default search action
Junbin Fang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Mini Han Wang, Lumin Xing, Yi Pan, Feng Gu, Junbin Fang, Xiangrong Yu, Chi Pui Pang, Kelvin Kam Lung Chong, Carol Yim-Lui Cheung, Xulin Liao, Xiaoxiao Fang, Jie Yang, Ruoyu Zhou, Xiaoshu Zhou, Fengling Wang, Wenjian Liu:
AI-Based Advanced Approaches and Dry Eye Disease Detection Based on Multi-Source Evidence: Cases, Applications, Issues, and Future Directions. Big Data Min. Anal. 7(2): 445-484 (2024) - [j28]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. Expert Syst. Appl. 250: 123761 (2024) - [j27]Liqi Lai, Luyao Wang, Rui Huang, Zoe Lin Jiang, Junbo Huang, Wenyue Shi, Bin Zhou, Renzhang Chen, Bin Lei, Junbin Fang:
Task-Driven ADDIE-Twist Model With a Teach-Study Double-Helix Structure. IEEE Trans. Educ. 67(1): 1-10 (2024) - [j26]Zoe L. Jiang, Min Xie, Hanlin Chen, Yijian Pan, Jiazhuo Lyu, Man Ho Au, Junbin Fang, Yang Liu, Xuan Wang:
RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain. IEEE Trans. Netw. Sci. Eng. 11(5): 4822-4835 (2024) - [j25]Zhanhang Wei, Zixian Wei, Junbin Fang, Junxin Pan, Luyao Wang, Yuhan Dong:
Impulse Response Modeling and Dynamic Analysis for SIMO UOWC Systems Enhanced by RIS-Equipped UUVs. IEEE Trans. Veh. Technol. 73(2): 1540-1553 (2024) - [c31]Yi Huang, Junping Wan, Zoe L. Jiang, Jun Zhou, Junbin Fang, Zhenfu Cao:
An Efficient Integer-Wise ReLU on TFHE. ACISP (1) 2024: 161-179 - [c30]Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
FSSiBNN: FSS-Based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. ESORICS (1) 2024: 229-250 - [c29]Junping Wan, Danjie Li, Junbin Fang, Zoe L. Jiang:
LPFHE: Low-Complexity Polynomial CNNs for Secure Inference over FHE. ESORICS (3) 2024: 403-423 - [i9]Min Xie, Peichen Ju, Yanqi Zhao, Zoe L. Jiang, Junbin Fang, Yong Yu, Xuan Wang:
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation. IACR Cryptol. ePrint Arch. 2024: 610 (2024) - [i8]Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, Xuan Wang:
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. IACR Cryptol. ePrint Arch. 2024: 1010 (2024) - 2023
- [j24]Peng Li, Junzuo Lai, Dehua Zhou, Ye Yang, Wei Wu, Junbin Fang:
Multi-authority anonymous authentication with public accountability for incentive-based applications. Comput. Networks 231: 109828 (2023) - [c28]Yongkang Li, Ziyang Song, Zheng Shi, Qingping Dou, Hongjiang Lei, Jinming Wen, Junbin Fang:
Secure HARQ-IR-Aided Terahertz Communications. ICCC Workshops 2023: 1-6 - [c27]Junbin Fang, Zewei Yang, Siyuan Dai, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation. PRCV (3) 2023: 478-491 - [c26]Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang:
Privacy-Preserving Distributed Machine Learning Made Faster. SecTL@AsiaCCS 2023: 2:1-2:14 - [i7]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Siu-Ming Yiu, Chuanyi Liu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. CoRR abs/2303.12249 (2023) - [i6]Junbin Fang, Canjian Jiang, You Jiang, Puxi Lin, Zhaojie Chen, Yujing Sun, Siu-Ming Yiu, Zoe Lin Jiang:
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation. CoRR abs/2307.13294 (2023) - [i5]Yongkang Li, Ziyang Song, Zheng Shi, Qingping Dou, Hongjiang Lei, Jinming Wen, Junbin Fang:
Secure HARQ-IR-Aided Terahertz Communications. CoRR abs/2307.15929 (2023) - [i4]Peng Yang, Zoe Lin Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siu-Ming Yiu, Yulin Wu:
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 73 (2023) - 2022
- [j23]Jinyuan Xie, Canjian Jiang, Jiajun Lin, Zoe Lin Jiang, Jindong Wang, Junbin Fang:
Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution. Quantum Inf. Process. 21(10): 349 (2022) - [c25]Zoe Lin Jiang, Yijian Pan, Maoshun Fan, Lin Yao, Yang Liu, Yulin Wu, Siu-Ming Yiu, Xuan Wang, Junbin Fang:
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature. ICDIS 2022: 134-141 - [c24]Chengjin Liu, Zoe Lin Jiang, Xin Zhao, Qian Chen, Junbin Fang, Daojing He, Jun Zhang, Xuan Wang:
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption. INFOCOM Workshops 2022: 1-6 - [c23]Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou:
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? ISAAC 2022: 26:1-26:12 - [c22]Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu:
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. TrustCom 2022: 1020-1027 - [i3]Zoe Lin Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang:
Privacy-Preserving Distributed Machine Learning Made Faster. CoRR abs/2205.05825 (2022) - 2021
- [j22]Yang Li, Zhikang Shuai, Junbin Fang, Xiangyang Wu, Zheng John Shen:
Small-Signal Stability Analysis Method for Hybrid AC-DC Systems With Multiple DC Buses. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(1): 17-27 (2021) - 2020
- [j21]Yong Zhang, Yongsheng Chen, Huixin Xu, Junbin Fang, Zijian Zhao, Weipeng Hu, Xiaoqin Yang, Jia Ye, Yun Cheng, Jiayin Wang, Weiqiang Sun, Jian Wang, Huanming Yang, Jing Yan, Lin Fang:
SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles. BMC Bioinform. 21(1): 295 (2020) - [j20]Junbin Fang, Guikai Xi, Rong Li, Qian Chen, Puxi Lin, Sijin Li, Zoe Lin Jiang, Siu-Ming Yiu:
Coarse-to-fine two-stage semantic video carving approach in digital forensics. Comput. Secur. 97: 101942 (2020) - [j19]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Zechao Liu, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518: 168-180 (2020) - [j18]Wen Lei, Zhihuang Xie, Yuzhong Li, Junbin Fang, Weiqiang Shen:
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation. Quantum Inf. Process. 19(11): 1-12 (2020) - [c21]Zhaojie Chen, Puxi Lin, Zoe Lin Jiang, Zhanhang Wei, Sichen Yuan, Junbin Fang:
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System. Inscrypt 2020: 53-69 - [c20]Aiping Li, Junbin Fang, Qianye Jiang, Bin Zhou, Yan Jia:
A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks. WISE (2) 2020: 227-239 - [i2]Junbin Fang, Dominique Unruh, Jian Weng, Jun Yan, Dehua Zhou:
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? IACR Cryptol. ePrint Arch. 2020: 621 (2020)
2010 – 2019
- 2019
- [j17]Zhengzhong Yi, Junbin Fang, Puxi Lin, Xiao-Jun Wen, Zoe Lin Jiang, Xuan Wang:
Efficient quantum key distribution protocol based on classical-quantum polarized channels. Quantum Inf. Process. 18(12): 356 (2019) - [c19]Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. DSC 2019: 480-486 - [c18]Zhentian Xiong, Zoe Lin Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang:
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique. NSS 2019: 272-287 - [c17]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - 2018
- [j16]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang:
JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018) - [j15]Xiao-Jun Wen, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe Lin Jiang, Jun-bin Fang:
Quantum solution for secure information transmission of wearable devices. Int. J. Distributed Sens. Networks 14(5) (2018) - [j14]Yongzhi Chen, Xiao-Jun Wen, Zhiwei Sun, Zoe Lin Jiang, Junbin Fang:
A sensitive information protection scheme in wearable devices based on quantum entanglement. Int. J. Distributed Sens. Networks 14(10) (2018) - [j13]Ye Li, Zoe Lin Jiang, Xuan Wang, Jun-bin Fang, En Zhang, Xianmin Wang:
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 2385150:1-2385150:10 (2018) - [c16]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. ICA3PP (4) 2018: 447-460 - [c15]Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang:
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. NSS 2018: 484-490 - [c14]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - 2017
- [j12]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang, Jun-bin Fang:
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities. Pervasive Mob. Comput. 39: 52-64 (2017) - [j11]Cong Zuo, Kaitai Liang, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [c13]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - [c12]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. ISPEC 2017: 525-538 - [p1]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - 2016
- [j10]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j9]Yanbin Tang, Junbin Fang, Kam-Pui Chow, Siu-Ming Yiu, Jun Xu, Bo Feng, Qiong Li, Qi Han:
Recovery of heavily fragmented JPEG files. Digit. Investig. 18 Supplement: S108-S117 (2016) - [j8]Liyang Yu, Huanran Wang, Qi Han, Xiamu Niu, Siu-Ming Yiu, Jun-bin Fang, Zhifang Wang:
Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205: 84-91 (2016) - [j7]Xiaoqing Tan, Xiaoqian Zhang, Junbin Fang:
Perfect quantum teleportation by four-particle cluster state. Inf. Process. Lett. 116(5): 347-350 (2016) - [j6]Qing-bin Luo, Guowu Yang, Kun She, Xiaoyu Li, Jun-bin Fang:
Quantum homomorphic signature based on Bell-state measurement. Quantum Inf. Process. 15(12): 5051-5061 (2016) - [c11]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. ACISP (1) 2016: 40-56 - [c10]Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - [c9]Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. AsiaCCS 2016: 889-894 - [c8]Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang:
A Revocable Outsourcing Attribute-Based Encryption Scheme. CloudComp 2016: 145-161 - [i1]Jun-bin Fang, Zhen Che, Xiaolong Yu, Zhe Chen, Zoe Lin Jiang, Siu-Ming Yiu, Kui Ren, Xiaoqing Tan:
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes. CoRR abs/1608.07202 (2016) - 2015
- [c7]Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu:
Fragmented JPEG File Recovery Using Pseudo Headers. IFIP Int. Conf. Digital Forensics 2015: 215-231 - [c6]Xiaoyan Liu, Zoe Lin Jiang, Siu-Ming Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Jun-bin Fang:
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks. MSN 2015: 124-133 - 2014
- [j5]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j4]Man Ho Au, Joseph K. Liu, Jun-bin Fang, Zoe Lin Jiang, Willy Susilo, Jianying Zhou:
A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Trans. Veh. Technol. 63(1): 3-18 (2014) - 2013
- [j3]Xiao-Jun Wen, Yongzhi Chen, Jun-bin Fang:
An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1): 549-558 (2013) - [j2]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c5]Y. Liang, Kam-Pui Chow, Lucas Chi Kwong Hui, Jun-bin Fang, Siu-Ming Yiu, Shuhui Hou:
Towards a Better Similarity Measure for Keyword Profiling via Clustering. COMPSAC Workshops 2013: 16-20 - [c4]Shao-sheng Jiang, Rui-nan Chi, Xiao-Jun Wen, Jun-bin Fang:
An Implementation Scheme of BB84-Protocol-Based Quantum Key Distribution System. EMC/HumanCom 2013: 973-978 - [c3]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - 2012
- [c2]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - 2011
- [j1]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [c1]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint