default search action
Fucai Luo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities. Theor. Comput. Sci. 987: 114368 (2024) - [j25]Fucai Luo, Haiyan Wang, Xingfu Yan:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". IEEE Trans. Dependable Secur. Comput. 21(1): 499-500 (2024) - [j24]Fucai Luo, Haiyan Wang, Willy Susilo, Xingfu Yan, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. IEEE Trans. Inf. Forensics Secur. 19: 2919-2934 (2024) - [j23]Jiahui Wu, Weizhe Zhang, Fucai Luo:
On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing". IEEE Trans. Inf. Forensics Secur. 19: 3481-3482 (2024) - [j22]Fucai Luo, Haiyan Wang, Xingfu Yan, Jiahui Wu:
Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data. IEEE Trans. Inf. Forensics Secur. 19: 7245-7258 (2024) - [j21]Fucai Luo, Saif Al-Kuwari, Yong Ding:
SVFL: Efficient Secure Aggregation and Verification for Cross-Silo Federated Learning. IEEE Trans. Mob. Comput. 23(1): 850-864 (2024) - [j20]Fucai Luo, Haiyan Wang, Xingfu Yan:
Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search. IEEE Trans. Mob. Comput. 23(10): 10077-10092 (2024) - 2023
- [j19]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Fuqun Wang, Kefei Chen:
Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84: 103698 (2023) - [j18]Fucai Luo, Haiyan Wang, Saif M. Al-Kuwari, Weihong Han:
Multi-key Fully Homomorphic Encryption without CRS from RLWE. Comput. Stand. Interfaces 86: 103742 (2023) - [j17]Fucai Luo, Saif M. Al-Kuwari:
Generic Construction of Black-Box Traceable Attribute-Based Encryption. IEEE Trans. Cloud Comput. 11(1): 942-955 (2023) - [j16]Fucai Luo, Haiyan Wang, Changlu Lin, Xingfu Yan:
ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 18: 4970-4983 (2023) - [c9]Yongpan Wang, Chaopeng Dong, Siyuan Li, Fucai Luo, Renjie Su, Zhanwei Song, Hong Li:
FlowEmbed: Binary function embedding model based on relational control flow graph and byte sequence. ICPADS 2023: 950-957 - [i4]Jiahui Wu, Weizhe Zhang, Fucai Luo:
ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning. CoRR abs/2305.08599 (2023) - [i3]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning. CoRR abs/2305.12950 (2023) - 2022
- [j15]Fucai Luo, Saif M. Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen:
Provable Data Possession Schemes from Standard Lattices for Cloud Computing. Comput. J. 65(12): 3223-3239 (2022) - [j14]Haiyan Wang, Yuan Li, Willy Susilo, Dung Hoang Duong, Fucai Luo:
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82: 103635 (2022) - [j13]Fucai Luo, Saif M. Al-Kuwari:
Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security. Des. Codes Cryptogr. 90(5): 1157-1177 (2022) - [j12]Xingfu Yan, Wing W. Y. Ng, Biao Zeng, Bowen Zhao, Fucai Luo, Ying Gao:
P2SIM: Privacy-Preserving and Source-Reliable Incentive Mechanism for Mobile Crowdsensing. IEEE Internet Things J. 9(24): 25424-25437 (2022) - [j11]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. IEEE Trans. Cloud Comput. 10(4): 2398-2408 (2022) - [c8]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Weihong Han:
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. ESORICS (1) 2022: 259-282 - [i2]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities. IACR Cryptol. ePrint Arch. 2022: 1152 (2022) - 2021
- [j10]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Attribute-based proxy re-signature from standard lattices and its applications. Comput. Stand. Interfaces 75: 103499 (2021) - [j9]Fucai Luo, Saif M. Al-Kuwari:
Revocable attribute-based proxy re-encryption. J. Math. Cryptol. 15(1): 465-482 (2021) - [j8]Fucai Luo, Saif M. Al-Kuwari, Fuqun Wang, Kefei Chen:
Attribute-based proxy re-encryption from standard lattices. Theor. Comput. Sci. 865: 52-62 (2021) - [j7]Chong Di, Qilian Liang, Fangqi Li, Shenghong Li, Fucai Luo:
An Efficient Parameter-Free Learning Automaton Scheme. IEEE Trans. Neural Networks Learn. Syst. 32(11): 4849-4863 (2021) - [c7]Ye Xiao, Fucai Luo, Chenglin Zhao, Fangmin Xu, Tao Chen:
Delay and Deployment Cost Optimization of Edge Computing based on C-RAN in Intelligent Plant. ICC Workshops 2021: 1-6 - [c6]Zihan Lin, Pengmin Li, Yilin Xiao, Liang Xiao, Fucai Luo:
Learning Based Efficient Federated Learning for Object Detection in MEC Against Jamming. ICCC 2021: 115-120 - 2020
- [j6]Xudie Ren, Fucai Luo, Shenghong Li:
Mixed geometric loss for bounding box regression in object detection. J. Electronic Imaging 29(5): 053005 (2020) - [j5]Qinju Liu, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. Secur. Commun. Networks 2020: 5328059:1-5328059:9 (2020) - [c5]Chao Sang, Jun Wu, Jianhua Li, Ali Kashif Bashir, Fucai Luo, Rupak Kharel:
RALaaS: Resource-Aware Learning-as-a-Service in Edge-Cloud Collaborative Smart Connected Communities. GLOBECOM 2020: 1-6 - [i1]Jinchao Huang, Guofu Li, Zhicong Yan, Fucai Luo, Shenghong Li:
Joint learning of interpretation and distillation. CoRR abs/2005.11638 (2020)
2010 – 2019
- 2019
- [j4]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
Fully homomorphic encryption based on the ring learning with rounding problem. IET Inf. Secur. 13(6): 639-648 (2019) - [j3]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. Inf. Sci. 480: 70-89 (2019) - 2018
- [j2]Fucai Luo, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. Secur. Commun. Networks 2018: 5967635:1-5967635:12 (2018) - [c4]Fucai Luo, Kunpeng Wang, Changlu Lin:
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. ISPEC 2018: 101-115 - [c3]Fucai Luo, Kunpeng Wang:
Verifiable Decryption for Fully Homomorphic Encryption. ISC 2018: 347-365 - [c2]Fucai Luo, Fei Wu, Yuxiang Cai:
Electric Company Management Information System based on Unified Message Center. ITQM 2018: 287-292 - 2016
- [j1]Fucai Luo, Changlu Lin, Yan Zhu:
Role-Based Signature and Its Security Proof. J. Inf. Sci. Eng. 32(6): 1525-1539 (2016) - 2015
- [c1]Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu:
A Provable Data Possession Scheme with Data Hierarchy in Cloud. Inscrypt 2015: 301-321
Coauthor Index
aka: Saif Al-Kuwari
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint