What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Anmin Fu
Google Scholar
ORCID:
0000-0002-1632-5737
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
DFirmSan: A lightweight dynamic memory sanitizer for Linux-based firmware.
Shanquan Yang
Yansong Gao
Boyu Kuang
Yixuan Yang
Anmin Fu
2025
journals/tifs
Decaf: Data Distribution Decompose Attack Against Federated Learning.
Zhiyang Dai
Yansong Gao
Chunyi Zhou
Anmin Fu
Zhi Zhang
Minhui Xue
Yifeng Zheng
Yuqing Zhang
2025
journals/tifs
TruVRF: Toward Triple-Granularity Verification on Machine Unlearning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhi Zhang
Minhui Xue
Zhiyang Dai
Shouling Ji
Yuqing Zhang
2025
conf/acisp
DeGain: Detecting GAN-Based Data Inversion in Collaborative Deep Learning.
Zhenzhu Chen
Yansong Gao
Anmin Fu
Fanjian Zeng
Boyu Kuang
Robert H. Deng
2025
conf/ndss
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!
Yansong Gao
Huaibing Peng
Hua Ma
Zhi Zhang
Shuo Wang
Rayne Holland
Anmin Fu
Minhui Xue
Derek Abbott
2025
journals/tifs
Division and Union: Latent Model Watermarking.
Zhiyang Dai
Yansong Gao
Boyu Kuang
Yifeng Zheng
Ajmal Mian
Ruimin Wang
Anmin Fu
2025
conf/uss
TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis.
Bo Zhang
Yansong Gao
Changlong Yu
Boyu Kuang
Zhi Zhang
Hyoungshick Kim
Anmin Fu
2024
journals/tifs
CareFL: Contribution Guided Byzantine-Robust Federated Learning.
Qihao Dong
Shengyuan Yang
Zhiyang Dai
Yansong Gao
Shang Wang
Yuan Cao
Anmin Fu
Willy Susilo
2024
journals/tifs
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection.
Yinshan Li
Hua Ma
Zhi Zhang
Yansong Gao
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Yifeng Zheng
Said F. Al-Sarawi
Derek Abbott
2024
journals/tifs
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses.
Huaibing Peng
Huming Qiu
Hua Ma
Shuo Wang
Anmin Fu
Said F. Al-Sarawi
Derek Abbott
Yansong Gao
2024
journals/tifs
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures.
Huming Qiu
Hua Ma
Zhi Zhang
Alsharif Abuadbba
Wei Kang
Anmin Fu
Yansong Gao
2024
conf/ccs
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Hua Ma
Shang Wang
Yansong Gao
Zhi Zhang
Huming Qiu
Minhui Xue
Alsharif Abuadbba
Anmin Fu
Surya Nepal
Derek Abbott
2024
conf/sp
DeepTheft: Stealing DNN Model Architectures through Power Side Channel.
Yansong Gao
Huming Qiu
Zhi Zhang
Binghui Wang
Hua Ma
Alsharif Abuadbba
Minhui Xue
Anmin Fu
Surya Nepal
2023
conf/asiaccs
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Shang Wang
Yansong Gao
Anmin Fu
Zhi Zhang
Yuqing Zhang
Willy Susilo
Dongxi Liu
2023
conf/ndss
PPA: Preference Profiling Attack Against Federated Learning.
Chunyi Zhou
Yansong Gao
Anmin Fu
Kai Chen
Zhiyang Dai
Zhi Zhang
Minhui Xue
Yuqing Zhang
2022
journals/compsec
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices.
Anmin Fu
Weijia Ding
Boyu Kuang
Qianmu Li
Willy Susilo
Yuqing Zhang
2022
journals/compsec
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Boyu Kuang
Anmin Fu
Willy Susilo
Shui Yu
Yansong Gao
2022
journals/tifs
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
Zhenzhu Chen
Shang Wang
Anmin Fu
Yansong Gao
Shui Yu
Robert H. Deng
2020
journals/compsec
DO-RA: Data-oriented runtime attestation for IoT devices.
Boyu Kuang
Anmin Fu
Lu Zhou
Willy Susilo
Yuqing Zhang
2019
conf/ccs
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Wenwen Yan
Anmin Fu
Yi Mu
Zhe Xia
Shui Yu
Boyu Kuang
2018
conf/acisp
Revocable Certificateless Encryption with Ciphertext Evolution.
Yinxia Sun
Futai Zhang
Anmin Fu
2012
journals/compsec
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Anmin Fu
Yuqing Zhang
Zhenchao Zhu
Qi Jing
Jingyu Feng
Coauthors
Ajmal Mian
(1)
Alsharif Abuadbba
(4)
Anmin Fu
(22)
Binghui Wang
(1)
Bo Zhang
(1)
Boyu Kuang
(8)
Changlong Yu
(1)
Chunyi Zhou
(3)
Derek Abbott
(4)
Dongxi Liu
(1)
Fanjian Zeng
(1)
Futai Zhang
(1)
Hua Ma
(6)
Huaibing Peng
(2)
Huming Qiu
(4)
Hyoungshick Kim
(1)
Jingyu Feng
(1)
Kai Chen
(2)
Lu Zhou
(1)
Minhui Xue
(7)
Qi Jing
(1)
Qianmu Li
(1)
Qihao Dong
(1)
Rayne Holland
(1)
Robert H. Deng
(2)
Ruimin Wang
(1)
Said F. Al-Sarawi
(2)
Shang Wang
(4)
Shanquan Yang
(1)
Shengyuan Yang
(1)
Shouling Ji
(1)
Shui Yu
(3)
Shuo Wang
(2)
Surya Nepal
(2)
Wei Kang
(1)
Weijia Ding
(1)
Wenwen Yan
(1)
Willy Susilo
(5)
Yansong Gao
(17)
Yi Mu
(1)
Yifeng Zheng
(3)
Yinshan Li
(1)
Yinxia Sun
(1)
Yixuan Yang
(1)
Yuan Cao
(1)
Yuqing Zhang
(7)
Zhe Xia
(1)
Zhenchao Zhu
(1)
Zhenzhu Chen
(2)
Zhi Zhang
(10)
Zhiyang Dai
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to