default search action
Chunxiang Gu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j18]Xiangbin Wang, Qingjun Yuan, Yongjuan Wang, Gaopeng Gou, Chunxiang Gu, Gang Yu, Gang Xiong:
Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features. Comput. Networks 245: 110403 (2024) - [j17]Jiaxing Guo, Chunxiang Gu, Xi Chen, Xieli Zhang, Kai Tian, Ji Li:
Stateful black-box fuzzing for encryption protocols and its application in IPsec. Comput. Networks 251: 110605 (2024) - [j16]Jiaxing Guo, Dongliang Zhao, Chunxiang Gu, Xi Chen, Xieli Zhang, Mengcheng Ju:
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations. J. Cloud Comput. 13(1): 28 (2024) - 2023
- [j15]Yanwei Zhou, Lei Cao, Bo Yang, Zhe Xia, Chunxiang Gu, Mingwu Zhang:
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption. Comput. Stand. Interfaces 83: 103668 (2023) - [j14]Zhaolong Wang, Yanwei Zhou, Zirui Qiao, Bo Yang, Chunxiang Gu, Yuan Xu, Mingwu Zhang:
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications. IEEE Internet Things J. 10(6, March 15): 5114-5127 (2023) - [j13]Yanwei Zhou, Ran Xu, Wenzheng Zhang, Zhe Xia, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023) - [j12]Luan Luan, Yanan Shi, Chunxiang Gu, Yonghui Zheng:
Application of Discrete Pruned Enumeration in Solving BDD. Symmetry 15(2): 355 (2023) - 2022
- [j11]Siqi Lu, Jianhua Zheng, Zhenfu Cao, Yongjuan Wang, Chunxiang Gu:
A survey on cryptographic techniques for protecting big data security: present and forthcoming. Sci. China Inf. Sci. 65(10) (2022) - [j10]Ding Li, Chunxiang Gu, Yuefei Zhu:
Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning. IEICE Trans. Inf. Syst. 105-D(6): 1172-1184 (2022) - 2021
- [j9]Zedong Sun, Chunxiang Gu, Yonghui Zheng:
Using SubSieve Technique to Accelerate TupleSieve Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(4): 714-722 (2021) - [j8]Jiaxing Guo, Chunxiang Gu, Xi Chen, Siqi Lu, Fushan Wei:
Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations. Inf. Technol. Control. 50(3): 570-587 (2021) - [j7]Binjie Chen, Fushan Wei, Chunxiang Gu:
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms. Secur. Commun. Networks 2021: 6643763:1-6643763:10 (2021) - [j6]Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei:
CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method. Sensors 21(24): 8231 (2021) - 2020
- [j5]Zedong Sun, Chunxiang Gu, Yonghui Zheng:
A Review of Sieve Algorithms in Solving the Shortest Lattice Vector Problem. IEEE Access 8: 190475-190486 (2020) - 2019
- [j4]Jiaxing Guo, Chunxiang Gu, Xi Chen, Fushan Wei:
Model Learning and Model Checking of IPSec Implementations for Internet of Things. IEEE Access 7: 171322-171332 (2019) - 2013
- [j3]Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu, Yonghui Zheng, Jinlong Fei:
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data. J. Networks 8(2): 339-344 (2013) - [j2]Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu, Jinlong Fei, Xin-Zheng He:
A Framework for Automated Security Proof and its Application to OAEP. J. Networks 8(3): 552-558 (2013) - 2010
- [j1]Chunxiang Gu, Yuefei Zhu:
New Efficient Searchable Encryption Schemes from Bilinear Pairings. Int. J. Netw. Secur. 10(1): 25-31 (2010)
Conference and Workshop Papers
- 2022
- [c19]Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu:
Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning. LCN 2022: 371-374 - 2021
- [c18]Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei:
tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network. CCCI 2021: 1-5 - 2020
- [c17]Xi Qian, Jiufen Liu, Chunxiang Gu, Yonghui Zheng:
An Improved BKW Algorithm For LWE With Binary Uniform Errors. ICCCS 2020: 87-92 - [c16]Luan Luan, Chunxiang Gu, Yonghui Zheng:
A Genetic Algorithm with Restart Strategy for Solving Approximate Shortest Vector Problem. ICACI 2020: 243-250 - [c15]Zedong Sun, Chunxiang Gu, Yonghui Zheng:
Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve Algorithms. ICCSP 2020: 1-5 - [c14]Zedong Sun, Chunxiang Gu, Yonghui Zheng:
An Efficient Sieve Algorithm with Evolutionary Technique. ICCT 2020: 1524-1528 - [c13]Jiaxing Guo, Siqi Lu, Chunxiang Gu, Xi Chen, Fushan Wei:
Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things. NaNA 2020: 233-240 - 2019
- [c12]Ji Li, Chunxiang Gu, Fushan Wei, Xi Chen:
A Survey on Blockchain Anomaly Detection Using Data Mining Techniques. BlockSys 2019: 491-504 - [c11]Luan Luan, Chunxiang Gu, Yonghui Zheng:
An Enumeration-Like Vector Sampling Method for Solving Approximate SVP. ML4CS 2019: 154-172 - 2015
- [c10]Chunxiang Gu, Yonghui Zheng, Fei Kang, Dan Xin:
Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model. CloudCom-Asia 2015: 335-343 - 2012
- [c9]Chunxiang Gu, Li Chen, Yonghui Zheng:
ID-Based Signatures from Lattices in the Random Oracle Model. WISM 2012: 222-230 - 2008
- [c8]Heng Pan, Ke Ke, Chunxiang Gu:
Efficienct ID-Based Proxy Blind Signature Schemes from Pairings. CIS (1) 2008: 390-393 - 2007
- [c7]Chunxiang Gu, Yuefei Zhu, Yonghui Zheng:
Certified E-Mail Protocol in the ID-Based Setting. ACNS 2007: 340-353 - [c6]Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
Efficient ID-Based Digital Signatures with Message Recovery. CANS 2007: 47-59 - [c5]Chunxiang Gu, Yuefei Zhu:
An Efficient ID-Based Proxy Signature Scheme from Pairings. Inscrypt 2007: 40-50 - [c4]Chunxiang Gu, Yuefei Zhu, Heng Pan:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. Inscrypt 2007: 372-383 - 2005
- [c3]Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. CIS (2) 2005: 9-16 - [c2]Chunxiang Gu, Yuefei Zhu:
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . CISC 2005: 42-52 - [c1]Chunxiang Gu, Yuefei Zhu:
Provable Security of ID-Based Proxy Signature Schemes. ICCNMC 2005: 1277-1286
Informal and Other Publications
- 2022
- [i6]Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi:
Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters. IACR Cryptol. ePrint Arch. 2022: 1067 (2022) - 2015
- [i5]Chun-Xiang Gu, Dan Xin, Yonghui Zheng, Yuanji Kang:
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters. IACR Cryptol. ePrint Arch. 2015: 78 (2015) - 2009
- [i4]Chun-Xiang Gu, Yan Guang, Yue-Fei Zhu:
Automatic Approach of Provable Security and its Application for OAEP+. IACR Cryptol. ePrint Arch. 2009: 73 (2009) - 2006
- [i3]Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. IACR Cryptol. ePrint Arch. 2006: 108 (2006) - [i2]Chunxiang Gu, Yuefei Zhu:
An Efficient ID-based Proxy Signature Scheme from Pairings. IACR Cryptol. ePrint Arch. 2006: 158 (2006) - [i1]Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing. IACR Cryptol. ePrint Arch. 2006: 195 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint