BibTeX records: Chong-zhi Gao

download as .bib file

@article{DBLP:journals/corr/abs-2405-15161,
  author       = {Huali Ren and
                  Anli Yan and
                  Chong{-}zhi Gao and
                  Hongyang Yan and
                  Zhenxin Zhang and
                  Jin Li},
  title        = {Are You Copying My Prompt? Protecting the Copyright of Vision Prompt
                  for VPaaS via Watermark},
  journal      = {CoRR},
  volume       = {abs/2405.15161},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.15161},
  doi          = {10.48550/ARXIV.2405.15161},
  eprinttype    = {arXiv},
  eprint       = {2405.15161},
  timestamp    = {Wed, 19 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-15161.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZahednejadG24,
  author       = {Behnam Zahednejad and
                  Chong{-}zhi Gao},
  title        = {Two-Round {ID-PAKE} with strong {PFS} and single pairing operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/012},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZahednejadG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/LingXZGLB23,
  author       = {Jing Ling and
                  Junjuan Xia and
                  Fusheng Zhu and
                  Chongzhi Gao and
                  Shiwei Lai and
                  Venki Balasubramanian},
  title        = {DQN-based resource allocation for NOMA-MEC-aided multi-source data
                  stream},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2023},
  number       = {1},
  pages        = {44},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13634-023-01005-2},
  doi          = {10.1186/S13634-023-01005-2},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/LingXZGLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/ZhengZXGCL23,
  author       = {Xiangdong Zheng and
                  Fusheng Zhu and
                  Junjuan Xia and
                  Chongzhi Gao and
                  Tao Cui and
                  Shiwei Lai},
  title        = {Intelligent computing for WPT-MEC-aided multi-source data stream},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2023},
  number       = {1},
  pages        = {52},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13634-023-01006-1},
  doi          = {10.1186/S13634-023-01006-1},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/ZhengZXGCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/WuCBXGTL23,
  author       = {Yuxin Wu and
                  Changjun Cai and
                  Xuanming Bi and
                  Junjuan Xia and
                  Chongzhi Gao and
                  Yajuan Tang and
                  Shiwei Lai},
  title        = {Intelligent resource allocation scheme for cloud-edge-end framework
                  aided multi-source data stream},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2023},
  number       = {1},
  pages        = {56},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13634-023-01018-x},
  doi          = {10.1186/S13634-023-01018-X},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/WuCBXGTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/ZahednejadG23,
  author       = {Behnam Zahednejad and
                  Chong{-}zhi Gao},
  title        = {A secure and efficient {AKE} scheme for IoT devices using {PUF} and
                  cancellable biometrics},
  journal      = {Internet Things},
  volume       = {24},
  pages        = {100937},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100937},
  doi          = {10.1016/J.IOT.2023.100937},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/ZahednejadG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-15617,
  author       = {Huali Ren and
                  Anli Yan and
                  Xiaojun Ren and
                  Pei{-}Gen Ye and
                  Chong{-}zhi Gao and
                  Zhili Zhou and
                  Jin Li},
  title        = {GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network
                  Ownership Verification},
  journal      = {CoRR},
  volume       = {abs/2312.15617},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.15617},
  doi          = {10.48550/ARXIV.2312.15617},
  eprinttype    = {arXiv},
  eprint       = {2312.15617},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-15617.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/ZhuZYCG22,
  author       = {Enmin Zhu and
                  Jianjie Zhang and
                  Jijie Yan and
                  Kongyang Chen and
                  Chongzhi Gao},
  title        = {N-gram MalGAN: Evading machine learning detection via feature n-gram},
  journal      = {Digit. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {485--491},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.dcan.2021.11.007},
  doi          = {10.1016/J.DCAN.2021.11.007},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/ZhuZYCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/ZhangZXGZFO22,
  author       = {Lianhong Zhang and
                  Wenqi Zhou and
                  Junjuan Xia and
                  Chongzhi Gao and
                  Fusheng Zhu and
                  Chengyuan Fan and
                  Jiangtao Ou},
  title        = {DQN-based mobile edge computing for smart Internet of vehicle},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2022},
  number       = {1},
  pages        = {45},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13634-022-00876-1},
  doi          = {10.1186/S13634-022-00876-1},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/ZhangZXGZFO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/LiLWWYGZ22,
  author       = {Fengyin Li and
                  Zhongxing Liu and
                  Yilei Wang and
                  Nan Wu and
                  Jiguo Yu and
                  Chongzhi Gao and
                  Huiyu Zhou},
  title        = {Aitac: an identity-based traceable anonymous communication model},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {1353--1362},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12652-020-02604-9},
  doi          = {10.1007/S12652-020-02604-9},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/LiLWWYGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/WuXGOFOF22,
  author       = {Yuxin Wu and
                  Junjuan Xia and
                  Chongzhi Gao and
                  Jiangtao Ou and
                  Chengyuan Fan and
                  Jianghong Ou and
                  Dahua Fan},
  title        = {Task offloading for vehicular edge computing with imperfect {CSI:}
                  {A} deep reinforcement approach},
  journal      = {Phys. Commun.},
  volume       = {55},
  pages        = {101867},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.phycom.2022.101867},
  doi          = {10.1016/J.PHYCOM.2022.101867},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/WuXGOFOF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/ZhangLXGFO22,
  author       = {Lianhong Zhang and
                  Shiwei Lai and
                  Junjuan Xia and
                  Chongzhi Gao and
                  Dahua Fan and
                  Jianghong Ou},
  title        = {Deep reinforcement learning based IRS-assisted mobile edge computing
                  under physical-layer security},
  journal      = {Phys. Commun.},
  volume       = {55},
  pages        = {101896},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.phycom.2022.101896},
  doi          = {10.1016/J.PHYCOM.2022.101896},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/ZhangLXGFO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/GaoLXCLD22,
  author       = {Chong{-}zhi Gao and
                  Jin Li and
                  Shi{-}bing Xia and
                  Kim{-}Kwang Raymond Choo and
                  Wenjing Lou and
                  Changyu Dong},
  title        = {MAS-Encryption and its Applications in Privacy-Preserving Classifiers},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {34},
  number       = {5},
  pages        = {2306--2323},
  year         = {2022},
  url          = {https://doi.org/10.1109/TKDE.2020.3009221},
  doi          = {10.1109/TKDE.2020.3009221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/GaoLXCLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LinYGLLFW21,
  author       = {Weiwei Lin and
                  Tianhao Yu and
                  Chongzhi Gao and
                  Fagui Liu and
                  Tengyue Li and
                  Simon Fong and
                  Yongxiang Wang},
  title        = {A hardware-aware {CPU} power measurement based on the power-exponent
                  function model for cloud servers},
  journal      = {Inf. Sci.},
  volume       = {547},
  pages        = {1045--1065},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.09.033},
  doi          = {10.1016/J.INS.2020.09.033},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LinYGLLFW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChenLHGYJ21,
  author       = {Wenbin Chen and
                  Jin Li and
                  Zhengan Huang and
                  Chongzhi Gao and
                  Siu{-}Ming Yiu and
                  Zoe Lin Jiang},
  title        = {Lattice-based unidirectional infinite-use proxy re-signatures with
                  private re-signature key},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {120},
  pages        = {137--148},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jcss.2021.03.008},
  doi          = {10.1016/J.JCSS.2021.03.008},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/ChenLHGYJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XuLWZGJ20,
  author       = {Jian Xu and
                  Heng Liu and
                  Dexin Wu and
                  Fucai Zhou and
                  Chong{-}zhi Gao and
                  Linzhi Jiang},
  title        = {Generating universal adversarial perturbation with ResNet},
  journal      = {Inf. Sci.},
  volume       = {537},
  pages        = {302--312},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.05.099},
  doi          = {10.1016/J.INS.2020.05.099},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/XuLWZGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaoZGC20,
  author       = {Yanmei Cao and
                  Fangguo Zhang and
                  Chongzhi Gao and
                  Xiaofeng Chen},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {New Practical Public-Key Deniable Encryption},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_9},
  doi          = {10.1007/978-3-030-61078-4\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CaoZGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WeiLWG19,
  author       = {Zhijun Wei and
                  Jin Li and
                  Xianmin Wang and
                  Chong{-}Zhi Gao},
  title        = {A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure
                  Outsourcing Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {62785--62793},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2915794},
  doi          = {10.1109/ACCESS.2019.2915794},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WeiLWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/XieHXG19,
  author       = {Run Xie and
                  Chanlian He and
                  Chunxiang Xu and
                  Chongzhi Gao},
  title        = {Lattice-based dynamic group signature for anonymous authentication
                  in IoT},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {74},
  number       = {7-8},
  pages        = {531--542},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12243-019-00705-x},
  doi          = {10.1007/S12243-019-00705-X},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/XieHXG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/GaoCLX19,
  author       = {Chong{-}zhi Gao and
                  Qiong Cheng and
                  Xuan Li and
                  Shi{-}bing Xia},
  title        = {Cloud-assisted privacy-preserving profile-matching scheme under multiple
                  keys in mobile social network},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {1655--1663},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-017-1649-y},
  doi          = {10.1007/S10586-017-1649-Y},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/GaoCLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/JingGYSG19,
  author       = {Zhengjun Jing and
                  Chunsheng Gu and
                  Zhimin Yu and
                  Peizhong Shi and
                  Chongzhi Gao},
  title        = {Cryptanalysis of lattice-based key exchange on small integer solution
