Chengjie Gu

Orcid: 0009-0001-6597-168X

According to our database1, Chengjie Gu authored at least 27 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks.
IEEE Trans. Mob. Comput., May, 2024

Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things.
IEEE Internet Things J., April, 2024

Efficient and effective (k, P)-core-based community search over attributed heterogeneous information networks.
Inf. Sci., 2024

2023
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage.
IEEE Trans. Parallel Distributed Syst., December, 2023

AC-SDVN: An Access Control Protocol for Video Multicast in Software Defined Vehicular Networks.
IEEE Trans. Mob. Comput., October, 2023

Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage.
IEEE Trans. Computers, August, 2023

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things.
Ad Hoc Networks, May, 2023

Efficient Batch Authentication Scheme Based on Edge Computing in IIoT.
IEEE Trans. Netw. Serv. Manag., March, 2023

Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023

Multi-factor based session secret key agreement for the Industrial Internet of Things.
Ad Hoc Networks, 2023

2022
Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System.
IEEE Syst. J., 2022

Prediction-based dual-weight switch migration scheme for SDN load balancing.
Comput. Networks, 2022

Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Adaptive Data Transmission and Task Scheduling for High-Definition Map Update.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Graph Neural Networks for Privacy-Preserving Recommendation with Secure Hardware.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Satellite-Guided Non-uniformed Beamforming for Direct Air-to-Ground Communications.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

DDoS Defense Scheme Based on Machine Learning in Software-Defined Networking.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems.
Proceedings of the Database Systems for Advanced Applications, 2021

2020
UniRoam: An Anonymous and Accountable Authentication Scheme for Cross-Domain Access.
Proceedings of the International Conference on Networking and Network Applications, 2020

2018
End-Link Collaboration Control Mechanism in Intelligent Networks Based on Traffic Classification.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

2011
Realtime Encrypted Traffic Identification using Machine Learning.
J. Softw., 2011

Pricing Incentive Mechanism based on Multi-stages Traffic Classification Methodology for QoS-enabled Networks.
J. Networks, 2011

Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Online Internet Intrusion Detection Based on Flow Statistical Characteristics.
Proceedings of the Knowledge Science, Engineering and Management, 2011

2010
A Novel Trust Management Model for P2P Network with Reputation and Risk Evaluation.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...