Biography

Dr. Shaojing Fu

School of Computer Science

National University of Defense Technology, China

Assistant Professor


Email: shaojing1984@yahoo.cn


Qualifications

2010 Ph.D., Cryptography, National University of Defense Technology, China

2007 M.Tech., Coding and Cryptography, National University of Defense Technology, China

2005 B. E., Applied mathematics


Publications (Selected)

  1. Gao, X., Fu, S., Liu, L., Liu, Z., Luo, Y., Wang, Y. (2026). Euston: Efficient and User-Friendly Secure Transformer Inference with Non-Interactivity. Cryptology ePrint Archive.
  2. Yang, L., Liu, L., Huang, J., Liu, Z., Liang, S., Fu, S., Wang, Y. (2025, November). MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis. In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (pp. 1664-1678).
  3. He, Z., Wang, M., Gao, X., Luo, Y., Liu, L., Fu, S. (2025). ENSI: Efficient Non-Interactive Secure Inference for Large Language Models. arXiv preprint arXiv:2509.09424.
  4. Wang, M., Luo, Y., Chen, Y., Yang, X., He, Z., Fu, S. (2025, July). PPAGAN: a privacy-preserving self-attention GAN framework for image synthesis. In International Conference on Intelligent Computing (pp. 90-105). Singapore: Springer Nature Singapore.
  5. Jiang, W., Luo, Y., Deng, G., Chen, S., Yang, X., Wu, S., Fu, S. (2025). Federated Large Language Models: Feasibility, Robustness, Security and Future Directions. arXiv preprint arXiv:2505.08830.
  6. Wu, S., Luo, Y., Fu, S., Chen, Y., Xu, M. (2025). An Efficient Replication-Based Aggregation Verification and Correctness Assurance Scheme for Federated Learning. IEEE Transactions on Services Computing18(2), 633-646.
  7. Yang, L., Wang, Y., Liu, L., Huang, J., Shi, J., Fu, S., Guo, S. (2025). unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. IEEE Transactions on Information Forensics and Security.
  8. Yang, L., Fu, S., Wang, Y., Liu, L., Luo, Y. (2024). The Analysis of Encrypted Video Stream Based on Low-dimensional Embedding Method. IEEE Transactions on Information Forensics and Security.
  9. Wang, Y., Luo, Y., Qiu, Z., Liu, L., Fu, S. (2024, December). Defend from Scratch: A Diffusion-Based Proactive Defense Method for Unauthorized Speech Synthesis. In International Conference on Neural Information Processing (pp. 1-15). Singapore: Springer Nature Singapore.
  10. Xu, H., Jiang, Z., Wang, Y., Fan, S., Xu, S., Xie, P., Fu, S., Payer, M. (2024, December). Fuzzing JavaScript Engines with a Graph-based IR. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 3734-3748).
  11. Gao, X., Fu, S., Liu, L., Luo, Y. (2024). BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning. Frontiers of Computer Science18(5), 185810.
  12. Xu, H., Liu, L., Zhi, S., Fu, S., Su, Z., Cheng, M. M., Liu, Y. (2024). Enhancing information maximization with distance-aware contrastive learning for source-free cross-domain few-shot learning. IEEE Transactions on Image Processing33, 2058-2073.
  13. Yang, L., Wang, Y., Fu, S., Liu, L., Luo, Y. (2023, September). Evs2vec: A low-dimensional embedding method for encrypted video stream analysis. In 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 537-545). IEEE.
  14. Huang, X., Luo, Y., Liu, L., Zhao, W., Fu, S. (2023). Randomization is all you need: A privacy-preserving federated learning framework for news recommendation. Information Sciences637, 118943.
  15. Sun, Y., Liu, T., Hu, P., Liao, Q., Fu, S., Yu, N., Liu, L. (2023). Deep intellectual property protection: A survey. arXiv preprint arXiv:2304.14613.
  16. Wu, L., Fu, S., Luo, Y., Yan, H., Shi, H., Xu, M. (2023). A robust and lightweight privacy-preserving data aggregation scheme for smart grid. IEEE Transactions on Dependable and Secure Computing21(1), 270-283.
  17. Fan, S., Fu, S., Luo, Y., Xu, H., Zhang, X., Xu, M. (2022, October). Smart contract scams detection with topological data analysis on account interaction. In Proceedings of the 31st ACM International Conference on Information Knowledge Management (pp. 468-477).
  18. Fu, S., Huang, X., Liu, L., Luo, Y. (2022). BFCRI: A blockchain-based framework for crowdsourcing with reputation and incentive. IEEE Transactions on Cloud Computing11(2), 2158-2174.
  19. Wu, L., Xu, M., Fu, S., Luo, Y., Wei, Y. (2021). FPDA: Fault-tolerant and privacy-enhanced data aggregation scheme in fog-assisted smart grid. IEEE Internet of Things Journal9(7), 5254-5265.
  20. Fan, S., Fu, S., Xu, H., Cheng, X. (2021). Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain. Information Processing Management58(4), 102587.
  21. Tang, J., Fu, S., Liu, X., Luo, Y., Xu, M. (2021). Achieving privacy-preserving and lightweight truth discovery in mobile crowdsensing. IEEE Transactions on Knowledge and Data Engineering34(11), 5140-5153.
  22. Yang, L., Fu, S., Luo, Y., Shi, J. (2020, December). Markov probability fingerprints: A method for identifying encrypted video traffic. In 2020 16th International Conference on Mobility, Sensing and Networking (MSN) (pp. 283-290). IEEE.
  23. Fan, S., Fu, S., Xu, H., Zhu, C. (2020, July). Expose your mask: smart Ponzi schemes detection on blockchain. In 2020 international joint Conference on neural networks (IJCNN) (pp. 1-7). IEEE.




Profile Details

https://scholar.google.com/citations?user=oSPgfKMAAAAJ&hl=zh-CN

https://scispace.com/authors/shaojing-fu-2ogq4c4cc5

https://www.researchgate.net/profile/Shaojing-Fu


WoS Researcher ID: DWP-6309-2022

Free SCIRP Newsletters
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top