhang, Zhiquan Liu:
VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner. Int. J. High Perform. Comput. Netw. 12(1): 39-48 (2018) - [j30]Jian Shen, Tianqi Zhou, Fushan Wei, Xingming Sun, Yang Xiang:
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things. IEEE Internet Things J. 5(4): 2526-2536 (2018) - [j29]Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:
Revisiting the Expansion Length of Triple-base Number System for Elliptic Curve Scalar Multiplication. J. Inf. Sci. Eng. 34(3): 721-732 (2018) - [j28]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen, Fushan Wei:
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw. Appl. 11(2): 287-297 (2018) - [j27]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei:
DOAS: Efficient data owner authorized search over encrypted cloud data. Peer-to-Peer Netw. Appl. 11(3): 349-360 (2018) - [j26]Qi Jiang, Jianfeng Ma, Fushan Wei:
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 2039-2042 (2018) - [j25]Ke Zhang, Kai Xu, Fushan Wei:
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 2484268:1-2484268:9 (2018) - [j24]Wenting Li, Bin Li, Yiming Zhao, Ping Wang, Fushan Wei:
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 8539674:1-8539674:11 (2018) - 2017
- [j23]Ruijie Zhang, Jian Shen, Fushan Wei, Xiong Li, Arun Kumar Sangaiah:
Medical image classification based on multi-scale non-negative sparse coding. Artif. Intell. Medicine 83: 44-51 (2017) - [j22]Fushan Wei, Jianfeng Ma, Ruijie Zhang, Chuangui Ma, Xu An Wang:
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model. Sci. China Inf. Sci. 60(7): 72103 (2017) - [j21]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing. Int. J. Sens. Networks 24(1): 62-73 (2017) - [j20]Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei, Meixia Miao:
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks. IEEE Internet Things J. 4(2): 546-554 (2017) - [j19]Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma:
A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. J. Inf. Sci. Eng. 33(4): 907-921 (2017) - [j18]Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu, Xu An Wang, Cunbo Lu:
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Netw. Appl. 10(4): 995-1007 (2017) - [j17]Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:
Secure and efficient ECC speeding up algorithms for wireless sensor networks. Soft Comput. 21(19): 5665-5673 (2017) - [c16]Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, Fushan Wei:
Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling. Inscrypt 2017: 404-426 - [c15]Yunqi Dou, Chuangui Ma, Yanbin Li, Fushan Wei:
An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing. ICCCS (1) 2017: 542-551 - [c14]Junqi Zhang, Qingfeng Cheng, Fushan Wei, Xinglong Zhang:
A Compact Construction for Non-monotonic Online/Offline CP-ABE Scheme. SpaCCS Workshops 2017: 507-523 - 2016
- [j16]Xu An Wang, Fatos Xhafa, Weiyi Cai, Jianfeng Ma, Fushan Wei:
Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 56: 871-883 (2016) - [j15]Guangsong Li, Qi Jiang, Yanan Shi, Fushan Wei:
Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks. Int. J. Netw. Secur. 18(1): 193-200 (2016) - [j14]Fushan Wei, Yun Wei, Chuangui Ma:
Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. Int. J. Netw. Secur. 18(2): 393-396 (2016) - [j13]Fushan Wei, Jianfeng Ma, Qi Jiang, Jian Shen, Chuangui Ma:
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Inf. Technol. Control. 45(1): 62-70 (2016) - [j12]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Fushan Wei, Zhiquan Liu, Xu An Wang:
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting. J. Medical Syst. 40(11): 246:1-246:12 (2016) - [j11]Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76: 37-48 (2016) - [c13]Siyu Xiao, Aijun Ge, Fushan Wei, Chuangui Ma:
Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe. 3PGCIC 2016: 115-122 - [c12]Fushan Wei, Ruijie Zhang, Jian Shen:
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. BWCCA 2016: 849-855 - [c11]Fushan Wei, Ruijie Zhang, Chuangui Ma:
Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction. ICCCS (1) 2016: 377-388 - [c10]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. ICCCS (1) 2016: 389-408 - 2015
- [j10]Lei Chen, Fushan Wei, Chuangui Ma:
A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques. Int. J. Distributed Sens. Networks 11: 704502:1-704502:10 (2015) - [j9]Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li:
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. Int. J. Embed. Syst. 7(3/4): 257-265 (2015) - [j8]Fushan Wei, Jianfeng Ma, Aijun Ge, Guangsong Li, Chuangui Ma:
A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. Inf. Technol. Control. 44(2): 195-206 (2015) - [j7]Guangsong Li, Qi Jiang, Fushan Wei, Chuangui Ma:
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks. Wirel. Pers. Commun. 80(2): 581-589 (2015) - [c9]Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:
Fast Scalar Multiplication Algorithm Using Constrained Triple-Base Number System and Its Applications. BWCCA 2015: 426-431 - [c8]Xinghua Li, Hai Liu, Fushan Wei, Jianfeng Ma, Weidong Yang:
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks. GLOBECOM 2015: 1-6 - [c7]Baoping Tian, Fushan Wei, Chuangui Ma:
Strongly Secure Key Exchange Protocol with Minimal KEM. ISPEC 2015: 139-153 - 2014
- [j6]Ruijie Zhang, Fushan Wei, Bicheng Li:
E2LSH based multiple kernel approach for object detection. Neurocomputing 124: 105-110 (2014) - [c6]Baoping Tian, Fushan Wei, Chuangui Ma:
mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group. INTRUST 2014: 407-421 - [c5]Yun Wei, Fushan Wei, Chuangui Ma:
Certificateless Non-Interactive Key Exchange Protocol without Pairings. SECRYPT 2014: 31-42 - 2013
- [j5]Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(9): 1864-1871 (2013) - [c4]Chuangui Ma, Fushan Wei, Fengxiu Gao:
Efficient Client-to-Client Password Authenticated Key Exchange Based on RSA. INCoS 2013: 233-238 - 2012
- [j4]Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Gateway-oriented password-authenticated key exchange protocol in the standard model. J. Syst. Softw. 85(3): 760-768 (2012) - [j3]Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768]. J. Syst. Softw. 85(9): 2192 (2012) - 2011
- [j2]Qingfeng Cheng, Chuangui Ma, Fushan Wei:
Analysis and improvement of a new authenticated group key agreement in a mobile environment. Ann. des Télécommunications 66(5-6): 331-337 (2011) - [j1]Fushan Wei, Chuangui Ma, Qingfeng Cheng:
Anonymous gateway-oriented password-based authenticated key exchange based on RSA. EURASIP J. Wirel. Commun. Netw. 2011: 162 (2011) - [c3]Fushan Wei, Chuangui Ma, Zhenfeng Zhang:
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. ProvSec 2011: 366-379 - 2010
- [c2]Ying Liu, Fushan Wei, Chuangui Ma:
Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting. Inscrypt 2010: 255-267 - [c1]Fushan Wei, Chuangui Ma, Qingfeng Cheng:
Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings. ICICA (LNCS) 2010: 135-142 - [i1]Qingfeng Cheng, Chuangui Ma, Fushan Wei:
A modified eCK model with stronger security for tripartite authenticated key exchange. IACR Cryptol. ePrint Arch. 2010: 42 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint