Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lize Gu is active.

Publication


Featured researches published by Lize Gu.


Journal of Computers | 2013

A Semi-supervised Ensemble Approach for Mining Data Streams

Jing Liu; Guosheng Xu; Da Xiao; Lize Gu; Xinxin Niu

There are many challenges in mining data streams, such as infinite length, evolving nature and lack of labeled instances. Accordingly, a semi-supervised ensemble approach for mining data streams is presented in this paper. Data streams are divided into data chunks to deal with the infinite length. An ensemble classification model E is trained with existing labeled data chunks and decision boundary is constructed using E for detecting novel classes. New labeled data chunks are used to update E while unlabeled ones are used to construct unsupervised models. Classes are predicted by a semi-supervised model Ex which is consist of E and unsupervised models in a maximization consensus manner, so better performance can be achieved by using the constraints from unsupervised models with limited labeled instances. Experiments with different datasets demonstrate that our method outperforms conventional methods in mining data streams.


Information Systems Frontiers | 2013

Comment on Lee et al.'s group signature and e-auction scheme

Yanbin Sun; Yan Sun; Mingxing Luo; Lize Gu; Shihui Zheng; Yixian Yang

Recently, Lee et al. used their new group signature with the function of authenticated encryption to design a sealed-bid auction scheme, and they claimed that their schemes are secure. In this paper, we show that if the group manager has a valid group signature of a member, without the member’s secret key, he can forge a group signature on arbitrary message on behalf of the member; then, if the registration manager (RM) and the auction manager (AM) conspired (with each other) in their auction scheme, they can forge a new bid on any goods on behalf of the bidder who has sent his/her bid to AM. Therefore, their group signature and auction scheme are insecure. Finally, we improve Lee et al.’s group signature scheme to overcome the modification attack and achieve the security requirements.


ieee international conference on network infrastructure and digital content | 2012

A correlation analysis method of network security events based on rough set theory

Jing Liu; Lize Gu; Guosheng Xu; Xinxin Niu

Network security event correlation can find real threat through correlating security events and logs generated by different security devices and can be aware of the network security situation accurately. This paper propose a network security events correlation scheme based on rough set, build database of network security events and knowledge base, gives rule generation method and rule matcher. This method solves the simplification and correlation of massive security events through combining data discretization, attribute reduction, value reduction and rule generation.


international conference on computer technology and development | 2010

Improved tripartite concurrent signature

Haihui Ge; Yanbin Sun; Lize Gu; Shihui Zheng; Yixian Yang

The concrete tripartite concurrent signature scheme designed by Susilo et al. is found being unambiguity. In other words, any fourth party can identify who is the real signer of the publicly available valid signatures before the keystone is released. In order to overcome this flaw, we proposed an improved concrete tripartite concurrent signature (iCTCS) scheme based on the ring signature. Every user can choose his keystone to guarantee the fairness in the proposed scheme. However, the performance analysis results show that the iCTCS scheme is existentially unforgeable under a chosen message attack in the random oracle, and satisfies correctness, ambiguity and fairness.


ieee international conference on network infrastructure and digital content | 2009

A new credential routing model based on trust theory

Daofeng Li; Lize Gu; Bin Sun; Xinxin Niu; Yixian Yang

Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing path from the start router to the end one based on the trust theory that considers the trustworthy of link, the cost of link and the trustworthy of router as the critical factors so as to utilize the principle of the grey correlation degree to obtain a credential routing path, instead of weighted mean in existed methods of trust measurement. We guarantee that packet can secure transfer under the credential routing path and identify the remote routers that are subject to attacks.


Archive | 2011

Cross-layer trust certificate group management mechanism-based trusted P2P file sharing service node selection method

Bin Sun; Lize Gu; Shihui Zheng; Yu Yang; Yue Wang; Yixian Yang


international conference on advanced communication technology | 2010

Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme

Yanbin Sun; Lize Gu; Sihan Qing; Shihui Zheng; Bin Sun; Yixian Yang; Yan Sun


international conference on advanced communication technology | 2010

A novel verifiable dynamic multi-policy secret sharing scheme

Feng Wang; Lize Gu; Shihui Zheng; Yixian Yang; Zhengming Hu


Archive | 2011

Chord search protocol TrustChord based on trust management mechanism

Bin Sun; Lize Gu; Shihui Zheng; Yu Yang; Wei Zhang; Yixian Yang


ieee international conference on information theory and information security | 2010

An attack graph based network security evaluation model for hierarchical network

Haihui Ge; Lize Gu; Yixian Yang; Kewei Liu

Collaboration


Dive into the Lize Gu's collaboration.

Top Co-Authors

Avatar

Yixian Yang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Shihui Zheng

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Bin Sun

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yanbin Sun

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xinxin Niu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Binbin Liang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Daofeng Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Guosheng Xu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Haihui Ge

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jing Liu

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge