default search action
BibTeX records: Chong-zhi Gao
@article{DBLP:journals/corr/abs-2405-15161, author = {Huali Ren and Anli Yan and Chong{-}zhi Gao and Hongyang Yan and Zhenxin Zhang and Jin Li}, title = {Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark}, journal = {CoRR}, volume = {abs/2405.15161}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.15161}, doi = {10.48550/ARXIV.2405.15161}, eprinttype = {arXiv}, eprint = {2405.15161}, timestamp = {Wed, 19 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-15161.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZahednejadG24, author = {Behnam Zahednejad and Chong{-}zhi Gao}, title = {Two-Round {ID-PAKE} with strong {PFS} and single pairing operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2024}, url = {https://eprint.iacr.org/2024/012}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZahednejadG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/LingXZGLB23, author = {Jing Ling and Junjuan Xia and Fusheng Zhu and Chongzhi Gao and Shiwei Lai and Venki Balasubramanian}, title = {DQN-based resource allocation for NOMA-MEC-aided multi-source data stream}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2023}, number = {1}, pages = {44}, year = {2023}, url = {https://doi.org/10.1186/s13634-023-01005-2}, doi = {10.1186/S13634-023-01005-2}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/LingXZGLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/ZhengZXGCL23, author = {Xiangdong Zheng and Fusheng Zhu and Junjuan Xia and Chongzhi Gao and Tao Cui and Shiwei Lai}, title = {Intelligent computing for WPT-MEC-aided multi-source data stream}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2023}, number = {1}, pages = {52}, year = {2023}, url = {https://doi.org/10.1186/s13634-023-01006-1}, doi = {10.1186/S13634-023-01006-1}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/ZhengZXGCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/WuCBXGTL23, author = {Yuxin Wu and Changjun Cai and Xuanming Bi and Junjuan Xia and Chongzhi Gao and Yajuan Tang and Shiwei Lai}, title = {Intelligent resource allocation scheme for cloud-edge-end framework aided multi-source data stream}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2023}, number = {1}, pages = {56}, year = {2023}, url = {https://doi.org/10.1186/s13634-023-01018-x}, doi = {10.1186/S13634-023-01018-X}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/WuCBXGTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/ZahednejadG23, author = {Behnam Zahednejad and Chong{-}zhi Gao}, title = {A secure and efficient {AKE} scheme for IoT devices using {PUF} and cancellable biometrics}, journal = {Internet Things}, volume = {24}, pages = {100937}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100937}, doi = {10.1016/J.IOT.2023.100937}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/ZahednejadG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-15617, author = {Huali Ren and Anli Yan and Xiaojun Ren and Pei{-}Gen Ye and Chong{-}zhi Gao and Zhili Zhou and Jin Li}, title = {GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification}, journal = {CoRR}, volume = {abs/2312.15617}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.15617}, doi = {10.48550/ARXIV.2312.15617}, eprinttype = {arXiv}, eprint = {2312.15617}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-15617.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/ZhuZYCG22, author = {Enmin Zhu and Jianjie Zhang and Jijie Yan and Kongyang Chen and Chongzhi Gao}, title = {N-gram MalGAN: Evading machine learning detection via feature n-gram}, journal = {Digit. Commun. Networks}, volume = {8}, number = {4}, pages = {485--491}, year = {2022}, url = {https://doi.org/10.1016/j.dcan.2021.11.007}, doi = {10.1016/J.DCAN.2021.11.007}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/ZhuZYCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/ZhangZXGZFO22, author = {Lianhong Zhang and Wenqi Zhou and Junjuan Xia and Chongzhi Gao and Fusheng Zhu and Chengyuan Fan and Jiangtao Ou}, title = {DQN-based mobile edge computing for smart Internet of vehicle}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2022}, number = {1}, pages = {45}, year = {2022}, url = {https://doi.org/10.1186/s13634-022-00876-1}, doi = {10.1186/S13634-022-00876-1}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/ZhangZXGZFO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/LiLWWYGZ22, author = {Fengyin Li and Zhongxing Liu and Yilei Wang and Nan Wu and Jiguo Yu and Chongzhi Gao and Huiyu Zhou}, title = {Aitac: an identity-based traceable anonymous communication model}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {3}, pages = {1353--1362}, year = {2022}, url = {https://doi.org/10.1007/s12652-020-02604-9}, doi = {10.1007/S12652-020-02604-9}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/LiLWWYGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/WuXGOFOF22, author = {Yuxin Wu and Junjuan Xia and Chongzhi Gao and Jiangtao Ou and Chengyuan Fan and Jianghong Ou and Dahua Fan}, title = {Task offloading for vehicular edge computing with imperfect {CSI:} {A} deep reinforcement approach}, journal = {Phys. Commun.}, volume = {55}, pages = {101867}, year = {2022}, url = {https://doi.org/10.1016/j.phycom.2022.101867}, doi = {10.1016/J.PHYCOM.2022.101867}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/WuXGOFOF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/ZhangLXGFO22, author = {Lianhong Zhang and Shiwei Lai and Junjuan Xia and Chongzhi Gao and Dahua Fan and Jianghong Ou}, title = {Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security}, journal = {Phys. Commun.}, volume = {55}, pages = {101896}, year = {2022}, url = {https://doi.org/10.1016/j.phycom.2022.101896}, doi = {10.1016/J.PHYCOM.2022.101896}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/ZhangLXGFO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/GaoLXCLD22, author = {Chong{-}zhi Gao and Jin Li and Shi{-}bing Xia and Kim{-}Kwang Raymond Choo and Wenjing Lou and Changyu Dong}, title = {MAS-Encryption and its Applications in Privacy-Preserving Classifiers}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {34}, number = {5}, pages = {2306--2323}, year = {2022}, url = {https://doi.org/10.1109/TKDE.2020.3009221}, doi = {10.1109/TKDE.2020.3009221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/GaoLXCLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LinYGLLFW21, author = {Weiwei Lin and Tianhao Yu and Chongzhi Gao and Fagui Liu and Tengyue Li and Simon Fong and Yongxiang Wang}, title = {A hardware-aware {CPU} power measurement based on the power-exponent function model for cloud servers}, journal = {Inf. Sci.}, volume = {547}, pages = {1045--1065}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.09.033}, doi = {10.1016/J.INS.2020.09.033}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LinYGLLFW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChenLHGYJ21, author = {Wenbin Chen and Jin Li and Zhengan Huang and Chongzhi Gao and Siu{-}Ming Yiu and Zoe Lin Jiang}, title = {Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key}, journal = {J. Comput. Syst. Sci.}, volume = {120}, pages = {137--148}, year = {2021}, url = {https://doi.org/10.1016/j.jcss.2021.03.008}, doi = {10.1016/J.JCSS.2021.03.008}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ChenLHGYJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XuLWZGJ20, author = {Jian Xu and Heng Liu and Dexin Wu and Fucai Zhou and Chong{-}zhi Gao and Linzhi Jiang}, title = {Generating universal adversarial perturbation with ResNet}, journal = {Inf. Sci.}, volume = {537}, pages = {302--312}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.05.099}, doi = {10.1016/J.INS.2020.05.099}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/XuLWZGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CaoZGC20, author = {Yanmei Cao and Fangguo Zhang and Chongzhi Gao and Xiaofeng Chen}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {New Practical Public-Key Deniable Encryption}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {147--163}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_9}, doi = {10.1007/978-3-030-61078-4\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CaoZGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WeiLWG19, author = {Zhijun Wei and Jin Li and Xianmin Wang and Chong{-}Zhi Gao}, title = {A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {62785--62793}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2915794}, doi = {10.1109/ACCESS.2019.2915794}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WeiLWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/XieHXG19, author = {Run Xie and Chanlian He and Chunxiang Xu and Chongzhi Gao}, title = {Lattice-based dynamic group signature for anonymous authentication in IoT}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {74}, number = {7-8}, pages = {531--542}, year = {2019}, url = {https://doi.org/10.1007/s12243-019-00705-x}, doi = {10.1007/S12243-019-00705-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/XieHXG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/GaoCLX19, author = {Chong{-}zhi Gao and Qiong Cheng and Xuan Li and Shi{-}bing Xia}, title = {Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {1655--1663}, year = {2019}, url = {https://doi.org/10.1007/s10586-017-1649-y}, doi = {10.1007/S10586-017-1649-Y}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/GaoCLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/JingGYSG19, author = {Zhengjun Jing and Chunsheng Gu and Zhimin Yu and Peizhong Shi and Chongzhi Gao}, title = {Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {1717--1727}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-2293-x}, doi = {10.1007/S10586-018-2293-X}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/JingGYSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiLYGX19, author = {Xuan Li and Jin Li and Siu{-}Ming Yiu and Chongzhi Gao and Jinbo Xiong}, title = {Privacy-preserving edge-assisted image retrieval and classification in IoT}, journal = {Frontiers Comput. Sci.}, volume = {13}, number = {5}, pages = {1136--1147}, year = {2019}, url = {https://doi.org/10.1007/s11704-018-8067-z}, doi = {10.1007/S11704-018-8067-Z}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LiLYGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhaoZZCGLT19, author = {Chuan Zhao and Shengnan Zhao and Minghao Zhao and Zhenxiang Chen and Chong{-}Zhi Gao and Hongwei Li and Yu{-}an Tan}, title = {Secure Multi-Party Computation: Theory, practice and applications}, journal = {Inf. Sci.}, volume = {476}, pages = {357--372}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.10.024}, doi = {10.1016/J.INS.2018.10.024}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhaoZZCGLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiLZJG19, author = {Tong Li and Xuan Li and Xingyi Zhong and Nan Jiang and Chong{-}zhi Gao}, title = {Communication-efficient outsourced privacy-preserving classification service using trusted processor}, journal = {Inf. Sci.}, volume = {505}, pages = {473--486}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.07.047}, doi = {10.1016/J.INS.2019.07.047}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiLZJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/YangWGL19, author = {Li Yang and Jiaxue Wang and Chongzhi Gao and Tong Li}, title = {A crisis information propagation model based on a competitive relation}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {10}, number = {8}, pages = {2999--3009}, year = {2019}, url = {https://doi.org/10.1007/s12652-018-0744-0}, doi = {10.1007/S12652-018-0744-0}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/YangWGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiGJPS19, author = {Tong Li and Chongzhi Gao and Liaoliang Jiang and Witold Pedrycz and Jian Shen}, title = {Publicly verifiable privacy-preserving aggregation and its application in IoT}, journal = {J. Netw. Comput. Appl.}, volume = {126}, pages = {39--44}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.09.018}, doi = {10.1016/J.JNCA.2018.09.018}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiGJPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YuGJGC18, author = {Zhimin Yu and Chong{-}Zhi Gao and Zhengjun Jing and Brij Bhooshan Gupta and Qiu{-}ru Cai}, title = {A Practical Public Key Encryption Scheme Based on Learning Parity With Noise}, journal = {{IEEE} Access}, volume = {6}, pages = {31918--31923}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2840119}, doi = {10.1109/ACCESS.2018.2840119}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YuGJGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GaoLWWLC18, author = {Chongzhi Gao and Siyi Lv and Yu Wei and Zhi Wang and Zheli Liu and Xiaochun Cheng}, title = {{M-SSE:} An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices}, journal = {{IEEE} Access}, volume = {6}, pages = {38860--38869}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2852329}, doi = {10.1109/ACCESS.2018.2852329}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GaoLWWLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/LiLHGCC18, author = {Ping Li and Jin Li and Zhengan Huang and Chong{-}Zhi Gao and Wenbin Chen and Kai Chen}, title = {Privacy-preserving outsourced classification in cloud computing}, journal = {Clust. Comput.}, volume = {21}, number = {1}, pages = {277--286}, year = {2018}, url = {https://doi.org/10.1007/s10586-017-0849-9}, doi = {10.1007/S10586-017-0849-9}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/LiLHGCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GaoCHSL18, author = {Chong{-}zhi Gao and Qiong Cheng and Pei He and Willy Susilo and Jin Li}, title = {Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack}, journal = {Inf. Sci.}, volume = {444}, pages = {72--88}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.02.058}, doi = {10.1016/J.INS.2018.02.058}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/GaoCHSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XuWZWZG18, author = {Jian Xu and Laiwen Wei and Yu Zhang and Andi Wang and Fucai Zhou and Chong{-}zhi Gao}, title = {Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures}, journal = {J. Netw. Comput. Appl.}, volume = {107}, pages = {113--124}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.01.014}, doi = {10.1016/J.JNCA.2018.01.014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/XuWZWZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieHXGZ18, author = {Run Xie and Chanlian He and Dongqing Xie and Chongzhi Gao and Xiaojun Zhang}, title = {A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7254305:1--7254305:7}, year = {2018}, url = {https://doi.org/10.1155/2018/7254305}, doi = {10.1155/2018/7254305}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XieHXGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiuLLSG18, author = {Yi Liu and Jie Ling and Zhusong Liu and Jian Shen and Chongzhi Gao}, title = {Finger vein secure biometric template generation based on deep learning}, journal = {Soft Comput.}, volume = {22}, number = {7}, pages = {2257--2265}, year = {2018}, url = {https://doi.org/10.1007/s00500-017-2487-9}, doi = {10.1007/S00500-017-2487-9}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiuLLSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangLGHL18, author = {Tuo Wang and Lu Liu and Chongzhi Gao and Jingjing Hu and Jingyu Liu}, editor = {Ting Hu and Feng Wang and Hongwei Li and Qian Wang}, title = {Towards Android Application Protection via Kernel Extension}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11338}, pages = {131--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05234-8\_16}, doi = {10.1007/978-3-030-05234-8\_16}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangLGHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/HanZGHY18, author = {Wencong Han and Quanxin Zhang and Chongzhi Gao and Jingjing Hu and Fang Yan}, editor = {Jaideep Vaidya and Jin Li}, title = {Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {249--259}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_20}, doi = {10.1007/978-3-030-05063-4\_20}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/HanZGHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/CaiYLHG17, author = {Zhaoquan Cai and Hongyang Yan and Ping Li and Zhengan Huang and Chong{-}zhi Gao}, title = {Towards secure and flexible {EHR} sharing in mobile health cloud under static assumptions}, journal = {Clust. Comput.}, volume = {20}, number = {3}, pages = {2415--2422}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0796-5}, doi = {10.1007/S10586-017-0796-5}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/CaiYLHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiLHLGYC17, author = {Ping Li and Jin Li and Zhengan Huang and Tong Li and Chong{-}Zhi Gao and Siu{-}Ming Yiu and Kai Chen}, title = {Multi-key privacy-preserving deep learning in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {74}, pages = {76--85}, year = {2017}, url = {https://doi.org/10.1016/j.future.2017.02.006}, doi = {10.1016/J.FUTURE.2017.02.006}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiLHLGYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ChenPGYCL17, author = {Zhenxiang Chen and Lizhi Peng and Chongzhi Gao and Bo Yang and Yuehui Chen and Jin Li}, title = {Flexible neural trees based early stage identification for {IP} traffic}, journal = {Soft Comput.}, volume = {21}, number = {8}, pages = {2035--2046}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1902-3}, doi = {10.1007/S00500-015-1902-3}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ChenPGYCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/HeDGWL17, author = {Pei He and Zelin Deng and Chongzhi Gao and Xiuni Wang and Jin Li}, title = {Model approach to grammatical evolution: deep-structured analyzing of model and representation}, journal = {Soft Comput.}, volume = {21}, number = {18}, pages = {5413--5423}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2130-1}, doi = {10.1007/S00500-016-2130-1}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/HeDGWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ChengG17, author = {Qiong Cheng and Chong{-}Zhi Gao}, title = {A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 2}, pages = {195--198}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.219}, doi = {10.1109/CSE-EUC.2017.219}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cse/ChengG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/ChenLLGLQ17, author = {Wenbin Chen and Hao Lei and Jin Li and Chongzhi Gao and Fufang Li and Ke Qi}, editor = {Man Ho Allen Au and Arcangelo Castiglione and Kim{-}Kwang Raymond Choo and Francesco Palmieri and Kuan{-}Ching Li}, title = {A Multi-source Homomorphic Network Coding Signature in the Standard Model}, booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference, {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10232}, pages = {66--74}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57186-7\_6}, doi = {10.1007/978-3-319-57186-7\_6}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/ChenLLGLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ShenGHW15, author = {Han Shen and Chongzhi Gao and Debiao He and Libing Wu}, title = {New biometrics-based authentication scheme for multi-server environment in critical systems}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {6}, pages = {825--834}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0305-8}, doi = {10.1007/S12652-015-0305-8}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/ShenGHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itits/HeDGCH15, author = {Pei He and Zelin Deng and Chongzhi Gao and Liang Chang and Achun Hu}, editor = {Valentina Emilia Balas and Lakhmi C. Jain and Xiangmo Zhao}, title = {Analyzing Grammatical Evolution and {\textbackslash}pi {\(\pi\)} Grammatical Evolution with Grammar Model}, booktitle = {Information Technology and Intelligent Transportation Systems - Volume 2, Proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems, {ITITS} 2015, held December 12-13, 2015, Xi'an, China}, series = {Advances in Intelligent Systems and Computing}, volume = {455}, pages = {483--489}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38771-0\_47}, doi = {10.1007/978-3-319-38771-0\_47}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itits/HeDGCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WeiDZZTG14, author = {Baodian Wei and Yusong Du and Huang Zhang and Fangguo Zhang and Haibo Tian and Chong{-}zhi Gao}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Identity Based Threshold Ring Signature from Lattices}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {233--245}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_18}, doi = {10.1007/978-3-319-11698-3\_18}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WeiDZZTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/GaoXLWT12, author = {Chong{-}zhi Gao and Dongqing Xie and Jin Li and Baodian Wei and Haibo Tian}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {377--384}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.88}, doi = {10.1109/INCOS.2012.88}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/GaoXLWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GaoXW12, author = {Chong{-}zhi Gao and Dongqing Xie and Baodian Wei}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {46--62}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_4}, doi = {10.1007/978-3-642-29101-2\_4}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/GaoXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/GaoWXT09, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, title = {How to construct efficient on-line/off-line threshold signature schemes through the simulation approach}, journal = {Concurr. Comput. Pract. Exp.}, volume = {21}, number = {10}, pages = {1351--1372}, year = {2009}, url = {https://doi.org/10.1002/cpe.1438}, doi = {10.1002/CPE.1438}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/GaoWXT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/GaoY09, author = {Chong{-}zhi Gao and Zheng{-}an Yao}, title = {A Further Improved Online/Offline Signature Scheme}, journal = {Fundam. Informaticae}, volume = {91}, number = {3-4}, pages = {523--532}, year = {2009}, url = {https://doi.org/10.3233/FI-2009-0055}, doi = {10.3233/FI-2009-0055}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/GaoY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GaoWXT09, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, editor = {Marc Fischlin}, title = {Divisible On-Line/Off-Line Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {148--163}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_10}, doi = {10.1007/978-3-642-00862-7\_10}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GaoWXT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ZhaoXZGZ09, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Chong{-}zhi Gao and Jingwei Zhang}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Improved Implementations of Cryptosystems Based on Tate Pairing}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {145--151}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_15}, doi = {10.1007/978-3-642-02617-1\_15}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ZhaoXZGZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWXT08, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, title = {Divisible On-line/Off-line Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2008}, url = {http://eprint.iacr.org/2008/447}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaoWXT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GaoY05, author = {Chong{-}zhi Gao and Zheng{-}an Yao}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {How to Authenticate Real Time Streams Using Improved Online/Offline Signatures}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {134--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_12}, doi = {10.1007/11599371\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/GaoY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GaoYL03, author = {Chong{-}zhi Gao and Zheng{-}an Yao and Lei Li}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {169--175}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_13}, doi = {10.1007/978-3-540-45203-4\_13}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GaoYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.