What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shui Yu
Google Scholar
ORCID:
0000-0003-4485-6743
32
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT.
Gang Xu
Xinyu Fan
Shiyuan Xu
Yibo Cao
Xiubo Chen
Tao Shang
Shui Yu
2025
journals/tifs
Evaluation of Machine Unlearning Through Model Difference.
Weiqi Wang
Chenhan Zhang
Zhiyi Tian
Shui Yu
Zhou Su
2025
journals/tifs
SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications.
Weiqi Wang
Zhiyi Tian
Chenhan Zhang
Shui Yu
2025
conf/acisp
MG-Det: Deepfake Detection with Multi-granularity.
Ahmed Asiri
Luoyu Chen
Zhiyi Tian
Xiaoyu Ding
Shui Yu
2024
journals/compsec
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks.
Yuxian Huang
Geng Yang
Hao Zhou
Hua Dai
Dong Yuan
Shui Yu
2024
journals/tifs
Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning.
Chenhan Zhang
Weiqi Wang
Zhiyi Tian
Shui Yu
2024
journals/tifs
Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms.
Haiyang Yu
Hui Zhang
Zhen Yang
Shui Yu
2024
journals/tifs
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
Yuyang Zhou
Guang Cheng
Shui Yu
Zongyao Chen
Yujia Hu
2024
journals/tifs
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing.
Weiqi Wang
Chenhan Zhang
Zhiyi Tian
Shui Yu
2024
journals/tifs
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
Yizhou Shen
Carlton Shepherd
Chuadhry Mujeeb Ahmed
Shigen Shen
Shui Yu
2024
journals/tifs
Stealthy Targeted Backdoor Attacks Against Image Captioning.
Wenshu Fan
Hongwei Li
Wenbo Jiang
Meng Hao
Shui Yu
Xiao Zhang
2024
journals/tifs
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
Jiale Zhang
Chengcheng Zhu
Xiaobing Sun
Chunpeng Ge
Bing Chen
Willy Susilo
Shui Yu
2024
journals/tifs
GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection.
Ximing Li
Linghui Li
Xiaoyong Li
Binsi Cai
Jia Jia
Yali Gao
Shui Yu
2023
journals/tifs
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things.
Shigen Shen
Lanlan Xie
Yanchun Zhang
Guowen Wu
Hong Zhang
Shui Yu
2023
journals/tifs
LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing.
Zhuangzhuang Zhang
Libing Wu
Chuanguo Ma
Jianxin Li
Jing Wang
Qian Wang
Shui Yu
2023
journals/tifs
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
Zixuan Wang
Jiliang Li
Yuntao Wang
Zhou Su
Shui Yu
Weizhi Meng
2023
journals/tifs
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection.
Ximing Li
Xiaoyong Li
Jia Jia
Linghui Li
Jie Yuan
Yali Gao
Shui Yu
2023
conf/asiaccs
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck.
Chenhan Zhang
Weiqi Wang
James J. Q. Yu
Shui Yu
2023
conf/asiaccs
BFU: Bayesian Federated Unlearning with Parameter Self-Sharing.
Weiqi Wang
Zhiyi Tian
Chenhan Zhang
An Liu
Shui Yu
2022
journals/compsec
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.
Boyu Kuang
Anmin Fu
Willy Susilo
Shui Yu
Yansong Gao
2022
journals/istr
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination.
Yizhou Shen
Shigen Shen
Zongda Wu
Haiping Zhou
Shui Yu
2022
journals/tifs
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
Zhenzhu Chen
Shang Wang
Anmin Fu
Yansong Gao
Shui Yu
Robert H. Deng
2022
journals/tifs
Attribute-Based Hierarchical Access Control With Extendable Policy.
Meiyan Xiao
Hongbo Li
Qiong Huang
Shui Yu
Willy Susilo
2021
journals/tifs
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks.
Yuyang Zhou
Guang Cheng
Shui Yu
2019
conf/ccs
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Wenwen Yan
Anmin Fu
Yi Mu
Zhe Xia
Shui Yu
Boyu Kuang
2019
conf/cans
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Yuting Cheng
Li Yang
Shui Yu
Jianfeng Ma
2018
conf/cns
Inference Attack in Android Activity based on Program Fingerprint.
Li Yang
Teng Wei
Jianfeng Ma
Shui Yu
Chao Yang
2015
journals/tifs
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
Jiao Jiao Jiang
Sheng Wen
Shui Yu
Yang Xiang
Wanlei Zhou
2014
journals/compsec
Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Sancheng Peng
Min Wu
Guojun Wang
Shui Yu
2013
journals/tifs
Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
Robin Doss
Wanlei Zhou
Shui Yu
2012
journals/tifs
A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
Yong Xiang
Iynkaran Natgunanathan
Dezhong Peng
Wanlei Zhou
Shui Yu
2012
journals/tifs
Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks.
Shui Yu
Guofeng Zhao
Wanchun Dou
Simon James
Coauthors
Ahmed Asiri
(1)
An Liu
(1)
Anmin Fu
(3)
Bing Chen
(1)
Binsi Cai
(1)
Boyu Kuang
(2)
Carlton Shepherd
(1)
Chao Yang
(1)
Chengcheng Zhu
(1)
Chenhan Zhang
(6)
Chuadhry Mujeeb Ahmed
(1)
Chuanguo Ma
(1)
Chunpeng Ge
(1)
Dezhong Peng
(1)
Dong Yuan
(1)
Gang Xu
(1)
Geng Yang
(1)
Guang Cheng
(2)
Guofeng Zhao
(1)
Guojun Wang
(1)
Guowen Wu
(1)
Haiping Zhou
(1)
Haiyang Yu
(1)
Hao Zhou
(1)
Hong Zhang
(1)
Hongbo Li
(1)
Hongwei Li
(1)
Hua Dai
(1)
Hui Zhang
(1)
Iynkaran Natgunanathan
(1)
James J. Q. Yu
(1)
Jia Jia
(2)
Jiale Zhang
(1)
Jianfeng Ma
(2)
Jianxin Li
(1)
Jiao Jiao Jiang
(1)
Jie Yuan
(1)
Jiliang Li
(1)
Jing Wang
(1)
Lanlan Xie
(1)
Li Yang
(2)
Libing Wu
(1)
Linghui Li
(2)
Luoyu Chen
(1)
Meiyan Xiao
(1)
Meng Hao
(1)
Min Wu
(1)
Qian Wang
(1)
Qiong Huang
(1)
Robert H. Deng
(1)
Robin Doss
(1)
Sancheng Peng
(1)
Shang Wang
(1)
Sheng Wen
(1)
Shigen Shen
(3)
Shiyuan Xu
(1)
Shui Yu
(32)
Simon James
(1)
Tao Shang
(1)
Teng Wei
(1)
Wanchun Dou
(1)
Wanlei Zhou
(3)
Weiqi Wang
(6)
Weizhi Meng
(1)
Wenbo Jiang
(1)
Wenshu Fan
(1)
Wenwen Yan
(1)
Willy Susilo
(3)
Xiao Zhang
(1)
Xiaobing Sun
(1)
Xiaoyong Li
(2)
Xiaoyu Ding
(1)
Ximing Li
(2)
Xinyu Fan
(1)
Xiubo Chen
(1)
Yali Gao
(2)
Yanchun Zhang
(1)
Yang Xiang
(1)
Yansong Gao
(2)
Yi Mu
(1)
Yibo Cao
(1)
Yizhou Shen
(2)
Yong Xiang
(1)
Yujia Hu
(1)
Yuntao Wang
(1)
Yuting Cheng
(1)
Yuxian Huang
(1)
Yuyang Zhou
(2)
Zhe Xia
(1)
Zhen Yang
(1)
Zhenzhu Chen
(1)
Zhiyi Tian
(6)
Zhou Su
(2)
Zhuangzhuang Zhang
(1)
Zixuan Wang
(1)
Zongda Wu
(1)
Zongyao Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to