Lize Gu

According to our database1, Lize Gu authored at least 39 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem.
BMC Bioinform., December, 2023

A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system.
Peer Peer Netw. Appl., August, 2023

TRCT: A Traceable Anonymous Transaction Protocol for Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Deep Stacking Network for Intrusion Detection.
Sensors, 2022

Leveraging the hardness of dihedral coset problem for quantum cryptography.
Quantum Inf. Process., 2022

Post-Quantum κ-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets.
CoRR, 2022

2021
ViTT: Vision Transformer Tracker.
Sensors, 2021

EFM-Net: Feature Extraction and Filtration with Mask Improvement Network for Object Detection in Remote Sensing Images.
Remote. Sens., 2021

New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups.
Inf., 2021

Effective Deep Learning-based Side-Channel Analyses Against ASCAD.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
An Efficient Alert Aggregation Method Based on Conditional Rough Entropy and Knowledge Granularity.
Entropy, 2020

Quantum Inspired Genetic Algorithm for Double Digest Problem.
IEEE Access, 2020

ARCT: An Efficient Aggregating Ring Confidential Transaction Protocol in Blockchain.
IEEE Access, 2020

A DoS Attack Detection Method Based on Multi-source Data Fusion.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
A Secure and Efficient ECC-Based Anonymous Authentication Protocol.
Secur. Commun. Networks, 2019

Weighted pooling for image recognition of deep convolutional neural networks.
Clust. Comput., 2019

An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains.
IEEE Access, 2019

Conflicts Resolving for Fusion of Multi-source Data.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Adathm: Adaptive Gradient Method Based on Estimates of Third-Order Moments.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System.
Sensors, 2018

Real-time image recognition using weighted spatial pyramid networks.
J. Real Time Image Process., 2018

An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems.
Fundam. Informaticae, 2018

Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others.
Fundam. Informaticae, 2018

On development of security monitoring system via wireless sensing network.
EURASIP J. Wirel. Commun. Netw., 2018

Source Encryption Scheme in SDN Southbound.
Proceedings of the Advanced Hybrid Information Processing, 2018

A News Text Clustering Method Based on Similarity of Text Labels.
Proceedings of the Advanced Hybrid Information Processing, 2018

A Fine-Grained Detection Mechanism for SDN Rule Collision.
Proceedings of the Advanced Hybrid Information Processing, 2018

2014
Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography.
J. Appl. Math., 2014

A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

2013
New public key cryptosystems based on non-Abelian factorization problems.
Secur. Commun. Networks, 2013

A Semi-supervised Ensemble Approach for Mining Data Streams.
J. Comput., 2013

Comment on Lee et al.'s group signature and e-auction scheme.
Inf. Syst. Frontiers, 2013

Noncommutative Lightweight Signcryption for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
A correlation analysis method of network security events based on rough set theory.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2010
An anonymous authentication scheme for mobile communication.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Novel ID-Based Verifiably Encrypted Signature without Random Oracle.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Efficient Universally Composable Password-Based Key Exchange.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007


  Loading...