                  problem and its improvement},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {1717--1727},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-2293-x},
  doi          = {10.1007/S10586-018-2293-X},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/JingGYSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiLYGX19,
  author       = {Xuan Li and
                  Jin Li and
                  Siu{-}Ming Yiu and
                  Chongzhi Gao and
                  Jinbo Xiong},
  title        = {Privacy-preserving edge-assisted image retrieval and classification
                  in IoT},
  journal      = {Frontiers Comput. Sci.},
  volume       = {13},
  number       = {5},
  pages        = {1136--1147},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11704-018-8067-z},
  doi          = {10.1007/S11704-018-8067-Z},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiLYGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhaoZZCGLT19,
  author       = {Chuan Zhao and
                  Shengnan Zhao and
                  Minghao Zhao and
                  Zhenxiang Chen and
                  Chong{-}Zhi Gao and
                  Hongwei Li and
                  Yu{-}an Tan},
  title        = {Secure Multi-Party Computation: Theory, practice and applications},
  journal      = {Inf. Sci.},
  volume       = {476},
  pages        = {357--372},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.10.024},
  doi          = {10.1016/J.INS.2018.10.024},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhaoZZCGLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiLZJG19,
  author       = {Tong Li and
                  Xuan Li and
                  Xingyi Zhong and
                  Nan Jiang and
                  Chong{-}zhi Gao},
  title        = {Communication-efficient outsourced privacy-preserving classification
                  service using trusted processor},
  journal      = {Inf. Sci.},
  volume       = {505},
  pages        = {473--486},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.07.047},
  doi          = {10.1016/J.INS.2019.07.047},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiLZJG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/YangWGL19,
  author       = {Li Yang and
                  Jiaxue Wang and
                  Chongzhi Gao and
                  Tong Li},
  title        = {A crisis information propagation model based on a competitive relation},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {10},
  number       = {8},
  pages        = {2999--3009},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12652-018-0744-0},
  doi          = {10.1007/S12652-018-0744-0},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/YangWGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiGJPS19,
  author       = {Tong Li and
                  Chongzhi Gao and
                  Liaoliang Jiang and
                  Witold Pedrycz and
                  Jian Shen},
  title        = {Publicly verifiable privacy-preserving aggregation and its application
                  in IoT},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {126},
  pages        = {39--44},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.09.018},
  doi          = {10.1016/J.JNCA.2018.09.018},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiGJPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuGJGC18,
  author       = {Zhimin Yu and
                  Chong{-}Zhi Gao and
                  Zhengjun Jing and
                  Brij Bhooshan Gupta and
                  Qiu{-}ru Cai},
  title        = {A Practical Public Key Encryption Scheme Based on Learning Parity
                  With Noise},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {31918--31923},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2840119},
  doi          = {10.1109/ACCESS.2018.2840119},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YuGJGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GaoLWWLC18,
  author       = {Chongzhi Gao and
                  Siyi Lv and
                  Yu Wei and
                  Zhi Wang and
                  Zheli Liu and
                  Xiaochun Cheng},
  title        = {{M-SSE:} An Effective Searchable Symmetric Encryption With Enhanced
                  Security for Mobile Devices},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {38860--38869},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2852329},
  doi          = {10.1109/ACCESS.2018.2852329},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GaoLWWLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/LiLHGCC18,
  author       = {Ping Li and
                  Jin Li and
                  Zhengan Huang and
                  Chong{-}Zhi Gao and
                  Wenbin Chen and
                  Kai Chen},
  title        = {Privacy-preserving outsourced classification in cloud computing},
  journal      = {Clust. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {277--286},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10586-017-0849-9},
  doi          = {10.1007/S10586-017-0849-9},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/LiLHGCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GaoCHSL18,
  author       = {Chong{-}zhi Gao and
                  Qiong Cheng and
                  Pei He and
                  Willy Susilo and
                  Jin Li},
  title        = {Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison
                  attack},
  journal      = {Inf. Sci.},
  volume       = {444},
  pages        = {72--88},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.02.058},
  doi          = {10.1016/J.INS.2018.02.058},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/GaoCHSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XuWZWZG18,
  author       = {Jian Xu and
                  Laiwen Wei and
                  Yu Zhang and
                  Andi Wang and
                  Fucai Zhou and
                  Chong{-}zhi Gao},
  title        = {Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight
                  streaming authenticated data structures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {107},
  pages        = {113--124},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.01.014},
  doi          = {10.1016/J.JNCA.2018.01.014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/XuWZWZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieHXGZ18,
  author       = {Run Xie and
                  Chanlian He and
                  Dongqing Xie and
                  Chongzhi Gao and
                  Xiaojun Zhang},
  title        = {A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile
                  Devices in Cloud Storage},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7254305:1--7254305:7},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7254305},
  doi          = {10.1155/2018/7254305},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XieHXGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiuLLSG18,
  author       = {Yi Liu and
                  Jie Ling and
                  Zhusong Liu and
                  Jian Shen and
                  Chongzhi Gao},
  title        = {Finger vein secure biometric template generation based on deep learning},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {7},
  pages        = {2257--2265},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-017-2487-9},
  doi          = {10.1007/S00500-017-2487-9},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiuLLSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangLGHL18,
  author       = {Tuo Wang and
                  Lu Liu and
                  Chongzhi Gao and
                  Jingjing Hu and
                  Jingyu Liu},
  editor       = {Ting Hu and
                  Feng Wang and
                  Hongwei Li and
                  Qian Wang},
  title        = {Towards Android Application Protection via Kernel Extension},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} 2018
                  International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11338},
  pages        = {131--137},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05234-8\_16},
  doi          = {10.1007/978-3-030-05234-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangLGHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/HanZGHY18,
  author       = {Wencong Han and
                  Quanxin Zhang and
                  Chongzhi Gao and
                  Jingjing Hu and
                  Fang Yan},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller
                  Firmware},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11337},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_20},
  doi          = {10.1007/978-3-030-05063-4\_20},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/HanZGHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/CaiYLHG17,
  author       = {Zhaoquan Cai and
                  Hongyang Yan and
                  Ping Li and
                  Zhengan Huang and
                  Chong{-}zhi Gao},
  title        = {Towards secure and flexible {EHR} sharing in mobile health cloud under
                  static assumptions},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2415--2422},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0796-5},
  doi          = {10.1007/S10586-017-0796-5},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/CaiYLHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLHLGYC17,
  author       = {Ping Li and
                  Jin Li and
                  Zhengan Huang and
                  Tong Li and
                  Chong{-}Zhi Gao and
                  Siu{-}Ming Yiu and
                  Kai Chen},
  title        = {Multi-key privacy-preserving deep learning in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {74},
  pages        = {76--85},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2017.02.006},
  doi          = {10.1016/J.FUTURE.2017.02.006},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiLHLGYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ChenPGYCL17,
  author       = {Zhenxiang Chen and
                  Lizhi Peng and
                  Chongzhi Gao and
                  Bo Yang and
                  Yuehui Chen and
                  Jin Li},
  title        = {Flexible neural trees based early stage identification for {IP} traffic},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {8},
  pages        = {2035--2046},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1902-3},
  doi          = {10.1007/S00500-015-1902-3},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ChenPGYCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/HeDGWL17,
  author       = {Pei He and
                  Zelin Deng and
                  Chongzhi Gao and
                  Xiuni Wang and
                  Jin Li},
  title        = {Model approach to grammatical evolution: deep-structured analyzing
                  of model and representation},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {18},
  pages        = {5413--5423},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2130-1},
  doi          = {10.1007/S00500-016-2130-1},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/HeDGWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/ChengG17,
  author       = {Qiong Cheng and
                  Chong{-}Zhi Gao},
  title        = {A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile
                  Social Networks},
  booktitle    = {2017 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24,
                  2017, Volume 2},
  pages        = {195--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSE-EUC.2017.219},
  doi          = {10.1109/CSE-EUC.2017.219},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cse/ChengG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/ChenLLGLQ17,
  author       = {Wenbin Chen and
                  Hao Lei and
                  Jin Li and
                  Chongzhi Gao and
                  Fufang Li and
                  Ke Qi},
  editor       = {Man Ho Allen Au and
                  Arcangelo Castiglione and
                  Kim{-}Kwang Raymond Choo and
                  Francesco Palmieri and
                  Kuan{-}Ching Li},
  title        = {A Multi-source Homomorphic Network Coding Signature in the Standard
                  Model},
  booktitle    = {Green, Pervasive, and Cloud Computing - 12th International Conference,
                  {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10232},
  pages        = {66--74},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57186-7\_6},
  doi          = {10.1007/978-3-319-57186-7\_6},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/ChenLLGLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/ShenGHW15,
  author       = {Han Shen and
                  Chongzhi Gao and
                  Debiao He and
                  Libing Wu},
  title        = {New biometrics-based authentication scheme for multi-server environment
                  in critical systems},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {825--834},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12652-015-0305-8},
  doi          = {10.1007/S12652-015-0305-8},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/ShenGHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itits/HeDGCH15,
  author       = {Pei He and
                  Zelin Deng and
                  Chongzhi Gao and
                  Liang Chang and
                  Achun Hu},
  editor       = {Valentina Emilia Balas and
                  Lakhmi C. Jain and
                  Xiangmo Zhao},
  title        = {Analyzing Grammatical Evolution and {\textbackslash}pi {\(\pi\)} Grammatical
                  Evolution with Grammar Model},
  booktitle    = {Information Technology and Intelligent Transportation Systems - Volume
                  2, Proceedings of the 2015 International Conference on Information
                  Technology and Intelligent Transportation Systems, {ITITS} 2015, held
                  December 12-13, 2015, Xi'an, China},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {455},
  pages        = {483--489},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38771-0\_47},
  doi          = {10.1007/978-3-319-38771-0\_47},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itits/HeDGCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WeiDZZTG14,
  author       = {Baodian Wei and
                  Yusong Du and
                  Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Chong{-}zhi Gao},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Identity Based Threshold Ring Signature from Lattices},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {233--245},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_18},
  doi          = {10.1007/978-3-319-11698-3\_18},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WeiDZZTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/GaoXLWT12,
  author       = {Chong{-}zhi Gao and
                  Dongqing Xie and
                  Jin Li and
                  Baodian Wei and
                  Haibo Tian},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Deniably Information-Hiding Encryptions Secure against Adaptive Chosen
                  Ciphertext Attack},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {377--384},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.88},
  doi          = {10.1109/INCOS.2012.88},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/GaoXLWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GaoXW12,
  author       = {Chong{-}zhi Gao and
                  Dongqing Xie and
                  Baodian Wei},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {46--62},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_4},
  doi          = {10.1007/978-3-642-29101-2\_4},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/GaoXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/GaoWXT09,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  title        = {How to construct efficient on-line/off-line threshold signature schemes
                  through the simulation approach},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {21},
  number       = {10},
  pages        = {1351--1372},
  year         = {2009},
  url          = {https://doi.org/10.1002/cpe.1438},
  doi          = {10.1002/CPE.1438},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/GaoWXT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/GaoY09,
  author       = {Chong{-}zhi Gao and
                  Zheng{-}an Yao},
  title        = {A Further Improved Online/Offline Signature Scheme},
  journal      = {Fundam. Informaticae},
  volume       = {91},
  number       = {3-4},
  pages        = {523--532},
  year         = {2009},
  url          = {https://doi.org/10.3233/FI-2009-0055},
  doi          = {10.3233/FI-2009-0055},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/GaoY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GaoWXT09,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  editor       = {Marc Fischlin},
  title        = {Divisible On-Line/Off-Line Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {148--163},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_10},
  doi          = {10.1007/978-3-642-00862-7\_10},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GaoWXT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ZhaoXZGZ09,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Chong{-}zhi Gao and
                  Jingwei Zhang},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Improved Implementations of Cryptosystems Based on Tate Pairing},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {145--151},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_15},
  doi          = {10.1007/978-3-642-02617-1\_15},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ZhaoXZGZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWXT08,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  title        = {Divisible On-line/Off-line Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/447},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWXT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GaoY05,
  author       = {Chong{-}zhi Gao and
                  Zheng{-}an Yao},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {How to Authenticate Real Time Streams Using Improved Online/Offline
                  Signatures},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {134--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_12},
  doi          = {10.1007/11599371\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GaoY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GaoYL03,
  author       = {Chong{-}zhi Gao and
                  Zheng{-}an Yao and
                  Lei Li},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {169--175},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_13},
  doi          = {10.1007/978-3-540-45203-4\_13},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GaoYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}