default search action
Ke Gu 0002
Person information
- affiliation: ChangSha University of Science and Technology, School of Computer and Communication Engineering,, China
- affiliation (PhD 2012): Central South University, School of Information Science and Engineering, Changsha, China
Other persons with the same name
- Ke Gu — disambiguation page
- Ke Gu 0001 — Nanyang Technological University, School of Computer Science and Engineering, Singapore (and 2 more)
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Jiao Zhang, Xiong Li, Ke Gu, Wei Liang, Kuan-Ching Li:
Secure Aggregation in Heterogeneous Federated Learning for Digital Ecosystems. IEEE Trans. Consumer Electron. 70(1): 1995-2003 (2024) - [j47]Ke Gu, CaoQianJin Li, Yang Deng:
Social Privacy-Preserving Modeling Based on Graphical Evolutionary Game and Infectious Disease Dissemination Dynamics. IEEE Trans. Comput. Soc. Syst. 11(3): 3882-3899 (2024) - [j46]Shuai Shang, Xiong Li, Ke Gu, Lei Li, Xiaosong Zhang, Pandi Vijayakumar:
A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT. IEEE Trans. Ind. Informatics 20(3): 4305-4316 (2024) - [j45]Ke Gu, Xin OuYang, Yi Wang:
Malicious Vehicle Detection Scheme Based on Spatio-Temporal Features of Traffic Flow Under Cloud-Fog Computing-Based IoVs. IEEE Trans. Intell. Transp. Syst. 25(9): 11534-11551 (2024) - [j44]Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Chao Su, Hangyu Hu, Kejun Long:
Secure and Lightweight Vehicular Privacy Preservation Scheme Under Fog Computing-Based IoVs. IEEE Trans. Intell. Veh. 9(2): 4115-4129 (2024) - [j43]Ke Gu, Yi Wang, Juan Qiu, Xiong Li, Jianming Zhang:
Blockchain-Based Data Deduplication and Distributed Audit for Shared Data in Cloud-Fog Computing-Based VANETs. IEEE Trans. Netw. Serv. Manag. 21(5): 5548-5565 (2024) - [j42]Ke Gu, Xingqiang Wang, Xiong Li:
Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving. IEEE Trans. Sustain. Comput. 9(4): 695-711 (2024) - 2023
- [j41]Zhuoqun Xia, Yaling Chen, Bo Yin, Haolan Liang, Hongmei Zhou, Ke Gu, Fei Yu:
Fed_ADBN: An efficient intrusion detection framework based on client selection in AMI network. Expert Syst. J. Knowl. Eng. 40(4) (2023) - [j40]Shaobo Zhang, Yuechao Wang, Entao Luo, Qin Liu, Ke Gu, Guojun Wang:
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse. J. Syst. Archit. 140: 102899 (2023) - [j39]Ke Gu, Jieyu Hu, Weijia Jia:
Adaptive Area-Based Traffic Congestion Control and Management Scheme Based on Fog Computing. IEEE Trans. Intell. Transp. Syst. 24(1): 1359-1373 (2023) - [j38]Xiong Li, Shuai Shang, Shanpeng Liu, Ke Gu, Mian Ahmad Jan, Xiaosong Zhang, Fazlullah Khan:
An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2556-2567 (2023) - [j37]Ke Gu, Wenbin Zhang, Xingqiang Wang, Xiong Li, Weijia Jia:
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification. IEEE Trans. Netw. Serv. Manag. 20(4): 4982-4999 (2023) - [j36]Zhuoqun Xia, Dan Yin, Ke Gu, Xiong Li:
Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism. IEEE Trans. Sustain. Comput. 8(4): 652-669 (2023) - 2022
- [j35]Fan Wu, Xiong Li, Xiangyang Luo, Ke Gu:
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. J. Syst. Archit. 132: 102737 (2022) - [j34]Ke Gu, Xinying Dong, Weijia Jia:
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. IEEE Trans. Cloud Comput. 10(2): 1215-1232 (2022) - [j33]Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia:
Two-Dimensional Behavior-Marker-Based Data Forwarding Incentive Scheme for Fog-Computing-Based SIoVs. IEEE Trans. Comput. Soc. Syst. 9(5): 1406-1418 (2022) - [j32]Zhuoqun Xia, Yichao Zhang, Ke Gu, Xiong Li, Weijia Jia:
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System. IEEE Trans. Green Commun. Netw. 6(1): 313-328 (2022) - [j31]Xiong Li, Shanpeng Liu, Rongxing Lu, Muhammad Khurram Khan, Ke Gu, Xiaosong Zhang:
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Informatics 26(5): 2020-2031 (2022) - [j30]Ke Gu, Keming Wang, Xiong Li, Weijia Jia:
Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 23(8): 12544-12561 (2022) - [j29]Ke Gu, Xinying Dong, Xiong Li, Weijia Jia:
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs. IEEE Trans. Netw. Sci. Eng. 9(3): 1245-1263 (2022) - [j28]Ke Gu, Wenbin Zhang, Xiong Li, Weijia Jia:
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. IEEE Trans. Netw. Serv. Manag. 19(1): 271-288 (2022) - [j27]Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia:
Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs. IEEE Trans. Netw. Serv. Manag. 19(3): 2780-2797 (2022) - [j26]Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Xiong Li, Weijia Jia:
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs. ACM Trans. Internet Techn. 22(4): 107:1-107:28 (2022) - [c6]Zhuoqun Xia, Hongrui Li, Ke Gu:
CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature. TrustCom 2022: 429-434 - 2021
- [j25]Yuantao Chen, Linwu Liu, Volachith Phonevilay, Ke Gu, Runlong Xia, Jingbo Xie, Qian Zhang, Kai Yang:
Image super-resolution reconstruction based on feature map attention mechanism. Appl. Intell. 51(7): 4367-4380 (2021) - [j24]Zhuoqun Xia, Zhenwei Fang, Ke Gu, Jin Wang, Jingjing Tan, Guanghui Wang:
Effective charging identity authentication scheme based on fog computing in V2G networks. J. Inf. Secur. Appl. 58: 102649 (2021) - [j23]Zhuoqun Xia, Jingjing Tan, Ke Gu, Weijia Jia:
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. J. Parallel Distributed Comput. 147: 236-247 (2021) - [j22]Ke Gu, Na Wu, Bo Yin, Weijia Jia:
Secure Data Sequence Query Framework Based on Multiple Fogs. IEEE Trans. Emerg. Top. Comput. 9(4): 1883-1900 (2021) - [j21]Zhuoqun Xia, Jingjing Tan, Ke Gu, Xiong Li, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. IEEE Trans. Netw. Sci. Eng. 8(2): 995-1008 (2021) - [c5]Xin Peng, Ke Gu, Zhenlin Liu, Wenbin Zhang:
Traceable Identity-Based Ring Signature for Protecting Mobile IoT Devices. DMBD (2) 2021: 158-166 - 2020
- [j20]Ke Gu, Xinying Dong, Linyu Wang:
Efficient traceable ring signature scheme without pairings. Adv. Math. Commun. 14(2): 207-232 (2020) - [j19]Jiafu Jiang, Linyu Tang, Ke Gu, Weijia Jia:
Secure Computing Resource Allocation Framework For Open Fog Computing. Comput. J. 63(4): 567-592 (2020) - [j18]Ke Gu, WenBin Zhang, Se-Jung Lim, Pradip Kumar Sharma, Zafer Al-Makhadmeh, Amr Tolba:
Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices. Sensors 20(3): 758 (2020) - [j17]Ke Gu, Linyu Tang, Jiafu Jiang, Weijia Jia:
Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism. IEEE Trans. Comput. Soc. Syst. 7(5): 1246-1263 (2020) - [j16]Bo Yin, Xuetao Wei, Jin Wang, Naixue Xiong, Ke Gu:
An Industrial Dynamic Skyline Based Similarity Joins For Multidimensional Big Data Applications. IEEE Trans. Ind. Informatics 16(4): 2520-2532 (2020) - [j15]Ke Gu, Na Wu, Bo Yin, Weijia Jia:
Secure Data Query Framework for Cloud and Fog Computing. IEEE Trans. Netw. Serv. Manag. 17(1): 332-345 (2020)
2010 – 2019
- 2019
- [j14]Ke Gu, Linyu Wang, Weijia Jia:
Autonomous Resource Request Transaction Framework Based on Blockchain in Social Network. IEEE Access 7: 43666-43678 (2019) - [j13]Ke Gu, Dianxing Liu, Keming Wang:
Social Community Detection Scheme Based on Social-Aware in Mobile Social Networks. IEEE Access 7: 173407-173418 (2019) - [j12]Ke Gu, Keming Wang, Lulu Yang:
Traceable attribute-based signature. J. Inf. Secur. Appl. 49 (2019) - [j11]Ke Gu, Linyu Wang, Bo Yin:
Social community detection and message propagation scheme based on personal willingness in social network. Soft Comput. 23(15): 6267-6285 (2019) - 2018
- [j10]Zhuoqun Xia, Hong Zhou, Ke Gu, Bo Yin, Youyou Zeng, Ming Xu:
Secure Session Key Management Scheme for Meter-Reading System Based on LoRa Technology. IEEE Access 6: 75015-75024 (2018) - [j9]Ke Gu, LinYu Wang, Na Wu, NianDong Liao:
Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications. Int. J. Netw. Secur. 20(4): 762-773 (2018) - [j8]Ke Gu, Lihao Yang, Yongzhi Liu, Bo Yin:
Efficient Trajectory Data Privacy Protection Scheme Based on Laplace's Differential Privacy. Informatica (Slovenia) 42(3) (2018) - [j7]Ke Gu, Lihao Yang, Bo Yin:
Location Data Record Privacy Protection based on Differential Privacy Mechanism. Inf. Technol. Control. 47(4): 639-654 (2018) - [j6]Bo Yin, Ke Gu, Xuetao Wei, Siwang Zhou, Yonghe Liu:
A cost-efficient framework for finding prospective customers based on reverse skyline queries. Knowl. Based Syst. 152: 117-135 (2018) - [c4]Linyu Wang, Bo Yin, Ke Gu:
Resource Transaction Framework Based on Block Chain in Social Community. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1265-1270 - 2017
- [j5]Ke Gu, Weijia Jia, Guojun Wang, Sheng Wen:
Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5): 521-541 (2017) - [j4]Ke Gu, Weijia Jia, Jianming Zhang:
Identity-Based Multi-Proxy Signature Scheme in the Standard Model. Fundam. Informaticae 150(2): 179-210 (2017) - [j3]Bo Yin, Siwang Zhou, Shiwen Zhang, Ke Gu, Fei Yu:
On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 11(4): 1931-1953 (2017) - [c3]Bo Yin, Ke Gu:
Parallel Skyline Computation for Partially Ordered Domains. ISPA/IUCC 2017: 699-706 - [c2]Chunlin Jiang, Shi-lan Wu, Ke Gu:
Two Improved Anonymous Authentication Methods for PCS. SpaCCS Workshops 2017: 109-118 - 2016
- [j2]Ke Gu, Lihao Yang, Yong Wang, Sheng Wen:
Traceable Identity-Based Group Signature. RAIRO Theor. Informatics Appl. 50(3): 193-226 (2016) - 2015
- [j1]Ke Gu, Weijia Jia, Chunlin Jiang:
Efficient Identity-Based Proxy Signature in the Standard Model. Comput. J. 58(4): 792-807 (2015) - 2010
- [c1]Chunlin Jiang, Lizhuo Zhang, Ke Gu, Weijia Jia:
Optimization of AMR Speech Codec on ARMv5E Platform. APSCC 2010: 615-619
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint