Ke Gu

Orcid: 0000-0002-0793-5218

Affiliations:
  • ChangSha University of Science and Technology, School of Computer and Communication Engineering,, China
  • Central South University, School of Information Science and Engineering, Changsha, China (PhD 2012)


According to our database1, Ke Gu authored at least 46 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT.
IEEE Trans. Ind. Informatics, March, 2024

2023
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification.
IEEE Trans. Netw. Serv. Manag., December, 2023

Fed_ADBN: An efficient intrusion detection framework based on client selection in AMI network.
Expert Syst. J. Knowl. Eng., May, 2023

An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Adaptive Area-Based Traffic Congestion Control and Management Scheme Based on Fog Computing.
IEEE Trans. Intell. Transp. Syst., January, 2023

Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism.
IEEE Trans. Sustain. Comput., 2023

2022
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs.
ACM Trans. Internet Techn., November, 2022

Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs.
IEEE Trans. Netw. Serv. Manag., 2022

Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption.
IEEE Trans. Netw. Serv. Manag., 2022

Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs.
IEEE Trans. Netw. Sci. Eng., 2022

Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022

Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System.
IEEE Trans. Green Commun. Netw., 2022

Two-Dimensional Behavior-Marker-Based Data Forwarding Incentive Scheme for Fog-Computing-Based SIoVs.
IEEE Trans. Comput. Soc. Syst., 2022

Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs.
IEEE Trans. Cloud Comput., 2022

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022

CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature.
Proceedings of the IEEE International Conference on Trust, 2022

2021
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks.
IEEE Trans. Netw. Sci. Eng., 2021

Secure Data Sequence Query Framework Based on Multiple Fogs.
IEEE Trans. Emerg. Top. Comput., 2021

Detection resource allocation scheme for two-layer cooperative IDSs in smart grids.
J. Parallel Distributed Comput., 2021

Effective charging identity authentication scheme based on fog computing in V2G networks.
J. Inf. Secur. Appl., 2021

Image super-resolution reconstruction based on feature map attention mechanism.
Appl. Intell., 2021

Traceable Identity-Based Ring Signature for Protecting Mobile IoT Devices.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
Secure Data Query Framework for Cloud and Fog Computing.
IEEE Trans. Netw. Serv. Manag., 2020

An Industrial Dynamic Skyline Based Similarity Joins For Multidimensional Big Data Applications.
IEEE Trans. Ind. Informatics, 2020

Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism.
IEEE Trans. Comput. Soc. Syst., 2020

Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices.
Sensors, 2020

Secure Computing Resource Allocation Framework For Open Fog Computing.
Comput. J., 2020

Efficient traceable ring signature scheme without pairings.
Adv. Math. Commun., 2020

2019
Social community detection and message propagation scheme based on personal willingness in social network.
Soft Comput., 2019

Traceable attribute-based signature.
J. Inf. Secur. Appl., 2019

Autonomous Resource Request Transaction Framework Based on Blockchain in Social Network.
IEEE Access, 2019

Social Community Detection Scheme Based on Social-Aware in Mobile Social Networks.
IEEE Access, 2019

2018
A cost-efficient framework for finding prospective customers based on reverse skyline queries.
Knowl. Based Syst., 2018

Location Data Record Privacy Protection based on Differential Privacy Mechanism.
Inf. Technol. Control., 2018

Efficient Trajectory Data Privacy Protection Scheme Based on Laplace's Differential Privacy.
Informatica (Slovenia), 2018

Secure Session Key Management Scheme for Meter-Reading System Based on LoRa Technology.
IEEE Access, 2018

Resource Transaction Framework Based on Block Chain in Social Community.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2017

Identity-Based Multi-Proxy Signature Scheme in the Standard Model.
Fundam. Informaticae, 2017

Efficient and secure attribute-based signature for monotone predicates.
Acta Informatica, 2017

Two Improved Anonymous Authentication Methods for PCS.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Parallel Skyline Computation for Partially Ordered Domains.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Traceable Identity-Based Group Signature.
RAIRO Theor. Informatics Appl., 2016

2015
Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015

2010
Optimization of AMR Speech Codec on ARMv5E Platform.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010


  Loading...