Chong-zhi Gao

Orcid: 0000-0001-7778-6775

Affiliations:
  • Guangzhou University, School of Computer Science, China
  • Sun Yat-Sen University, Institute of Software, Guangzhou, China (PhD 2004)


According to our database1, Chong-zhi Gao authored at least 51 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Two-Round ID-PAKE with strong PFS and single pairing operation.
IACR Cryptol. ePrint Arch., 2024

2023
A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics.
Internet Things, December, 2023

DQN-based resource allocation for NOMA-MEC-aided multi-source data stream.
EURASIP J. Adv. Signal Process., December, 2023

Intelligent computing for WPT-MEC-aided multi-source data stream.
EURASIP J. Adv. Signal Process., 2023

Intelligent resource allocation scheme for cloud-edge-end framework aided multi-source data stream.
EURASIP J. Adv. Signal Process., 2023

GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023

2022
MAS-Encryption and its Applications in Privacy-Preserving Classifiers.
IEEE Trans. Knowl. Data Eng., 2022

Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security.
Phys. Commun., 2022

Task offloading for vehicular edge computing with imperfect CSI: A deep reinforcement approach.
Phys. Commun., 2022

Aitac: an identity-based traceable anonymous communication model.
J. Ambient Intell. Humaniz. Comput., 2022

DQN-based mobile edge computing for smart Internet of vehicle.
EURASIP J. Adv. Signal Process., 2022

N-gram MalGAN: Evading machine learning detection via feature n-gram.
Digit. Commun. Networks, 2022

2021
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021

A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers.
Inf. Sci., 2021

2020
Generating universal adversarial perturbation with ResNet.
Inf. Sci., 2020

New Practical Public-Key Deniable Encryption.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Publicly verifiable privacy-preserving aggregation and its application in IoT.
J. Netw. Comput. Appl., 2019

A crisis information propagation model based on a competitive relation.
J. Ambient Intell. Humaniz. Comput., 2019

Secure Multi-Party Computation: Theory, practice and applications.
Inf. Sci., 2019

Communication-efficient outsourced privacy-preserving classification service using trusted processor.
Inf. Sci., 2019

Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci., 2019

Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement.
Clust. Comput., 2019

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network.
Clust. Comput., 2019

Lattice-based dynamic group signature for anonymous authentication in IoT.
Ann. des Télécommunications, 2019

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing.
IEEE Access, 2019

2018
Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.
Secur. Commun. Networks, 2018

Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018

Privacy-preserving outsourced classification in cloud computing.
Clust. Comput., 2018

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise.
IEEE Access, 2018

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices.
IEEE Access, 2018

Towards Android Application Protection via Kernel Extension.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Model approach to grammatical evolution: deep-structured analyzing of model and representation.
Soft Comput., 2017

Flexible neural trees based early stage identification for IP traffic.
Soft Comput., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Gener. Comput. Syst., 2017

Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Clust. Comput., 2017

A Multi-source Homomorphic Network Coding Signature in the Standard Model.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2015
New biometrics-based authentication scheme for multi-server environment in critical systems.
J. Ambient Intell. Humaniz. Comput., 2015

Analyzing Grammatical Evolution and \pi π Grammatical Evolution with Grammar Model.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

2014
Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014

2012
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Information Security Practice and Experience, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2009
A Further Improved Online/Offline Signature Scheme.
Fundam. Informaticae, 2009

How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurr. Comput. Pract. Exp., 2009

Improved Implementations of Cryptosystems Based on Tate Pairing.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Divisible On-line/Off-line Signatures.
IACR Cryptol. ePrint Arch., 2008

2005
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2003
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...