Fanyu Kong

ORCID: 0000-0003-1369-6855
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cryptography and Residue Arithmetic
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Complexity and Algorithms in Graphs
  • Cryptographic Implementations and Security
  • Advanced Authentication Protocols Security
  • Advanced Data Storage Technologies
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Security in Wireless Sensor Networks
  • Parallel Computing and Optimization Techniques
  • Security and Verification in Computing
  • Distributed and Parallel Computing Systems
  • Face and Expression Recognition
  • Cloud Computing and Resource Management
  • Stochastic Gradient Optimization Techniques
  • Face recognition and analysis
  • Brain Tumor Detection and Classification
  • graph theory and CDMA systems
  • Distributed systems and fault tolerance
  • Recommender Systems and Techniques
  • Software-Defined Networks and 5G

Shandong University
2015-2025

Minzu University of China
2025

Nanjing University of Aeronautics and Astronautics
2025

Qinghai University Affiliated Hospital
2024

Dalian Polytechnic University
2024

Antea Group (France)
2023

Xinjiang Institute of Engineering
2022

State Key Laboratory of Cryptology
2008-2019

Temple University
2017

Zhejiang Financial College
2017

In the ongoing evolution of OceanBase database system, it is essential to enhance its adaptability small-scale enterprises. The system has demonstrated stability and effectiveness within Ant Group other commercial organizations, besides through TPC-C TPC-H tests. this paper, we have designed a stand-alone distributed integrated architecture named Paetica address overhead caused by components in mode, with respect system. enables adaptive configuration that allows support both serial parallel...

10.14778/3611540.3611560 article EN Proceedings of the VLDB Endowment 2023-08-01

Face recognition is one of the key technologies in intelligent security systems. Data privacy and identification efficiency have always been concerns about face recognition. Existing privacy-preserving protocols only focus on training phase Since systems mainly complete calculation large-scale data phase, existing cannot be well applied to In this article, we propose first protocol for calculations We introduce Householder matrix blind user including model data, which enables proposed...

10.1109/jiot.2023.3240166 article EN IEEE Internet of Things Journal 2023-01-27

Styrenes are challenging substrates for current trifluoromethyl radical-involved hydrotrifluoromethylation reactions due to competitive side reactions. Moreover, metal-free of olefins that can simultaneously be compatible with styrenes and unactivated aliphatic alkenes is scarce at present. Herein, we describe an air insensitive, mild, broadly applicable protocol by using appropriate redox system comprising chloro(phenyl)trifluoromethyl-λ3-iodane presynthesized O,O'-dimethyldithiophosphoric...

10.1021/acs.orglett.5c01500 article EN Organic Letters 2025-06-04

Phrase search encryption, as an important technique in cloud-based IoT system, allows users to retrieve encrypted data that contains a set of consecutive keywords. It plays role e-healthcare diagnosis machine learning applications for etc. However, the best our knowledge, existing phrase encryption schemes cannot achieve complete verification results. They either verify whether returned files correctly containing query or all this are returned. Result is very some applications. If result...

10.1109/jiot.2021.3063855 article EN IEEE Internet of Things Journal 2021-03-04

Object recognition of hyperspectral remote sensing images based on machine learning is widely applied in many industries. However, the efficiency training and recognizing process object a critical issue since it involves complex matrix operations large scale data sets, especially for resource-constrained devices. One solution to outsource heavy workload cloud server. Nonetheless, may bring some security problems when server untrustworthy. Therefore, how enable devices securely efficiently...

10.1109/jiot.2020.3030813 article EN IEEE Internet of Things Journal 2020-10-13

Decision tree classifiers are pervasively applied in a wide range of areas, such as healthcare, credit-risk assessment, spam detection, and many more. To ensure effectiveness efficiency, clients usually choose to adopt classification services that offered by model providers. However, the required data interactions evaluation process raise privacy concerns for both provider client, indicating an imminent need private decision (PDTE). Recently, some works, e.g., [1] (ESORICS'19) [2] (NDSS'21),...

10.1109/tdsc.2024.3372505 article EN cc-by-nc-nd IEEE Transactions on Dependable and Secure Computing 2024-03-04

In traditional identity-based encryption schemes, security will be entirely lost once secret keys are exposed. However, with more and use of mobile unprotected devices, key exposure seems unavoidable. To deal this problem, we newly prop

10.3233/fi-2011-562 article EN Fundamenta Informaticae 2011-01-01

The road network plays an important role in guiding people's daily travel. In the network, shortest distance query is one of most basic operations. With scale continuously expanding, people choose to outsource cloud server form encrypted graph. To best authors' knowledge, existing privacy-preserving schemes over large-scale graphs are all designed for static Nonetheless, graph often updated time. These cannot work well this practical application. order address problem, we explore how...

10.1109/jsyst.2023.3238809 article EN IEEE Systems Journal 2023-02-10

As auxiliary collaborative signals, the entity connectivity and relation semanticity beneath knowledge graph (KG) triples can alleviate data sparsity cold-start issues of recommendation tasks. Thus many works consider obtaining user item representations via information aggregation on graph-structured within Euclidean space. However, scale-free graphs (e.g., KGs) inherently exhibit non-Euclidean geometric topologies, such as tree-like circle-like structures. The existing models built in a...

10.1145/3539618.3591730 article EN Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2023-07-18
Coming Soon ...