default search action
Lize Gu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Xingyu Yan, Licheng Wang, Lize Gu, Ziyi Li, Jingwen Suo:
Post-quantum κ-to-1 trapdoor claw-free functions from extrapolated dihedral cosets. Quantum Inf. Process. 23(5): 188 (2024) - [j28]Junke Duan, Shihui Zheng, Wei Wang, Licheng Wang, Xiaoya Hu, Lize Gu:
Concise RingCT Protocol Based on Linkable Threshold Ring Signature. IEEE Trans. Dependable Secur. Comput. 21(5): 5014-5028 (2024) - [j27]Junke Duan, Wei Wang, Licheng Wang, Lize Gu:
Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature. IEEE Trans. Inf. Forensics Secur. 19: 7560-7572 (2024) - [j26]Junke Duan, Lize Gu, Wei Wang, Licheng Wang:
Chainknot: Redactable Blockchain Protocol With Forced Synchronization. IEEE Trans. Netw. Sci. Eng. 11(3): 3091-3104 (2024) - 2023
- [j25]Jingwen Suo, Lize Gu, Xingyu Yan, Sijia Yang, Xiaoya Hu, Licheng Wang:
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem. BMC Bioinform. 24(1): 34 (2023) - [j24]Shengchen Duan, Hong Liu, Lize Gu:
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system. Peer Peer Netw. Appl. 16(4): 1716-1738 (2023) - [j23]Junke Duan, Licheng Wang, Wei Wang, Lize Gu:
TRCT: A Traceable Anonymous Transaction Protocol for Blockchain. IEEE Trans. Inf. Forensics Secur. 18: 4391-4405 (2023) - 2022
- [j22]Xingyu Yan, Lize Gu, Jingwen Suo, Licheng Wang:
Leveraging the hardness of dihedral coset problem for quantum cryptography. Quantum Inf. Process. 21(9): 308 (2022) - [j21]Yifan Tang, Lize Gu, Leiting Wang:
Deep Stacking Network for Intrusion Detection. Sensors 22(1): 25 (2022) - [i1]Xingyu Yan, Licheng Wang, Weiqiang Wen, Ziyi Li, Jingwen Suo, Lize Gu:
Post-Quantum κ-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets. CoRR abs/2211.16993 (2022) - 2021
- [j20]Ping Pan, Junzhi Ye, Yun Pan, Lize Gu, Licheng Wang:
New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups. Inf. 12(8): 294 (2021) - [j19]Yu Wang, Yannan Jia, Lize Gu:
EFM-Net: Feature Extraction and Filtration with Mask Improvement Network for Object Detection in Remote Sensing Images. Remote. Sens. 13(20): 4151 (2021) - [j18]Xiaoning Zhu, Yannan Jia, Sun Jian, Lize Gu, Zhang Pu:
ViTT: Vision Transformer Tracker. Sensors 21(16): 5608 (2021) - [c13]Junkai Liu, Shihui Zheng, Lize Gu:
Effective Deep Learning-based Side-Channel Analyses Against ASCAD. TrustCom 2021: 514-523 - 2020
- [j17]Jingwen Suo, Lize Gu, Yun Pan, Sijia Yang, Xiaoya Hu:
Quantum Inspired Genetic Algorithm for Double Digest Problem. IEEE Access 8: 72910-72916 (2020) - [j16]Junke Duan, Lize Gu, Shihui Zheng:
ARCT: An Efficient Aggregating Ring Confidential Transaction Protocol in Blockchain. IEEE Access 8: 198118-198130 (2020) - [j15]Jiaxuan Sun, Lize Gu, Kaiyuan Chen:
An Efficient Alert Aggregation Method Based on Conditional Rough Entropy and Knowledge Granularity. Entropy 22(3): 324 (2020) - [c12]Kaiyuan Chen, Lize Gu, Jiaxuan Sun:
A DoS Attack Detection Method Based on Multi-source Data Fusion. CSAE 2020: 116:1-116:8
2010 – 2019
- 2019
- [j14]Pin Lv, Licheng Wang, Huijun Zhu, Wenbo Deng, Lize Gu:
An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains. IEEE Access 7: 41309-41314 (2019) - [j13]Xiaoning Zhu, Qingyue Meng, Bojian Ding, Lize Gu, Yixian Yang:
Weighted pooling for image recognition of deep convolutional neural networks. Clust. Comput. 22(Supplement): 9371-9383 (2019) - [j12]Feifei Wang, Guoai Xu, Lize Gu:
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. Secur. Commun. Networks 2019: 4656281:1-4656281:13 (2019) - [c11]Yuanqi Yang, Lize Gu, Xiaoning Zhu:
Conflicts Resolving for Fusion of Multi-source Data. DSC 2019: 354-360 - [c10]Huikang Sun, Lize Gu, Bin Sun:
Adathm: Adaptive Gradient Method Based on Estimates of Third-Order Moments. DSC 2019: 361-366 - 2018
- [j11]Xiaoning Zhu, Bojian Ding, Wenjun Li, Lize Gu, Yixian Yang:
On development of security monitoring system via wireless sensing network. EURASIP J. Wirel. Commun. Netw. 2018: 221 (2018) - [j10]Jing Li, Licheng Wang, Xinxin Niu, Lize Gu, Zhiguo Qu:
Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others. Fundam. Informaticae 157(1-2): 29-46 (2018) - [j9]Licheng Wang, Jing Li, Lize Gu, Jianhua Yan, Zhiguo Qu:
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems. Fundam. Informaticae 157(1-2): 47-62 (2018) - [j8]Xiaoning Zhu, Qingyue Meng, Lize Gu:
Real-time image recognition using weighted spatial pyramid networks. J. Real Time Image Process. 15(3): 617-629 (2018) - [j7]Xiaoning Zhu, Bojian Ding, Qingyue Meng, Lize Gu, Yixian Yang:
Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System. Sensors 18(9): 3041 (2018) - [c9]Yuqiang Tong, Lize Gu:
A News Text Clustering Method Based on Similarity of Text Labels. ADHIP 2018: 496-503 - [c8]Xiaochen Qiu, Shihui Zheng, Lize Gu, Yongmei Cai:
A Fine-Grained Detection Mechanism for SDN Rule Collision. ADHIP 2018: 549-559 - [c7]Yanlei Wang, Shihui Zheng, Lize Gu, Yongmei Cai:
Source Encryption Scheme in SDN Southbound. ADHIP 2018: 560-569 - 2014
- [j6]Liwei Chang, Shihui Zheng, You Gao, Lize Gu, Yi-Xian Yang:
A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields. Appl. Algebra Eng. Commun. Comput. 25(6): 407-429 (2014) - [j5]Lize Gu, Shihui Zheng:
Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography. J. Appl. Math. 2014: 630607:1-630607:10 (2014) - 2013
- [j4]Lize Gu, Yun Pan, Mianxiong Dong, Kaoru Ota:
Noncommutative Lightweight Signcryption for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang:
Comment on Lee et al.'s group signature and e-auction scheme. Inf. Syst. Frontiers 15(1): 133-139 (2013) - [j2]Jing Liu, Guosheng Xu, Da Xiao, Lize Gu, Xinxin Niu:
A Semi-supervised Ensemble Approach for Mining Data Streams. J. Comput. 8(11): 2873-2879 (2013) - [j1]Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao, Yixian Yang:
New public key cryptosystems based on non-Abelian factorization problems. Secur. Commun. Networks 6(7): 912-922 (2013) - 2012
- [c6]Jing Liu, Lize Gu, Guosheng Xu, Xinxin Niu:
A correlation analysis method of network security events based on rough set theory. IC-NIDC 2012: 517-520 - 2010
- [c5]Jin-ye Liu, Lize Gu, Shoushan Luo, Yixian Yang:
An anonymous authentication scheme for mobile communication. WCNIS 2010: 359-364
2000 – 2009
- 2009
- [c4]Xiao-Long Ma, Zhiwei Wang, Lize Gu, Yixian Yang:
Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008. IAS 2009: 719-720 - 2008
- [c3]Hong-Yong Jia, Sihan Qing, Lize Gu, Yixian Yang:
Efficient Universally Composable Password-Based Key Exchange. CIS (2) 2008: 293-298 - [c2]Xiao-Long Ma, Wei Cui, Lize Gu, Yixian Yang, Zhengming Hu:
A Novel ID-Based Verifiably Encrypted Signature without Random Oracle. CIS (2) 2008: 359-363 - 2007
- [c1]Guosheng Xu, Yixian Yang, Lize Gu, Xinxin Niu:
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. Web Intelligence/IAT Workshops 2007: 315-318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint