Chong-zhi Gao
Orcid: 0000-0001-7778-6775Affiliations:
- Guangzhou University, School of Computer Science, China
- Sun Yat-Sen University, Institute of Software, Guangzhou, China (PhD 2004)
According to our database1,
Chong-zhi Gao
authored at least 52 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark.
CoRR, 2024
2023
A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics.
Internet Things, December, 2023
EURASIP J. Adv. Signal Process., December, 2023
EURASIP J. Adv. Signal Process., 2023
Intelligent resource allocation scheme for cloud-edge-end framework aided multi-source data stream.
EURASIP J. Adv. Signal Process., 2023
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023
2022
IEEE Trans. Knowl. Data Eng., 2022
Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security.
Phys. Commun., 2022
Task offloading for vehicular edge computing with imperfect CSI: A deep reinforcement approach.
Phys. Commun., 2022
J. Ambient Intell. Humaniz. Comput., 2022
EURASIP J. Adv. Signal Process., 2022
Digit. Commun. Networks, 2022
2021
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021
A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers.
Inf. Sci., 2021
2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
J. Netw. Comput. Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Communication-efficient outsourced privacy-preserving classification service using trusted processor.
Inf. Sci., 2019
Frontiers Comput. Sci., 2019
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement.
Clust. Comput., 2019
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network.
Clust. Comput., 2019
Ann. des Télécommunications, 2019
A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing.
IEEE Access, 2019
2018
Soft Comput., 2018
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.
Secur. Commun. Networks, 2018
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018
Clust. Comput., 2018
IEEE Access, 2018
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices.
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Model approach to grammatical evolution: deep-structured analyzing of model and representation.
Soft Comput., 2017
Soft Comput., 2017
Future Gener. Comput. Syst., 2017
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Clust. Comput., 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2015
New biometrics-based authentication scheme for multi-server environment in critical systems.
J. Ambient Intell. Humaniz. Comput., 2015
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015
2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2012
Proceedings of the Information Security Practice and Experience, 2012
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2009
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2003
Proceedings of the Applied Cryptography and Network Security, 2003