Juntao Gao

Orcid: 0000-0001-8309-2200

According to our database1, Juntao Gao authored at least 84 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values.
IET Blockchain, March, 2024

Ciphertext face recognition system based on secure inner product protocol.
J. Inf. Secur. Appl., February, 2024

2023
A polynomial system for bit-based division property solving by quantum algorithm.
Quantum Inf. Process., December, 2023

Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing.
J. Cloud Comput., December, 2023

Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
J. Cloud Comput., December, 2023

Introduction to bioimaging-based spatial multi-omic novel methods.
Quant. Biol., September, 2023

SPOC online video learning clustering analysis: Identifying learners' group behavior characteristics.
Comput. Appl. Eng. Educ., July, 2023

Privacy preserving via multi-key homomorphic encryption in cloud computing.
J. Inf. Secur. Appl., May, 2023

Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak.
Quantum Inf. Comput., 2023

New Quantum Search Model on Symmetric Ciphers and Its Applications.
IACR Cryptol. ePrint Arch., 2023

PF-HCPS: Extending Problem Frames for Supporting Human-Cyber-Physical System Collaboration.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

RapidMS: A Tool for Supporting Rapid Microservices Generation and Refinement from Requirements Model.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023

InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements Validation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

2022
Leakage-Suppressed Range Query Scheme for Structured Data in IoT.
IEEE Syst. J., 2022

AES-128 under HHL algorithm.
Quantum Inf. Comput., 2022

Cross-domain person re-identification based on background suppression and identity consistency.
IET Image Process., 2022

Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting.
IACR Cryptol. ePrint Arch., 2022

A secure and efficient certificateless signature scheme for Internet of Things.
Ad Hoc Networks, 2022

Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments.
IEEE Trans. Dependable Secur. Comput., 2021

Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption.
IEEE Syst. J., 2021

Quantum security of Grain-128/Grain-128a stream cipher against HHL algorithm.
Quantum Inf. Process., 2021

An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information.
J. Inf. Process., 2021

MHB*T based dynamic data integrity auditing in cloud storage.
Clust. Comput., 2021

An Efficient Data Auditing Protocol With a Novel Sampling Verification Algorithm.
IEEE Access, 2021

Implementation of a Federated Large-Scale Remote Sensing Data Sharing Platform.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
Secure, fair and instant data trading scheme based on bitcoin.
J. Inf. Secur. Appl., 2020

Blockchain-Based Anti-Key-Leakage Key Aggregation Searchable Encryption for IoT.
IEEE Internet Things J., 2020

Regular Expression Learning from Positive Examples Based on Integer Programming.
Int. J. Softw. Eng. Knowl. Eng., 2020

Secure hierarchical authentication protocol in VANET.
IET Inf. Secur., 2020

Enabling efficient process mining on large data sets: realizing an in-database process mining operator.
Distributed Parallel Databases, 2020

2019
Secure Payment System Utilizing MANET for Disaster Areas.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Group-Sparsity-Based Super-Resolution Dipole Orientation Mapping.
IEEE Trans. Medical Imaging, 2019

Secure Electronic Ticketing System based on Consortium Blockchain.
KSII Trans. Internet Inf. Syst., 2019

Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s).
J. Inf. Secur. Appl., 2019

Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security.
Int. J. Netw. Secur., 2019

Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin.
Int. J. Netw. Secur., 2019

MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions.
Future Gener. Comput. Syst., 2019

Adaptive Traffic Control Algorithm Based on Back-Pressure and Q-Learning.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

A Novel Fair and Verifiable Data Trading Scheme.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2018
Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks.
J. Inf. Process., 2018

A Regulation Scheme Based on the Ciphertext-Policy Hierarchical Attribute-Based Encryption in Bitcoin System.
IEEE Access, 2018

DE MERVLs are Enriched Around Two-Cell-Specific Genes During Zygotic Genome Activation in Mouse.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Back-Pressure Based Adaptive Traffic Signal Control and Vehicle Routing with Real-Time Control Information Update.
Proceedings of the 2018 IEEE International Conference on Vehicular Electronics and Safety, 2018

Bias Based General Framework for Delay Reduction in Backpressure Routing Algorithm.
Proceedings of the 2018 International Conference on Computing, 2018

Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

A Novel Digital Rights Management in P2P Networks Based on Bitcoin System.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
HiC-3DViewer: a new tool to visualize Hi-C data in 3D space.
Quant. Biol., 2017

Web3DMol: interactive protein structure visualization based on WebGL.
Nucleic Acids Res., 2017

Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction.
CoRR, 2017

Adaptive Traffic Signal Control: Deep Reinforcement Learning Algorithm with Experience Replay and Target Network.
CoRR, 2017

Relational Algebra for In-Database Process Mining.
CoRR, 2017

Anonymous Fair Exchange Protocol with a Semitrusted Third Party.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Multi-use unidirectional lattice-based proxy re-signatures in standard model.
Secur. Commun. Networks, 2016

Developing bioimaging and quantitative methods to study 3D genome.
Quant. Biol., 2016

Efficient identity-based signature over NTRU lattice.
Frontiers Inf. Technol. Electron. Eng., 2016

Efficient Certificateless Signature Scheme on NTRU Lattice.
KSII Trans. Internet Inf. Syst., 2016

Optimal scheduling for incentive WiFi offloading under energy constraint.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

2015
A novel method to identify topological domains using Hi-C data.
Quant. Biol., 2015

End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach.
Ad Hoc Sens. Wirel. Networks, 2015

Source delay in mobile ad hoc networks.
Ad Hoc Networks, 2015

An Endorsement-Based Mobile Payment System for a Disaster Area.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Delay control in MANETs with erasure coding and f-cast relay.
Wirel. Networks, 2014

Joint encryption and compressed sensing in smart grid data transmission.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Throughput Capacity of MANETs with Group-Based Scheduling and General Transmission Range.
IEICE Trans. Commun., 2013

Source Delay in Mobile Ad Hoc Networks.
CoRR, 2013

Delay modeling for broadcast-based two-hop relay MANETs.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

2012
Capacity and Delay of Probing-Based Two-Hop Relay in MANETs.
IEEE Trans. Wirel. Commun., 2012

Linear spans of optimal sets of frequency hopping sequences.
RAIRO Theor. Informatics Appl., 2012

Fault analysis of Trivium.
Des. Codes Cryptogr., 2012

Exact capacity study for a class of MANETs.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Probing-based two-hop relay with limited packet redundancy.
Proceedings of the 13th IEEE International Conference on High Performance Switching and Routing, 2012

2011
Lower Bounds on the Second Order nonlinearity of Boolean Functions.
Int. J. Found. Comput. Sci., 2011

On the value distributions of Walsh spectrums of quadratic Plateaued functions.
Comput. Electr. Eng., 2011

Linear Complexities of the Frequency Hopping Sequences in Two Optimal Sets.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions.
IACR Cryptol. ePrint Arch., 2010

2009
Floating Fault analysis of Trivium under Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2009

On Measuring Semantic Similarity of Business Process Models.
Proceedings of the International Conference on Interoperability for Enterprise Software and Applications China, 2009

2008
Decision Support in Procuring Requirements for ERP Software.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Decision Support for Handling Gaps between ERP Functionalities and Organizational Needs: A Goal Reasoning Based Approach.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Procuring Requirements for ERP Software Based on Semantic Similarity.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

2005
ID-Based Threshold Unsigncryption Scheme from Pairings.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Assessing The Similarity of Spatial Configurations Using Distance Differences and Bending Energy: Application To Chromosomal Interphase Arrangements In HeLa Cell Clones.
Proceedings of the 2004 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2004


  Loading...