Follow
Cai Fu
Title
Cited by
Cited by
Year
Secure olsr
F Hong, L Hong, C Fu
19th International Conference on Advanced Information Networking and …, 2005
972005
Resource allocation for delay-sensitive vehicle-to-multi-edges (V2Es) communications in vehicular networks: A multi-agent deep reinforcement learning approach
J Wu, J Wang, Q Chen, Z Yuan, P Zhou, X Wang, C Fu
IEEE Transactions on Network Science and Engineering 8 (2), 1873-1886, 2021
342021
GRAP: Grey risk assessment based on projection in ad hoc networks
C Fu, X Gao, M Liu, X Liu, L Han, J Chen
Journal of Parallel and Distributed Computing 71 (9), 1249-1260, 2011
322011
Codee: A tensor embedding scheme for binary code search
J Yang, C Fu, XY Liu, H Yin, P Zhou
IEEE Transactions on Software Engineering 48 (7), 2224-2244, 2021
312021
Evasion attacks to graph neural networks via influence function
B Wang, T Zhou, M Lin, P Zhou, A Li, M Pang, C Fu, H Li, Y Chen
arXiv preprint arXiv:2009.00203, 2020
202020
Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks
C Fu, XY Liu, J Yang, LT Yang, S Yu, T Zhu
IEEE Transactions on Dependable and Secure Computing, 2017
202017
Reinforcement learning-based black-box evasion attacks to link prediction in dynamic graphs
H Fan, B Wang, P Zhou, A Li, Z Xu, C Fu, H Li, Y Chen
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021
172021
Intrusion detection system for IoT heterogeneous perceptual network
M Zhou, L Han, H Lu, C Fu
Mobile networks and applications 26, 1461-1474, 2021
172021
Search engine: The social relationship driving power of Internet of Things
C Fu, C Peng, XY Liu, LT Yang, J Yang, L Han
Future Generation Computer Systems 92, 972-986, 2019
152019
A hybrid game model based on reputation for spectrum allocation in wireless networks
J Chen, S Lian, C Fu, R Du
Computer Communications 33 (14), 1623-1631, 2010
152010
Virtualization of the encryption card for trust access in cloud computing
D Xu, C Fu, G Li, D Zou, H Zhang, XY Liu
IEEE Access 5, 20652-20667, 2017
112017
Task-based behavior detection of illegal codes
L Han, C Fu, D Zou, CH Lee, W Jia
Mathematical and computer modelling 55 (1-2), 80-86, 2012
112012
Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks
L Hong, W Chen, L Gao, G Zhang, C Fu
2010 2nd International Conference on Future Computer and Communication 2, V2 …, 2010
112010
Secure tensor decomposition for heterogeneous multimedia data in cloud computing
C Fu, Z Yang, XY Liu, J Yang, A Walid, LT Yang
IEEE Transactions on Computational Social Systems 7 (1), 247-260, 2020
102020
Malicious code detection model based on behavior association
L Han, M Qian, X Xu, C Fu, H Kwisaba
Tsinghua Science and Technology 19 (5), 508-515, 2014
102014
Grey theory based nodes risk assessment in p2p networks
F Cai, T Fugui, C Yongquan, L Ming, P Bing
2009 IEEE International Symposium on Parallel and Distributed Processing …, 2009
102009
Defending against wormhole attack in OLSR
H Liang, H Fan, F Cai
Geo-spatial Information Science 9 (3), 229-233, 2006
102006
Function-level obfuscation detection method based on graph convolutional networks
S Jiang, Y Hong, C Fu, Y Qian, L Han
Journal of Information Security and Applications 61, 102953, 2021
92021
An optimized static propositional function model to detect software vulnerability
L Han, M Zhou, Y Qian, C Fu, D Zou
IEEE Access 7, 143499-143510, 2019
82019
The impact of the collective influence of search engines on social networks
D Kong, C Fu, J Yang, D Xu, L Han
IEEE Access 5, 24920-24930, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20