A cloud aided privacy-preserving profile matching scheme in mobile social networks Q Cheng, CZ Gao 2017 IEEE International Conference on Computational Science and Engineering …, 2017 | 7 | 2017 |
A crisis information propagation model based on a competitive relation L Yang, J Wang, C Gao, T Li Journal of Ambient Intelligence and Humanized Computing 10, 2999-3009, 2019 | 7 | 2019 |
A further improved online/offline signature scheme C Gao, Z Yao Fundamenta Informaticae 91 (3-4), 523-532, 2009 | 5 | 2009 |
A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers W Lin, T Yu, C Gao, F Liu, T Li, S Fong, Y Wang Information Sciences 547, 1045-1065, 2021 | 15 | 2021 |
A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing Z Wei, J Li, X Wang, CZ Gao Ieee Access 7, 62785-62793, 2019 | 58 | 2019 |
A multi-source homomorphic network coding signature in the standard model W Chen, H Lei, J Li, C Gao, F Li, K Qi Green, Pervasive, and Cloud Computing: 12th International Conference, GPC …, 2017 | 2 | 2017 |
A practical public key encryption scheme based on learning parity with noise Z Yu, C Gao, Z Jing, BB Gupta, Q Cai IEEE Access 6, 31918-31923, 2018 | 35 | 2018 |
A ring signature scheme based on the Nyberg-Rueppel signature scheme C Gao, Z Yao, L Li Applied Cryptography and Network Security: First International Conference …, 2003 | 13 | 2003 |
A secure ciphertext retrieval scheme against insider kgas for mobile devices in cloud storage R Xie, C He, D Xie, C Gao, X Zhang Security and Communication Networks 2018, 2018 | 21 | 2018 |
Adaptively secure on-line/off-line threshold signatures C Gao, C Tang, Z Yao, D Xie 2009 International Conference on Networks Security, Wireless Communications …, 2009 | 1 | 2009 |
Aitac: an identity-based traceable anonymous communication model F Li, Z Liu, Y Wang, N Wu, J Yu, C Gao, H Zhou Journal of Ambient Intelligence and Humanized Computing, 1-10, 2022 | 1 | 2022 |
Analyzing Grammatical Evolution and Grammatical Evolution with Grammar Model P He, Z Deng, C Gao, L Chang, A Hu Information Technology and Intelligent Transportation Systems: Volume 2 …, 2016 | 3 | 2016 |
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark H Ren, A Yan, C Gao, H Yan, Z Zhang, J Li arXiv preprint arXiv:2405.15161, 2024 | | 2024 |
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network C Gao, Q Cheng, X Li, S Xia Cluster Computing 22, 1655-1663, 2019 | 116 | 2019 |
Communication-efficient outsourced privacy-preserving classification service using trusted processor T Li, X Li, X Zhong, N Jiang, C Gao Information Sciences 505, 473-486, 2019 | 18 | 2019 |
Constructing Practical Public-Key Deniable Encryption F Zhang, C Gao | | |
Coverless information hiding based on the molecular structure images of material. Y Cao, Z Zhou, X Sun, C Gao Computers, Materials & Continua 54 (2), 2018 | 119 | 2018 |
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement Z Jing, C Gu, Z Yu, P Shi, C Gao Cluster Computing 22, 1717-1727, 2019 | 13 | 2019 |
CSE 2017 and EUC 2017 Organizers JL Gaudiot, H Jin, KC Li, D Xie, J Li, B Chapman, F Palmieri, H Mouftah, ... | | |
Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security L Zhang, S Lai, J Xia, C Gao, D Fan, J Ou Physical Communication 55, 101896, 2022 | 56 | 2022 |