Gaofei Wu

Orcid: 0000-0002-7843-6520

According to our database1, Gaofei Wu authored at least 28 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Catch the Butterfly: Peeking into the Terms and Conflicts among SPDX Licenses.
CoRR, 2024

2023
Several classes of optimal <i>p</i>-ary cyclic codes with minimum distance four.
Finite Fields Their Appl., December, 2023

New Results on the -1 Conjecture on Cross-Correlation of m-Sequences Based on Complete Permutation Polynomials.
IEEE Trans. Inf. Theory, June, 2023

Cross-Border Data Security from the Perspective of Risk Assessment.
Proceedings of the Information Security Practice and Experience, 2023

2022
Several classes of optimal p-ary cyclic codes with minimal distance four.
CoRR, 2022

A Minimal Disclosure Signature Authentication Scheme Based on Consortium Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Research on Security Assessment of Cross Border Data Flow.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2019
Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI.
IEEE Trans. Mob. Comput., 2019

A New Method to Construct Gloay Complementary Set by Paraunitary Matrices and Hadamard Matrices.
CoRR, 2019

On Boolean functions with several flat spectra.
Cryptogr. Commun., 2019

Several classes of permutation trinomials over 𝔽<sub>5<sup>n</sup></sub> from Niho exponents.
Cryptogr. Commun., 2019

2018
Several classes of negabent functions over finite fields.
Sci. China Inf. Sci., 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

An Approach for Predicting the Popularity of Online Security News Articles.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Several Classes of Permutation Trinomials over F<sub>5s<sup>n</sup></sub> From Niho Exponents.
CoRR, 2017

An Android Vulnerability Detection System.
Proceedings of the Network and System Security - 11th International Conference, 2017

Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Several classes of optimal ternary cyclic codes with minimal distance four.
Finite Fields Their Appl., 2016

New complementary sets of length 2<sup>m</sup> and size 4.
Adv. Math. Commun., 2016

2015
Construction of near-complementary sequences of length n · 2m.
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015

2014
On the PMEPR of Binary Golay Sequences of Length $2^{n}$.
IEEE Trans. Inf. Theory, 2014

Some classes of monomial complete permutation polynomials over finite fields of characteristic two.
Finite Fields Their Appl., 2014

A complementary construction using mutually unbiased bases.
Cryptogr. Commun., 2014

A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

2013
More Classes of Complete Permutation Polynomials over $\F_q$.
CoRR, 2013

2012
Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
New near-complementary sequences with low PMEPR for peak power control in OFDM.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011


  Loading...