Chunxiang Gu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations.
J. Cloud Comput., December, 2024

2023
Application of Discrete Pruned Enumeration in Solving BDD.
Symmetry, February, 2023

Public-key encryption scheme with optimal continuous leakage resilience.
Inf. Process. Lett., 2023

An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications.
IEEE Internet Things J., 2023

A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023

2022
Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning.
IEICE Trans. Inf. Syst., 2022

Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters.
IACR Cryptol. ePrint Arch., 2022

A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022

Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

2021
CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method.
Sensors, 2021

Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms.
Secur. Commun. Networks, 2021

Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations.
Inf. Technol. Control., 2021

Using SubSieve Technique to Accelerate TupleSieve Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network.
Proceedings of the International Conference on Communications, 2021

2020
A Review of Sieve Algorithms in Solving the Shortest Lattice Vector Problem.
IEEE Access, 2020

Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020

An Efficient Sieve Algorithm with Evolutionary Technique.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve Algorithms.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

A Genetic Algorithm with Restart Strategy for Solving Approximate Shortest Vector Problem.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

An Improved BKW Algorithm For LWE With Binary Uniform Errors.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2019
Model Learning and Model Checking of IPSec Implementations for Internet of Things.
IEEE Access, 2019

An Enumeration-Like Vector Sampling Method for Solving Approximate SVP.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Survey on Blockchain Anomaly Detection Using Data Mining Techniques.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2015
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters.
IACR Cryptol. ePrint Arch., 2015

Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model.
Proceedings of the Cloud Computing and Big Data, 2015

2013
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data.
J. Networks, 2013

A Framework for Automated Security Proof and its Application to OAEP.
J. Networks, 2013

2012
ID-Based Signatures from Lattices in the Random Oracle Model.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

2010
New Efficient Searchable Encryption Schemes from Bilinear Pairings.
Int. J. Netw. Secur., 2010

2009
Automatic Approach of Provable Security and its Application for OAEP+.
IACR Cryptol. ePrint Arch., 2009

2008
Efficienct ID-Based Proxy Blind Signature Schemes from Pairings.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Efficient Public Key Encryption with Keyword Search Schemes from Pairings.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Efficient ID-Based Digital Signatures with Message Recovery.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Certified E-Mail Protocol in the ID-Based Setting.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.
IACR Cryptol. ePrint Arch., 2006

Efficient Public Key Encryption with Keyword Search Schemes from Pairings.
IACR Cryptol. ePrint Arch., 2006

An Efficient ID-based Proxy Signature Scheme from Pairings.
IACR Cryptol. ePrint Arch., 2006

2005
Provable Security of ID-Based Proxy Signature Schemes.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme .
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...