Folgen
Fei Zhu
Fei Zhu
Wuhan Textile University
Bestätigte E-Mail-Adresse bei rmit.edu.au
Titel
Zitiert von
Zitiert von
Jahr
Privacy-preserving authentication for general directed graphs in industrial IoT
F Zhu, W Wu, Y Zhang, X Chen
Information sciences 502, 218-228, 2019
352019
Cost-effective authenticated data redaction with privacy protection in IoT
F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang
IEEE Internet of Things Journal 8 (14), 11678-11689, 2021
192021
A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks
F Zhu, X Yi, A Abuadbba, I Khalil, X Huang, F Xu
IEEE Transactions on Intelligent Transportation Systems, 2023
132023
Authenticated data sharing with privacy protection and batch verification for healthcare IoT
F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang
IEEE Transactions on Sustainable Computing 8 (1), 32-42, 2022
112022
Certificate-based anonymous authentication with efficient aggregation for wireless medical sensor networks
F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang, X Yan
IEEE Internet of Things Journal 9 (14), 12209-12218, 2021
102021
A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks
S Dong, H Su, Y Xia, F Zhu, X Hu, B Wang
IEEE Transactions on Intelligent Transportation Systems, 2023
82023
A universal designated multi-verifier transitive signature scheme
F Zhu, Y Zhang, C Lin, W Wu, R Meng
International Conference on Information Security and Cryptology, 180-195, 2017
72017
A new transitive signature scheme
C Lin, F Zhu, W Wu, K Liang, KKR Choo
International Conference on Network and System Security, 156-167, 2016
62016
Efficient and fine-grained sharing of signed healthcare data in smart healthcare
J Liu, L Xu, B Gu, L Cui, F Zhu
International Conference on Network and System Security, 443-458, 2022
32022
Efficient hash-based Redactable signature for smart grid applications
F Zhu, X Yi, A Abuadbba, J Luo, S Nepal, X Huang
European Symposium on Research in Computer Security, 554-573, 2022
32022
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
F Zhu, F Xu, X Yang, X Yi, A Abuadbba
Information Processing Letters 173, 106170, 2022
32022
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments
F Zhu, X Yi, S Abuadbba, I Khalil, X Yang, S Nepal, X Huang
Provable and Practical Security: 14th International Conference, ProvSec 2020 …, 2020
22020
A proxy transitive signature scheme
F Zhu, X Tao, C Lin, W Wu
Journal of Internet Technology 19 (4), 1273-1284, 2018
22018
PTLVD: Program Slicing and Transformer-based Line-level Vulnerability Detection System
T Peng, S Chen, F Zhu, J Tang, J Liu, X Hu
2023 IEEE 23rd International Working Conference on Source Code Analysis and …, 2023
12023
Forward-secure edge authentication for graphs
F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang
The Computer Journal 65 (7), 1653-1665, 2022
12022
Secure Reputation-Based Authentication With Malicious Detection in VANETs
X Yang, F Zhu, X Yang, J Luo, X Yi, J Ning, X Huang
IEEE Transactions on Dependable and Secure Computing, 2024
2024
Patch-Based Backdoors Detection and Mitigation with Feature Masking
T Wang, X Zhang, Y Jin, C Chen, F Zhu
International Symposium on Security and Privacy in Social Networks and Big …, 2022
2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–17