Dawu Gu

5.0k total citations
228 papers, 2.2k citations indexed

About

Dawu Gu is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Dawu Gu has authored 228 papers receiving a total of 2.2k indexed citations (citations by other indexed papers that have themselves been cited), including 173 papers in Artificial Intelligence, 69 papers in Information Systems and 69 papers in Computer Vision and Pattern Recognition. Recurrent topics in Dawu Gu's work include Cryptographic Implementations and Security (90 papers), Chaos-based Image/Signal Encryption (66 papers) and Advanced Malware Detection Techniques (66 papers). Dawu Gu is often cited by papers focused on Cryptographic Implementations and Security (90 papers), Chaos-based Image/Signal Encryption (66 papers) and Advanced Malware Detection Techniques (66 papers). Dawu Gu collaborates with scholars based in China, Belgium and United States. Dawu Gu's co-authors include Juanru Li, Ingrid Verbauwhede, Jeroen Delvaux, Dries Schellekens, Yuanyuan Zhang, Yanli Ren, Yuanyuan Zhang, Roel Peeters, Shi-Feng Sun and Wenbo Yang and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and ACM Computing Surveys.

In The Last Decade

Dawu Gu

202 papers receiving 2.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Dawu Gu China 24 1.2k 813 609 568 550 228 2.2k
Paul Kocher United States 11 1.4k 1.2× 553 0.7× 538 0.9× 765 1.3× 705 1.3× 19 2.1k
Thomas Eisenbarth Germany 22 1.6k 1.3× 947 1.2× 534 0.9× 517 0.9× 584 1.1× 88 2.2k
Stefan Mangard Austria 24 3.2k 2.6× 595 0.7× 1.1k 1.8× 1.8k 3.1× 554 1.0× 92 3.6k
David Naccache France 17 1.4k 1.2× 475 0.6× 353 0.6× 821 1.4× 287 0.5× 85 2.0k
Dengguo Feng China 22 1.3k 1.0× 1.1k 1.3× 445 0.7× 131 0.2× 899 1.6× 228 2.1k
Daniel Genkin United States 22 1.9k 1.6× 698 0.9× 943 1.5× 707 1.2× 566 1.0× 54 2.4k
Pankaj Rohatgi United States 17 1.1k 0.9× 393 0.5× 243 0.4× 825 1.5× 651 1.2× 46 2.0k
Elena Dubrova Sweden 20 609 0.5× 161 0.2× 123 0.2× 515 0.9× 343 0.6× 153 1.6k
David Lie Canada 20 1.2k 1.0× 1.1k 1.3× 1.2k 2.0× 258 0.5× 828 1.5× 66 2.3k
Samuel T. King United States 29 2.0k 1.7× 1.8k 2.2× 1.9k 3.1× 1.3k 2.3× 2.6k 4.8× 61 4.3k

Countries citing papers authored by Dawu Gu

Since Specialization
Citations

This map shows the geographic impact of Dawu Gu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dawu Gu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dawu Gu more than expected).

Fields of papers citing papers by Dawu Gu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dawu Gu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dawu Gu. The network helps show where Dawu Gu may publish in the future.

Co-authorship network of co-authors of Dawu Gu

This figure shows the co-authorship network connecting the top 25 collaborators of Dawu Gu. A scholar is included among the top collaborators of Dawu Gu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dawu Gu. Dawu Gu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gu, Dawu, et al.. (2025). Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust. IEEE Transactions on Dependable and Secure Computing. 23(2). 3798–3813.
2.
Zhang, Xiaojun, et al.. (2024). Enabling Authorized Fine-Grained Data Retrieval Over Aggregated Encrypted Medical Data in Cloud-Assisted E-Health Systems. IEEE Transactions on Cloud Computing. 12(4). 1131–1144. 1 indexed citations
3.
Gu, Dawu, et al.. (2024). Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. IEEE Transactions on Dependable and Secure Computing. 22(2). 1281–1298. 1 indexed citations
4.
Zhang, Chi, et al.. (2022). A nonprofiled side-channel analysis based on variational lower bound related to mutual information. Science China Information Sciences. 66(1). 1 indexed citations
5.
Liu, Ya, et al.. (2020). Improved Cryptanalysis of Reduced-Version QARMA-64/128. IEEE Access. 8. 8361–8370. 5 indexed citations
6.
Wang, Jianqiang, Siqi Ma, Yuanyuan Zhang, et al.. (2019). NLP-EYE: detecting memory corruptions via semantic-aware memory operation function identification. Queensland's institutional digital repository (The University of Queensland). 5 indexed citations
7.
Su, Chunhua, et al.. (2019). New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Transactions on Internet and Information Systems. 13(9). 1 indexed citations
8.
Li, Wei, et al.. (2018). Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. KSII Transactions on Internet and Information Systems. 12(7). 2 indexed citations
9.
Li, Wei, Dawu Gu, Zhiyong Gao, et al.. (2018). Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. KSII Transactions on Internet and Information Systems. 12(1). 3 indexed citations
10.
Zhang, Yuanyuan, et al.. (2017). Binary Code Clone Detection across Architectures and Compiling Configurations. 88–98. 48 indexed citations
11.
Ding, Ning, et al.. (2017). PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin. 667–680.
12.
Ding, Xuhua, et al.. (2017). Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed. Singapore Management University Institutional Knowledge (InK) (Singapore Management University). 799–813. 2 indexed citations
13.
Li, Wei, et al.. (2016). Security Analysis of the Whirlpool Hash Function in the Cloud of Things. KSII Transactions on Internet and Information Systems. 11(1). 4 indexed citations
14.
Li, Wei, et al.. (2015). Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. KSII Transactions on Internet and Information Systems. 9(2). 793–810. 7 indexed citations
15.
Ren, Yanli, et al.. (2015). Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme. 36(11). 2 indexed citations
16.
Delvaux, Jeroen, Dawu Gu, Dries Schellekens, & Ingrid Verbauwhede. (2014). Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?. Lecture notes in computer science. 451–475. 21 indexed citations
17.
Mouha, Nicky, Qingju Wang, Dawu Gu, & Bart Preneel. (2011). Differential and Linear Cryptanalysis using Mixed-Integer Linear Programming. Lecture notes in computer science. 7537. 57–76. 5 indexed citations
18.
Gu, Dawu. (2008). Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule. Journal of Communications. 5 indexed citations
19.
Gu, Dawu. (2007). Study on the Secure Communication Technology of Skype and QQ.
20.
Gu, Dawu. (2004). An Identity-based Authenticated Group Key Agreement Scheme. Jisuanji gongcheng. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026