DQN-based mobile edge computing for smart Internet of vehicle
Zhang, Lianhong, Zhou, Wenqi, Xia, Junjuan, Gao, Chongzhi, Zhu, Fusheng, Fan, Chengyuan, Ou, Jiangtao
Published in EURASIP journal on advances in signal processing (26.05.2022)
Published in EURASIP journal on advances in signal processing (26.05.2022)
Get full text
Journal Article
DQN-based resource allocation for NOMA-MEC-aided multi-source data stream
Ling, Jing, Xia, Junjuan, Zhu, Fusheng, Gao, Chongzhi, Lai, Shiwei, Balasubramanian, Venki
Published in EURASIP journal on advances in signal processing (01.12.2023)
Published in EURASIP journal on advances in signal processing (01.12.2023)
Get full text
Journal Article
Intelligent computing for WPT–MEC-aided multi-source data stream
Zheng, Xiangdong, Zhu, Fusheng, Xia, Junjuan, Gao, Chongzhi, Cui, Tao, Lai, Shiwei
Published in EURASIP journal on advances in signal processing (01.12.2023)
Published in EURASIP journal on advances in signal processing (01.12.2023)
Get full text
Journal Article
Publicly verifiable privacy-preserving aggregation and its application in IoT
Li, Tong, Gao, Chongzhi, Jiang, Liaoliang, Pedrycz, Witold, Shen, Jian
Published in Journal of network and computer applications (15.01.2019)
Published in Journal of network and computer applications (15.01.2019)
Get full text
Journal Article
N-gram MalGAN: Evading machine learning detection via feature n-gram
Zhu, Enmin, Zhang, Jianjie, Yan, Jijie, Chen, Kongyang, Gao, Chongzhi
Published in Digital communications and networks (01.08.2022)
Published in Digital communications and networks (01.08.2022)
Get full text
Journal Article
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Gao, Chongzhi, Lv, Siyi, Wei, Yu, Wang, Zhi, Liu, Zheli, Cheng, Xiaochun
Published in IEEE access (01.01.2018)
Published in IEEE access (01.01.2018)
Get full text
Journal Article
Finger vein secure biometric template generation based on deep learning
Liu, Yi, Ling, Jie, Liu, Zhusong, Shen, Jian, Gao, Chongzhi
Published in Soft computing (Berlin, Germany) (01.04.2018)
Published in Soft computing (Berlin, Germany) (01.04.2018)
Get full text
Journal Article
Coverless Information Hiding Based on the Molecular Structure Images of Material
Cao, Yi, Zhou, Zhili, Sun, Xingming, Gao, Chongzhi
Published in Computers, materials & continua (2018)
Published in Computers, materials & continua (2018)
Get full text
Journal Article
Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security
Zhang, Lianhong, Lai, Shiwei, Xia, Junjuan, Gao, Chongzhi, Fan, Dahua, Ou, Jianghong
Published in Physical communication (01.12.2022)
Published in Physical communication (01.12.2022)
Get full text
Journal Article
Task offloading for vehicular edge computing with imperfect CSI: A deep reinforcement approach
Wu, Yuxin, Xia, Junjuan, Gao, Chongzhi, Ou, Jiangtao, Fan, Chengyuan, Ou, Jianghong, Fan, Dahua
Published in Physical communication (01.12.2022)
Published in Physical communication (01.12.2022)
Get full text
Journal Article
Model approach to grammatical evolution: deep-structured analyzing of model and representation
He, Pei, Deng, Zelin, Gao, Chongzhi, Wang, Xiuni, Li, Jin
Published in Soft computing (Berlin, Germany) (01.09.2017)
Published in Soft computing (Berlin, Germany) (01.09.2017)
Get full text
Journal Article
A hardware-aware CPU power measurement based on the power-exponent function model for cloud servers
Lin, Weiwei, Yu, Tianhao, Gao, Chongzhi, Liu, Fagui, Li, Tengyue, Fong, Simon, Wang, Yongxiang
Published in Information sciences (08.02.2021)
Published in Information sciences (08.02.2021)
Get full text
Journal Article
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Chen, Wenbin, Li, Jin, Huang, Zhengan, Gao, Chongzhi, Yiu, Siuming, Jiang, Zoe L.
Published in Journal of computer and system sciences (01.09.2021)
Published in Journal of computer and system sciences (01.09.2021)
Get full text
Journal Article
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions
Cai, Zhaoquan, Yan, Hongyang, Li, Ping, Huang, Zheng-an, Gao, Chongzhi
Published in Cluster computing (01.09.2017)
Published in Cluster computing (01.09.2017)
Get full text
Journal Article
Lattice-based dynamic group signature for anonymous authentication in IoT
Xie, Run, He, Chanlian, Xu, Chunxiang, Gao, Chongzhi
Published in Annales des télécommunications (01.08.2019)
Published in Annales des télécommunications (01.08.2019)
Get full text
Journal Article
Privacy-preserving edge-assisted image retrieval and classification in IoT
LI, Xuan, LI, Jin, YIU, Siuming, GAO, Chongzhi, XIONG, Jinbo
Published in Frontiers of Computer Science (01.10.2019)
Published in Frontiers of Computer Science (01.10.2019)
Get full text
Journal Article
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement
Jing, Zhengjun, Gu, Chunsheng, Yu, Zhimin, Shi, Peizhong, Gao, Chongzhi
Published in Cluster computing (01.01.2019)
Published in Cluster computing (01.01.2019)
Get full text
Journal Article
Flexible neural trees based early stage identification for IP traffic
Chen, Zhenxiang, Peng, Lizhi, Gao, Chongzhi, Yang, Bo, Chen, Yuehui, Li, Jin
Published in Soft computing (Berlin, Germany) (01.04.2017)
Published in Soft computing (Berlin, Germany) (01.04.2017)
Get full text
Journal Article