Fei Gao

Orcid: 0000-0002-0020-368X

Affiliations:
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China


According to our database1, Fei Gao authored at least 78 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Hierarchical Fused Quantum Fuzzy Neural Network for Image Classification.
CoRR, 2024

2023
Enhanced covertness class discriminative universal adversarial perturbations.
Neural Networks, August, 2023

Publishing locally private high-dimensional synthetic data efficiently.
Inf. Sci., July, 2023

Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023

Quantum Attacks on 1K-AES and PRINCE.
Comput. J., May, 2023

Quantum discriminative canonical correlation analysis.
Quantum Inf. Process., April, 2023

Practical efficient 1-out-of-n quantum oblivious transfer protocol.
Quantum Inf. Process., February, 2023

Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC Systems.
IEEE Trans. Cloud Comput., 2023

Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds.
IEEE Trans. Cloud Comput., 2023

Improved BV-based quantum attack on block ciphers.
Quantum Inf. Process., 2023

Practical Private Aggregation in Federated Learning Against Inference Attack.
IEEE Internet Things J., 2023

Quantum Attacks on Type-1 Generalized Feistel Schemes.
IACR Cryptol. ePrint Arch., 2023

Quantum Attacks on Beyond-Birthday-Bound MACs.
IACR Cryptol. ePrint Arch., 2023

New record in the number of qubits for a quantum implementation of AES.
IACR Cryptol. ePrint Arch., 2023

2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022

Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022

Cryptanalysis of secure multiparty quantum summation.
Quantum Inf. Process., 2022

Practical quantum contract signing without quantum storage.
Quantum Inf. Process., 2022

Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022

Forward privacy multikeyword ranked search over encrypted database.
Int. J. Intell. Syst., 2022

A rORAM scheme with logarithmic bandwidth and logarithmic locality.
Int. J. Intell. Syst., 2022

Secure and Differentiated Fog-Assisted Data Access for Internet of Things.
Comput. J., 2022

2021
A Secure Online Treatment Blockchain Service.
Wirel. Pers. Commun., 2021

An Improved Quantum Algorithm for Ridge Regression.
IEEE Trans. Knowl. Data Eng., 2021

ESPQuery: An Enhanced Secure Scheme for Privacy-Preserving Query Based on Untrusted Devices in the Internet of Things.
IEEE Internet Things J., 2021

Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage.
Comput. J., 2021

Loading is the Key: A Novel Genetic Quantum Algorithm for SDVRP.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

2020
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features.
Wirel. Commun. Mob. Comput., 2020

An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications.
IEEE Trans. Ind. Informatics, 2020

Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems".
IEEE Trans. Inf. Forensics Secur., 2020

KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020

Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020

N-qudit SLOCC equivalent W states are determined by their bipartite reduced density matrices with tree form.
Quantum Inf. Process., 2020

The effect on (2, N, 2) Bell tests with distributed measurement dependence.
Quantum Inf. Process., 2020

Full quantum one-way function for quantum cryptography.
Quantum Eng., 2020

Error Tolerance Bound in QKD-Based Quantum Private Query.
IEEE J. Sel. Areas Commun., 2020

Self-Testing of Symmetric Three-Qubit States.
IEEE J. Sel. Areas Commun., 2020

New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020

Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020

Practical Attribute-Based Conjunctive Keyword Search Scheme.
Comput. J., 2020

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation.
IEEE Access, 2020

2019
Quantum data compression by principal component analysis.
Quantum Inf. Process., 2019

Practical quantum private query of blocks based on the two-dimensional QKD system.
Quantum Inf. Process., 2019

Using entanglement more efficiently in distinguishing orthogonal product states by LOCC.
Quantum Inf. Process., 2019

The critical detection efficiency for closing the detection loophole of some modified Bell inequalities.
Quantum Inf. Process., 2019

Cryptanalysis of multiparty quantum digital signatures.
Quantum Inf. Process., 2019

Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search.
IACR Cryptol. ePrint Arch., 2019

Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019

Bayesian machine learning for Boltzmann machine in quantum-enhanced feature spaces.
CoRR, 2019

Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures.
Comput. J., 2019

Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication.
IEEE Access, 2019

2018
A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure.
IEEE Trans. Computers, 2018

The randomness in 2 → 1 quantum random access code without a shared reference frame.
Quantum Inf. Process., 2018

Perfect quantum multiple-unicast network coding protocol.
Quantum Inf. Process., 2018

2017
Local indistinguishability of multipartite orthogonal product bases.
Quantum Inf. Process., 2017

2016
Determination of locally perfect discrimination for two-qubit unitary operations.
Quantum Inf. Process., 2016

2015
Local distinguishability of maximally entangled states in canonical form.
Quantum Inf. Process., 2015

Bound on local unambiguous discrimination between multipartite quantum states.
Quantum Inf. Process., 2015

General bounds for quantum discord and discord distance.
Quantum Inf. Process., 2015

Perfect discrimination of projective measurements with the rank of all projectors being one.
Quantum Inf. Process., 2015

Controlling the key by choosing the detection bits in quantum cryptographic protocols.
Sci. China Inf. Sci., 2015

2014
One-way LOCC indistinguishability of maximally entangled states.
Quantum Inf. Process., 2014

Novel multiparty quantum key agreement protocol with GHZ states.
Quantum Inf. Process., 2014

Cryptanalysis of a multi-party quantum key agreement protocol with single particles.
Quantum Inf. Process., 2014

Quantum key agreement with EPR pairs and single-particle measurements.
Quantum Inf. Process., 2014

Post-processing of the oblivious key in quantum private queries.
CoRR, 2014

2013
A watermark strategy for quantum images based on quantum fourier transform.
Quantum Inf. Process., 2013

Efficient quantum private comparison employing single photons and collective detection.
Quantum Inf. Process., 2013

Multiparty quantum key agreement with single particles.
Quantum Inf. Process., 2013

Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states.
Quantum Inf. Process., 2013

Is quantum key distribution suitable for steganography?
Quantum Inf. Process., 2013

2012
Splitting a quantum secret without the assistance of entanglements.
Quantum Inf. Process., 2012

An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2011
Finite-key analysis for quantum key distribution with decoy states.
Quantum Inf. Comput., 2011

2009
Security of quantum secret sharing with two-particle entanglement against individual attacks.
Quantum Inf. Comput., 2009

2007
A simple participant attack on the brádler-dušek protocol.
Quantum Inf. Comput., 2007

2005
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...