关注
Gao Chong-zhi
Gao Chong-zhi
Guangzhou University
在 gzhu.edu.cn 的电子邮件经过验证
标题
引用次数
年份
A cloud aided privacy-preserving profile matching scheme in mobile social networks
Q Cheng, CZ Gao
2017 IEEE International Conference on Computational Science and Engineering …, 2017
72017
A crisis information propagation model based on a competitive relation
L Yang, J Wang, C Gao, T Li
Journal of Ambient Intelligence and Humanized Computing 10, 2999-3009, 2019
72019
A further improved online/offline signature scheme
C Gao, Z Yao
Fundamenta Informaticae 91 (3-4), 523-532, 2009
52009
A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers
W Lin, T Yu, C Gao, F Liu, T Li, S Fong, Y Wang
Information Sciences 547, 1045-1065, 2021
152021
A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing
Z Wei, J Li, X Wang, CZ Gao
Ieee Access 7, 62785-62793, 2019
582019
A multi-source homomorphic network coding signature in the standard model
W Chen, H Lei, J Li, C Gao, F Li, K Qi
Green, Pervasive, and Cloud Computing: 12th International Conference, GPC …, 2017
22017
A practical public key encryption scheme based on learning parity with noise
Z Yu, C Gao, Z Jing, BB Gupta, Q Cai
IEEE Access 6, 31918-31923, 2018
352018
A ring signature scheme based on the Nyberg-Rueppel signature scheme
C Gao, Z Yao, L Li
Applied Cryptography and Network Security: First International Conference …, 2003
132003
A secure ciphertext retrieval scheme against insider kgas for mobile devices in cloud storage
R Xie, C He, D Xie, C Gao, X Zhang
Security and Communication Networks 2018, 2018
212018
Adaptively secure on-line/off-line threshold signatures
C Gao, C Tang, Z Yao, D Xie
2009 International Conference on Networks Security, Wireless Communications …, 2009
12009
Aitac: an identity-based traceable anonymous communication model
F Li, Z Liu, Y Wang, N Wu, J Yu, C Gao, H Zhou
Journal of Ambient Intelligence and Humanized Computing, 1-10, 2022
12022
Analyzing Grammatical Evolution and Grammatical Evolution with Grammar Model
P He, Z Deng, C Gao, L Chang, A Hu
Information Technology and Intelligent Transportation Systems: Volume 2 …, 2016
32016
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark
H Ren, A Yan, C Gao, H Yan, Z Zhang, J Li
arXiv preprint arXiv:2405.15161, 2024
2024
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
C Gao, Q Cheng, X Li, S Xia
Cluster Computing 22, 1655-1663, 2019
1162019
Communication-efficient outsourced privacy-preserving classification service using trusted processor
T Li, X Li, X Zhong, N Jiang, C Gao
Information Sciences 505, 473-486, 2019
182019
Constructing Practical Public-Key Deniable Encryption
F Zhang, C Gao
Coverless information hiding based on the molecular structure images of material.
Y Cao, Z Zhou, X Sun, C Gao
Computers, Materials & Continua 54 (2), 2018
1192018
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement
Z Jing, C Gu, Z Yu, P Shi, C Gao
Cluster Computing 22, 1717-1727, 2019
132019
CSE 2017 and EUC 2017 Organizers
JL Gaudiot, H Jin, KC Li, D Xie, J Li, B Chapman, F Palmieri, H Mouftah, ...
Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security
L Zhang, S Lai, J Xia, C Gao, D Fan, J Ou
Physical Communication 55, 101896, 2022
562022
系统目前无法执行此操作,请稍后再试。
文章 1–20