default search action
Ge Wu 0001
Person information
- affiliation: Southeast University, School of Cyber Science and Engineering, Nanjing, China
- affiliation: Purple Mountain Laboratories, Nanjing, China
- affiliation: University of Wollongong, Institute of Cybersecurity and Cryptology, Australia
Other persons with the same name
- Ge Wu — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Jinguang Han, Willy Susilo, Liquan Chen, Jianchang Lai, Ge Wu:
Privacy-Preserving Confidential Reporting System With Designated Reporters. Comput. J. 67(5): 1951-1962 (2024) - [j27]Yuan Gao, Liquan Chen, Jinguang Han, Ge Wu, Willy Susilo:
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism. IEEE Internet Things J. 11(1): 777-790 (2024) - [j26]Qiu Zhang, Yinxia Sun, Yang Lu, Nian Xia, Ge Wu:
Efficient Certificateless Aggregate Designated Verifier Signature With Conditional Privacy Preserving in VANETs. IEEE Internet Things J. 11(15): 26191-26202 (2024) - [j25]Yue Han, Jinguang Han, Weizhi Meng, Jianchang Lai, Ge Wu:
Blockchain-based privacy-preserving public key searchable encryption with strong traceability. J. Syst. Archit. 155: 103264 (2024) - 2023
- [j24]Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang:
Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data. IEEE Access 11: 139715-139727 (2023) - [j23]Yu Wang, Liquan Chen, Ge Wu, Kunliang Yu, Tianyu Lu:
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing. Comput. Secur. 128: 103163 (2023) - [j22]Hua Shen, Jiqiang Li, Ge Wu, Mingwu Zhang:
Data release for machine learning via correlated differential privacy. Inf. Process. Manag. 60(3): 103349 (2023) - [j21]Jinguang Han, Liqun Chen, Willy Susilo, Liquan Chen, Ge Wu:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [j20]Yuan Gao, Liquan Chen, Jinguang Han, Ge Wu, Suhui Liu:
Similarity-based deduplication and secure auditing in IoT decentralized storage. J. Syst. Archit. 142: 102961 (2023) - [j19]Hua Shen, Ge Wu, Zhe Xia, Willy Susilo, Mingwu Zhang:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j18]Yuan Gao, Liquan Chen, Ge Wu, Qianmu Li, Tong Fu:
A Game Theory Study of Big Data Analytics in Internet of Things. IEEE Trans. Netw. Serv. Manag. 20(2): 1707-1716 (2023) - [j17]Suhui Liu, Liquan Chen, Ge Wu, Huaqun Wang, Hongtao Yu:
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records. IEEE Trans. Serv. Comput. 16(5): 3210-3223 (2023) - [j16]Hua Shen, Ge Wu, Willy Susilo, Mingwu Zhang:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. IEEE Trans. Serv. Comput. 16(6): 4554-4566 (2023) - [i1]Yue Han, Jinguang Han, Weizhi Meng, Jianchang Lai, Ge Wu:
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability. CoRR abs/2312.16954 (2023) - 2022
- [j15]Zhen Zhao, Fuchun Guo, Ge Wu, Willy Susilo, Baocang Wang:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j14]Willy Susilo, Fuchun Guo, Zhen Zhao, Ge Wu:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1476-1488 (2022) - [j13]Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu, Zhen Zhao, Qiong Huang:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [c3]Willy Susilo, Yannan Li, Fuchun Guo, Jianchang Lai, Ge Wu:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. ESORICS (2) 2022: 65-85 - 2021
- [j12]Jianchang Lai, Ge Wu, Peng Jiang, Zhen Zhao, Willy Susilo, Fuchun Guo:
Generic construction for tightly-secure signatures from discrete log. Theor. Comput. Sci. 888: 13-21 (2021) - [c2]Liangyu Ji, Tian Yao, Ge Wu, Liquan Chen, Zhongyuan Qin:
ERGA: An Effective Region Gradient Algorithm for Adversarial Example Generation. EITCE 2021: 1141-1147 - 2020
- [j11]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j10]Ge Wu, Zhen Zhao, Fuchun Guo, Willy Susilo, Futai Zhang:
On the General Construction of Tightly Secure Identity-Based Signature Schemes. Comput. J. 63(12): 1835-1848 (2020) - [j9]Ge Wu, Futai Zhang, Limin Shen, Fuchun Guo, Willy Susilo:
Certificateless aggregate signature scheme secure against fully chosen-key attacks. Inf. Sci. 514: 288-301 (2020) - [j8]Yimin Wang, Hong Zhong, Yan Xu, Jie Cui, Ge Wu:
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs. IEEE Syst. J. 14(4): 5373-5383 (2020)
2010 – 2019
- 2019
- [j7]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j6]Ge Wu, Fuchun Guo, Willy Susilo:
Generalized public-key cryptography with tight security. Inf. Sci. 504: 561-577 (2019) - [j5]Zhen Zhao, Ge Wu, Willy Susilo, Fuchun Guo, Baocang Wang, Yupu Hu:
Accountable identity-based encryption with distributed private key generators. Inf. Sci. 505: 352-366 (2019) - [j4]Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. J. Comput. Sci. Technol. 34(6): 1366-1379 (2019) - [j3]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - 2016
- [c1]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo:
Privacy-Preserving Cloud Auditing with Multiple Uploaders. ISPEC 2016: 224-237 - 2015
- [j2]Ruiyang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu, Zheng Yan:
Software Defined Intelligent Building. Int. J. Inf. Secur. Priv. 9(3): 84-99 (2015) - 2014
- [j1]Futai Zhang, Limin Shen, Ge Wu:
Notes on the security of certificateless aggregate signature schemes. Inf. Sci. 287: 32-37 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint