default search action
Chong-zhi Gao
Person information
- affiliation: Guangzhou University, School of Computer Science, China
- affiliation (PhD 2004): Sun Yat-Sen University, Institute of Software, Guangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Huali Ren, Anli Yan, Chong-zhi Gao, Hongyang Yan, Zhenxin Zhang, Jin Li:
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark. CoRR abs/2405.15161 (2024) - [i3]Behnam Zahednejad, Chong-zhi Gao:
Two-Round ID-PAKE with strong PFS and single pairing operation. IACR Cryptol. ePrint Arch. 2024: 12 (2024) - 2023
- [j36]Jing Ling, Junjuan Xia, Fusheng Zhu, Chongzhi Gao, Shiwei Lai, Venki Balasubramanian:
DQN-based resource allocation for NOMA-MEC-aided multi-source data stream. EURASIP J. Adv. Signal Process. 2023(1): 44 (2023) - [j35]Xiangdong Zheng, Fusheng Zhu, Junjuan Xia, Chongzhi Gao, Tao Cui, Shiwei Lai:
Intelligent computing for WPT-MEC-aided multi-source data stream. EURASIP J. Adv. Signal Process. 2023(1): 52 (2023) - [j34]Yuxin Wu, Changjun Cai, Xuanming Bi, Junjuan Xia, Chongzhi Gao, Yajuan Tang, Shiwei Lai:
Intelligent resource allocation scheme for cloud-edge-end framework aided multi-source data stream. EURASIP J. Adv. Signal Process. 2023(1): 56 (2023) - [j33]Behnam Zahednejad, Chong-zhi Gao:
A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics. Internet Things 24: 100937 (2023) - [i2]Huali Ren, Anli Yan, Xiaojun Ren, Pei-Gen Ye, Chong-zhi Gao, Zhili Zhou, Jin Li:
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification. CoRR abs/2312.15617 (2023) - 2022
- [j32]Enmin Zhu, Jianjie Zhang, Jijie Yan, Kongyang Chen, Chongzhi Gao:
N-gram MalGAN: Evading machine learning detection via feature n-gram. Digit. Commun. Networks 8(4): 485-491 (2022) - [j31]Lianhong Zhang, Wenqi Zhou, Junjuan Xia, Chongzhi Gao, Fusheng Zhu, Chengyuan Fan, Jiangtao Ou:
DQN-based mobile edge computing for smart Internet of vehicle. EURASIP J. Adv. Signal Process. 2022(1): 45 (2022) - [j30]Fengyin Li, Zhongxing Liu, Yilei Wang, Nan Wu, Jiguo Yu, Chongzhi Gao, Huiyu Zhou:
Aitac: an identity-based traceable anonymous communication model. J. Ambient Intell. Humaniz. Comput. 13(3): 1353-1362 (2022) - [j29]Yuxin Wu, Junjuan Xia, Chongzhi Gao, Jiangtao Ou, Chengyuan Fan, Jianghong Ou, Dahua Fan:
Task offloading for vehicular edge computing with imperfect CSI: A deep reinforcement approach. Phys. Commun. 55: 101867 (2022) - [j28]Lianhong Zhang, Shiwei Lai, Junjuan Xia, Chongzhi Gao, Dahua Fan, Jianghong Ou:
Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security. Phys. Commun. 55: 101896 (2022) - [j27]Chong-zhi Gao, Jin Li, Shi-bing Xia, Kim-Kwang Raymond Choo, Wenjing Lou, Changyu Dong:
MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Trans. Knowl. Data Eng. 34(5): 2306-2323 (2022) - 2021
- [j26]Weiwei Lin, Tianhao Yu, Chongzhi Gao, Fagui Liu, Tengyue Li, Simon Fong, Yongxiang Wang:
A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers. Inf. Sci. 547: 1045-1065 (2021) - [j25]Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siu-Ming Yiu, Zoe Lin Jiang:
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J. Comput. Syst. Sci. 120: 137-148 (2021) - 2020
- [j24]Jian Xu, Heng Liu, Dexin Wu, Fucai Zhou, Chong-zhi Gao, Linzhi Jiang:
Generating universal adversarial perturbation with ResNet. Inf. Sci. 537: 302-312 (2020) - [c13]Yanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen:
New Practical Public-Key Deniable Encryption. ICICS 2020: 147-163
2010 – 2019
- 2019
- [j23]Zhijun Wei, Jin Li, Xianmin Wang, Chong-Zhi Gao:
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing. IEEE Access 7: 62785-62793 (2019) - [j22]Run Xie, Chanlian He, Chunxiang Xu, Chongzhi Gao:
Lattice-based dynamic group signature for anonymous authentication in IoT. Ann. des Télécommunications 74(7-8): 531-542 (2019) - [j21]Chong-zhi Gao, Qiong Cheng, Xuan Li, Shi-bing Xia:
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust. Comput. 22(Suppl 1): 1655-1663 (2019) - [j20]Zhengjun Jing, Chunsheng Gu, Zhimin Yu, Peizhong Shi, Chongzhi Gao:
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Clust. Comput. 22(Suppl 1): 1717-1727 (2019) - [j19]Xuan Li, Jin Li, Siu-Ming Yiu, Chongzhi Gao, Jinbo Xiong:
Privacy-preserving edge-assisted image retrieval and classification in IoT. Frontiers Comput. Sci. 13(5): 1136-1147 (2019) - [j18]Chuan Zhao, Shengnan Zhao, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j17]Tong Li, Xuan Li, Xingyi Zhong, Nan Jiang, Chong-zhi Gao:
Communication-efficient outsourced privacy-preserving classification service using trusted processor. Inf. Sci. 505: 473-486 (2019) - [j16]Li Yang, Jiaxue Wang, Chongzhi Gao, Tong Li:
A crisis information propagation model based on a competitive relation. J. Ambient Intell. Humaniz. Comput. 10(8): 2999-3009 (2019) - [j15]Tong Li, Chongzhi Gao, Liaoliang Jiang, Witold Pedrycz, Jian Shen:
Publicly verifiable privacy-preserving aggregation and its application in IoT. J. Netw. Comput. Appl. 126: 39-44 (2019) - 2018
- [j14]Zhimin Yu, Chong-Zhi Gao, Zhengjun Jing, Brij Bhooshan Gupta, Qiu-ru Cai:
A Practical Public Key Encryption Scheme Based on Learning Parity With Noise. IEEE Access 6: 31918-31923 (2018) - [j13]Chongzhi Gao, Siyi Lv, Yu Wei, Zhi Wang, Zheli Liu, Xiaochun Cheng:
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices. IEEE Access 6: 38860-38869 (2018) - [j12]Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen, Kai Chen:
Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 21(1): 277-286 (2018) - [j11]Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo, Jin Li:
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Inf. Sci. 444: 72-88 (2018) - [j10]Jian Xu, Laiwen Wei, Yu Zhang, Andi Wang, Fucai Zhou, Chong-zhi Gao:
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107: 113-124 (2018) - [j9]Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao, Xiaojun Zhang:
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage. Secur. Commun. Networks 2018: 7254305:1-7254305:7 (2018) - [j8]Yi Liu, Jie Ling, Zhusong Liu, Jian Shen, Chongzhi Gao:
Finger vein secure biometric template generation based on deep learning. Soft Comput. 22(7): 2257-2265 (2018) - [c12]Tuo Wang, Lu Liu, Chongzhi Gao, Jingjing Hu, Jingyu Liu:
Towards Android Application Protection via Kernel Extension. ICA3PP (Workshops) 2018: 131-137 - [c11]Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. ICA3PP (4) 2018: 249-259 - 2017
- [j7]Zhaoquan Cai, Hongyang Yan, Ping Li, Zhengan Huang, Chong-zhi Gao:
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Clust. Comput. 20(3): 2415-2422 (2017) - [j6]Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen:
Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74: 76-85 (2017) - [j5]Zhenxiang Chen, Lizhi Peng, Chongzhi Gao, Bo Yang, Yuehui Chen, Jin Li:
Flexible neural trees based early stage identification for IP traffic. Soft Comput. 21(8): 2035-2046 (2017) - [j4]Pei He, Zelin Deng, Chongzhi Gao, Xiuni Wang, Jin Li:
Model approach to grammatical evolution: deep-structured analyzing of model and representation. Soft Comput. 21(18): 5413-5423 (2017) - [c10]Qiong Cheng, Chong-Zhi Gao:
A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks. CSE/EUC (2) 2017: 195-198 - [c9]Wenbin Chen, Hao Lei, Jin Li, Chongzhi Gao, Fufang Li, Ke Qi:
A Multi-source Homomorphic Network Coding Signature in the Standard Model. GPC 2017: 66-74 - 2015
- [j3]Han Shen, Chongzhi Gao, Debiao He, Libing Wu:
New biometrics-based authentication scheme for multi-server environment in critical systems. J. Ambient Intell. Humaniz. Comput. 6(6): 825-834 (2015) - [c8]Pei He, Zelin Deng, Chongzhi Gao, Liang Chang, Achun Hu:
Analyzing Grammatical Evolution and \pi π Grammatical Evolution with Grammar Model. ITITS (2) 2015: 483-489 - 2014
- [c7]Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao:
Identity Based Threshold Ring Signature from Lattices. NSS 2014: 233-245 - 2012
- [c6]Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian:
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. INCoS 2012: 377-384 - [c5]Chong-zhi Gao, Dongqing Xie, Baodian Wei:
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. ISPEC 2012: 46-62
2000 – 2009
- 2009
- [j2]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach. Concurr. Comput. Pract. Exp. 21(10): 1351-1372 (2009) - [j1]Chong-zhi Gao, Zheng-an Yao:
A Further Improved Online/Offline Signature Scheme. Fundam. Informaticae 91(3-4): 523-532 (2009) - [c4]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-Line/Off-Line Signatures. CT-RSA 2009: 148-163 - [c3]Changan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang:
Improved Implementations of Cryptosystems Based on Tate Pairing. ISA 2009: 145-151 - 2008
- [i1]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-line/Off-line Signatures. IACR Cryptol. ePrint Arch. 2008: 447 (2008) - 2005
- [c2]Chong-zhi Gao, Zheng-an Yao:
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. CANS 2005: 134-146 - 2003
- [c1]Chong-zhi Gao, Zheng-an Yao, Lei Li:
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. ACNS 2003: 169-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint