
Ke Gu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Ke Gu 0001
— Nanyang Technological University, School of Computer Science and Engineering, Singapore (and 2 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j33]Zhuoqun Xia, Jingjing Tan, Ke Gu, Weijia Jia:
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. J. Parallel Distributed Comput. 147: 236-247 (2021) - 2020
- [j32]Ke Gu
, Xinying Dong, Linyu Wang:
Efficient traceable ring signature scheme without pairings. Adv. Math. Commun. 14(2): 207-232 (2020) - [j31]Jiafu Jiang, Linyu Tang, Ke Gu
, Weijia Jia:
Secure Computing Resource Allocation Framework For Open Fog Computing. Comput. J. 63(4): 567-592 (2020) - [j30]Ke Gu, Dianxing Liu, Bo Yin:
Efficient Group Signature Scheme without Pairings. Int. J. Netw. Secur. 22(3): 502-513 (2020) - [j29]Ke Gu
, WenBin Zhang, Se-Jung Lim, Pradip Kumar Sharma
, Zafer Al-Makhadmeh, Amr Tolba
:
Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices. Sensors 20(3): 758 (2020) - [j28]Xu Zhang, Chunsheng Jiang, Gang Dai, Le Zhong, Wen Fang, Ke Gu, Guoping Xiao, Shangqing Ren, Xin Liu, Sanyong Zou:
Improved Performance of SRAM-Based True Random Number Generator by Leveraging Irradiation Exposure. Sensors 20(21): 6132 (2020) - [j27]Ke Gu
, Linyu Tang, Jiafu Jiang, Weijia Jia:
Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism. IEEE Trans. Comput. Soc. Syst. 7(5): 1246-1263 (2020) - [j26]Bo Yin
, Xuetao Wei
, Jin Wang
, Naixue Xiong
, Ke Gu
:
An Industrial Dynamic Skyline Based Similarity Joins For Multidimensional Big Data Applications. IEEE Trans. Ind. Informatics 16(4): 2520-2532 (2020) - [j25]Ke Gu
, Na Wu, Bo Yin, Weijia Jia:
Secure Data Query Framework for Cloud and Fog Computing. IEEE Trans. Netw. Serv. Manag. 17(1): 332-345 (2020)
2010 – 2019
- 2019
- [j24]Ke Gu
, Linyu Wang, Weijia Jia
:
Autonomous Resource Request Transaction Framework Based on Blockchain in Social Network. IEEE Access 7: 43666-43678 (2019) - [j23]Ke Gu
, Dianxing Liu
, Keming Wang
:
Social Community Detection Scheme Based on Social-Aware in Mobile Social Networks. IEEE Access 7: 173407-173418 (2019) - [j22]Ke Gu
, Keming Wang, Lulu Yang:
Traceable attribute-based signature. J. Inf. Secur. Appl. 49 (2019) - [j21]Ke Gu
, Linyu Wang, Bo Yin:
Social community detection and message propagation scheme based on personal willingness in social network. Soft Comput. 23(15): 6267-6285 (2019) - [c16]Huiqing Zhang, Jiaxu Chen, Shuo Li, Ke Gu, Li Wu:
Smoke Detection Based on Image Analysis Technology. IFTC 2019: 13-22 - 2018
- [j20]Zhuoqun Xia, Hong Zhou, Ke Gu
, Bo Yin, Youyou Zeng, Ming Xu:
Secure Session Key Management Scheme for Meter-Reading System Based on LoRa Technology. IEEE Access 6: 75015-75024 (2018) - [j19]Chunlin Jiang, Shi-lan Wu, Ke Gu:
New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks. Int. J. Netw. Secur. 20(2): 235-242 (2018) - [j18]Ke Gu, LinYu Wang, Na Wu, NianDong Liao:
Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications. Int. J. Netw. Secur. 20(4): 762-773 (2018) - [j17]Tao Dai, Ke Gu, Li Niu
, Yong-bing Zhang, Weizhi Lu, Shu-Tao Xia:
Referenceless quality metric of multiply-distorted images based on structural degradation. Neurocomputing 290: 185-195 (2018) - [j16]Yuanyao Lu
, Jie Yan, Ke Gu:
Review on Automatic Lip Reading Techniques. Int. J. Pattern Recognit. Artif. Intell. 32(7): 1856007:1-1856007:21 (2018) - [j15]Ke Gu, Lihao Yang, Yongzhi Liu, Bo Yin:
Efficient Trajectory Data Privacy Protection Scheme Based on Laplace's Differential Privacy. Informatica (Slovenia) 42(3) (2018) - [j14]Ke Gu
, Lihao Yang, Bo Yin:
Location Data Record Privacy Protection based on Differential Privacy Mechanism. Inf. Technol. Control. 47(4): 639-654 (2018) - [j13]Bo Yin
, Ke Gu
, Xuetao Wei, Siwang Zhou, Yonghe Liu:
A cost-efficient framework for finding prospective customers based on reverse skyline queries. Knowl. Based Syst. 152: 117-135 (2018) - [j12]Jun Wu, Zhaoqiang Xia
, Huifang Li, Kezheng Sun, Ke Gu, Hong Lu:
No-reference image quality assessment with center-surround based natural scene statistics. Multim. Tools Appl. 77(16): 20731-20751 (2018) - [c15]Hong Lu, Ke Gu, Chen Yang, Yunceng Hu:
Sequentially Cutting Based the Cluster Number Determination for Spatial Feature Classification. IFTC 2018: 433-443 - [c14]Yuanyao Lu, Ke Gu, Shan He:
Research on Visual Speech Recognition Based on Local Binary Pattern and Stacked Sparse Autoencoder. IHSED 2018: 1082-1087 - [c13]Linyu Wang, Bo Yin, Ke Gu
:
Resource Transaction Framework Based on Block Chain in Social Community. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1265-1270 - [i2]Ke Gu, Na Wu:
Constant Size Traceable Ring Signature Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2018: 288 (2018) - [i1]Ke Gu, Bo Yin:
Efficient Group Signature Scheme without Pairings. IACR Cryptol. ePrint Arch. 2018: 879 (2018) - 2017
- [j11]Ke Gu
, Weijia Jia
, Guojun Wang, Sheng Wen
:
Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5): 521-541 (2017) - [j10]Ke Gu
, Weijia Jia
, Jianming Zhang:
Identity-Based Multi-Proxy Signature Scheme in the Standard Model. Fundam. Informaticae 150(2): 179-210 (2017) - [j9]Xingge Guo, Liping Huang, Ke Gu, Leida Li, Zhili Zhou, Lu Tang:
Naturalization of Screen Content Images for Enhanced Quality Evaluation. IEICE Trans. Inf. Syst. 100-D(3): 574-577 (2017) - [j8]Bo Yin, Siwang Zhou, Shiwen Zhang, Ke Gu
, Fei Yu
:
On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 11(4): 1931-1953 (2017) - [j7]Ke Gu, Yong Wang, Sheng Wen:
Traceable Threshold Proxy Signature. J. Inf. Sci. Eng. 33(1): 63-79 (2017) - [j6]Tao Dai, Zhiya Xu, Haoyi Liang, Ke Gu, Qingtao Tang, Yisen Wang, Weizhi Lu, Shu-Tao Xia:
A generic denoising framework via guided principal component analysis. J. Vis. Commun. Image Represent. 48: 340-352 (2017) - [j5]Guanghui Yue, Chunping Hou, Ke Gu, Nam Ling:
No reference image blurriness assessment with local binary patterns. J. Vis. Commun. Image Represent. 49: 382-391 (2017) - [c12]Tao Dai, Ke Gu, Zhiya Xu, Qingtao Tang, Haoyi Liang, Yong-bing Zhang, Shu-Tao Xia:
Blind quality assessment of multiply-distorted images based on structural degradation. ICIP 2017: 171-175 - [c11]Tao Dai, Ke Gu, Qingtao Tang, Kwok-Wai Hung, Yong-bing Zhang, Weizhi Lu, Shu-Tao Xia:
Foveated nonlocal dual denoising. ICIP 2017: 1881-1885 - [c10]Cheng Li, Xiao-gang Ruan, Ke Gu, Xiao-qing Zhu:
Construction of an Indoor Topological Map of a Robot Based on Prunable Self-Organizing Map. IFTC 2017: 492-500 - [c9]Bo Yin, Ke Gu
:
Parallel Skyline Computation for Partially Ordered Domains. ISPA/IUCC 2017: 699-706 - [c8]Chunlin Jiang, Shi-lan Wu, Ke Gu
:
Two Improved Anonymous Authentication Methods for PCS. SpaCCS Workshops 2017: 109-118 - [c7]Guanghui Yue, Chunping Hou, Ke Gu:
Subjective quality assessment of animation images. VCIP 2017: 1-4 - 2016
- [j4]Ke Gu
, Lihao Yang, Yong Wang, Sheng Wen
:
Traceable Identity-Based Group Signature. RAIRO Theor. Informatics Appl. 50(3): 193-226 (2016) - [j3]Lijuan Tang, Leida Li, Ke Gu, Xingming Sun, Jianying Zhang:
Blind quality index for camera images with natural scene statistics and patch-based sharpness assessment. J. Vis. Commun. Image Represent. 40: 335-344 (2016) - [c6]Hong Lu, Ke Gu:
Stable feature mining based object representation for tracking applications. CISP-BMEI 2016: 47-53 - [c5]Lijuan Tang, Hong Lu, Ke Gu, Kezheng Sun:
Camera image quality assessment without reference information. CISP-BMEI 2016: 666-670 - [c4]Lijuan Tang, Leida Li, Ke Gu, Jiansheng Qian, Jianying Zhang:
No-Reference Quality Assessment of Camera-Captured Distortion Images. PCM (2) 2016: 590-599 - [c3]Cenhui Pan, Yi Xu, Yichao Yan, Ke Gu, Xiaokang Yang:
Exploiting neural models for no-reference image quality assessment. VCIP 2016: 1-4 - 2015
- [j2]Ke Gu
, Weijia Jia
, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. Comput. J. 58(4): 792-807 (2015) - [j1]Ke Gu, J. J. Liou, Wei Li, Yang Liu, Ping Li:
Total ionizing dose sensitivity of function blocks in FRAM. Microelectron. Reliab. 55(6): 873-878 (2015) - 2012
- [c2]Guoshan Wu, Yi Xu, Xiaokang Yang, Qing Yan, Ke Gu:
Robust object tracking with bidirectional corner matching and trajectory smoothness algorithm. MMSP 2012: 294-298 - 2010
- [c1]Chunlin Jiang, Lizhuo Zhang, Ke Gu
, Weijia Jia
:
Optimization of AMR Speech Codec on ARMv5E Platform. APSCC 2010: 615-619
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-15 22:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint