Ge Wu

Orcid: 0000-0001-6569-1787

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Nanjing, China
  • Purple Mountain Laboratories, Nanjing, China
  • University of Wollongong, Institute of Cybersecurity and Cryptology, Australia


According to our database1, Ge Wu authored at least 29 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism.
IEEE Internet Things J., January, 2024

2023
DFE-IP: Delegatable functional encryption for inner product.
Inf. Sci., November, 2023

Similarity-based deduplication and secure auditing in IoT decentralized storage.
J. Syst. Archit., September, 2023

A Game Theory Study of Big Data Analytics in Internet of Things.
IEEE Trans. Netw. Serv. Manag., June, 2023

Data release for machine learning via correlated differential privacy.
Inf. Process. Manag., May, 2023

Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing.
Comput. Secur., May, 2023

Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry.
IEEE Trans. Serv. Comput., 2023

Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records.
IEEE Trans. Serv. Comput., 2023

A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023

Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability.
CoRR, 2023

Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data.
IEEE Access, 2023

2022
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022

PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2022

Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.
IEEE Internet Things J., 2022

Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021

ERGA: An Effective Region Gradient Algorithm for Adversarial Example Generation.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs.
IEEE Syst. J., 2020

Certificateless aggregate signature scheme secure against fully chosen-key attacks.
Inf. Sci., 2020

Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020

On the General Construction of Tightly Secure Identity-Based Signature Schemes.
Comput. J., 2020

2019
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
Wirel. Pers. Commun., 2019

Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.
J. Comput. Sci. Technol., 2019

Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019

Generalized public-key cryptography with tight security.
Inf. Sci., 2019

Threshold privacy-preserving cloud auditing with multiple uploaders.
Int. J. Inf. Sec., 2019

2016
Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016

2015
Software Defined Intelligent Building.
Int. J. Inf. Secur. Priv., 2015

2014
Notes on the security of certificateless aggregate signature schemes.
Inf. Sci., 2014


  Loading...