default search action
Gaofei Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Ziqiu Zheng, Xuejun Li, He Wang, Gaofei Wu, Yuqing Zhang:
Research on SSL/TLS Security Differences Based on RFC Documents. ICNC 2024: 147-151 - [c11]Tao Liu, Chengwei Liu, Tianwei Liu, He Wang, Gaofei Wu, Yang Liu, Yuqing Zhang:
Catch the Butterfly: Peeking into the Terms and Conflicts Among SPDX Licenses. SANER 2024: 477-488 - [i8]Tao Liu, Chengwei Liu, Tianwei Liu, He Wang, Gaofei Wu, Yang Liu, Yuqing Zhang:
Catch the Butterfly: Peeking into the Terms and Conflicts among SPDX Licenses. CoRR abs/2401.10636 (2024) - [i7]Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang:
Several new classes of optimal ternary cyclic codes with two or three zeros. CoRR abs/2407.07332 (2024) - 2023
- [j13]Gaofei Wu, Huan Liu, Yuqing Zhang:
Several classes of optimal p-ary cyclic codes with minimum distance four. Finite Fields Their Appl. 92: 102275 (2023) - [j12]Gaofei Wu, Keqin Feng, Nian Li, Tor Helleseth:
New Results on the -1 Conjecture on Cross-Correlation of m-Sequences Based on Complete Permutation Polynomials. IEEE Trans. Inf. Theory 69(6): 4035-4044 (2023) - [c10]Na Wang, Gaofei Wu, Jingfeng Rong, Zheng Yan, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Cross-Border Data Security from the Perspective of Risk Assessment. ISPEC 2023: 91-104 - 2022
- [c9]Zelin Yang, Hui Ma, Mingchao Ai, Meijie Zhan, Gaofei Wu, Yuqing Zhang:
A Minimal Disclosure Signature Authentication Scheme Based on Consortium Blockchain. Blockchain 2022: 516-521 - [i6]Gaofei Wu, Huan Liu, Yuqing Zhang:
Several classes of optimal p-ary cyclic codes with minimal distance four. CoRR abs/2208.14404 (2022) - 2021
- [c8]Hansong Ren, Xuejun Li, Liao Lei, Guoliang Ou, Hongyu Sun, Gaofei Wu, Xiao Tian, Jinglu Hu, Yuqing Zhang:
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports. FCS 2021: 78-99 - [c7]Na Wang, Gaofei Wu, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Research on Security Assessment of Cross Border Data Flow. FCS 2021: 327-341
2010 – 2019
- 2019
- [j11]Gaofei Wu, Nian Li:
Several classes of permutation trinomials over 𝔽5n from Niho exponents. Cryptogr. Commun. 11(2): 313-324 (2019) - [j10]Gaofei Wu, Matthew Geoffrey Parker:
On Boolean functions with several flat spectra. Cryptogr. Commun. 11(5): 853-880 (2019) - [j9]Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou:
Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI. IEEE Trans. Mob. Comput. 18(2): 362-375 (2019) - [i5]Zilong Wang, Gaofei Wu, Dongxu Ma:
A New Method to Construct Gloay Complementary Set by Paraunitary Matrices and Hadamard Matrices. CoRR abs/1910.10302 (2019) - 2018
- [j8]Hanyu Quan, Boyang Wang, Yuqing Zhang, Gaofei Wu:
Efficient and Secure Top-k Queries With Top Order-Preserving Encryption. IEEE Access 6: 31525-31540 (2018) - [j7]Gaofei Wu, Nian Li, Yuqing Zhang, Xuefeng Liu:
Several classes of negabent functions over finite fields. Sci. China Inf. Sci. 61(3): 038102:1-038102:3 (2018) - [c6]Junli Kong, Baocang Wang, Caiyun Liu, Gaofei Wu:
An Approach for Predicting the Popularity of Online Security News Articles. CNS 2018: 1-6 - 2017
- [c5]Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou:
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. DSN 2017: 591-602 - [c4]Jiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu:
An Android Vulnerability Detection System. NSS 2017: 169-183 - [i4]Gaofei Wu, Nian Li:
Several Classes of Permutation Trinomials over F5sn From Niho Exponents. CoRR abs/1702.06446 (2017) - 2016
- [j6]Gaofei Wu, Yuqing Zhang, Xuefeng Liu:
New complementary sets of length 2m and size 4. Adv. Math. Commun. 10(4): 825-845 (2016) - [j5]Lisha Wang, Gaofei Wu:
Several classes of optimal ternary cyclic codes with minimal distance four. Finite Fields Their Appl. 40: 126-137 (2016) - [i3]Gaofei Wu, Nian Li, Yuqing Zhang, Xuefeng Liu:
Several Classes of Negabent Functions over Finite Fields. CoRR abs/1606.08952 (2016) - 2015
- [c3]Gaofei Wu, Zilong Wang:
Construction of near-complementary sequences of length n · 2m. IWSDA 2015: 19-23 - 2014
- [j4]Gaofei Wu, Matthew Geoffrey Parker:
A complementary construction using mutually unbiased bases. Cryptogr. Commun. 6(1): 3-25 (2014) - [j3]Gaofei Wu, Nian Li, Tor Helleseth, Yuqing Zhang:
Some classes of monomial complete permutation polynomials over finite fields of characteristic two. Finite Fields Their Appl. 28: 148-165 (2014) - [j2]Zilong Wang, Matthew Geoffrey Parker, Guang Gong, Gaofei Wu:
On the PMEPR of Binary Golay Sequences of Length $2^{n}$. IEEE Trans. Inf. Theory 60(4): 2391-2398 (2014) - [c2]Yongbo Xia, Tor Helleseth, Gaofei Wu:
A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence. SETA 2014: 249-259 - 2013
- [i2]Gaofei Wu, Matthew Geoffrey Parker:
A complementary construction using mutually unbiased bases. CoRR abs/1309.0157 (2013) - [i1]Gaofei Wu, Nian Li, Tor Helleseth, Yuqing Zhang:
More Classes of Complete Permutation Polynomials over $\F_q$. CoRR abs/1312.4716 (2013) - 2012
- [j1]Gaofei Wu, Yuqing Zhang, Zilong Wang:
Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(11): 1881-1887 (2012) - 2011
- [c1]Gaofei Wu, Zilong Wang:
New near-complementary sequences with low PMEPR for peak power control in OFDM. IWSDA 2011: 96-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint