default search action
Ruizhong Du
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Ruizhong Du, Tianyang Chen, Jin Tian, Tao Shang:
StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT. Comput. Networks 253: 110718 (2024) - [j27]Ruizhong Du, Zhuang Liang, Xiaoyan Liang:
Privacy-preserving quadratic truth discovery based on Precision partitioning. Comput. Secur. 146: 104039 (2024) - [j26]Ruizhong Du, Chuan Liu, Yan Gao:
Anonymous federated learning framework in the internet of things. Concurr. Comput. Pract. Exp. 36(2) (2024) - [j25]Yan Gao, Ruizhong Du, Xiaofei Wang, Ruilin Li, Mingyue Li, Ziyuan Wang:
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing. J. Comput. Secur. 32(4): 405-423 (2024) - [j24]Jin Tian, Junfeng Tian, Ruizhong Du:
MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control. J. Parallel Distributed Comput. 185: 104795 (2024) - [j23]Ruizhong Du, Jingya Wang, Yan Gao:
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks. J. Supercomput. 80(8): 10275-10300 (2024) - [j22]Ruizhong Du, Bowen Cao, Yan Gao:
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach. J. Supercomput. 80(8): 10485-10510 (2024) - [j21]Ruizhong Du, Jinru Wu, Yan Gao:
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things. J. Supercomput. 80(17): 25590-25615 (2024) - [j20]Jin Tian, Junfeng Tian, Ruizhong Du:
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System. IEEE Trans. Netw. Serv. Manag. 21(5): 5566-5581 (2024) - [j19]Ruizhong Du, Guangwen Yang, Mingyue Li:
A collaborative offloading framework for multiple UAV considering service caching. Wirel. Networks 30(3): 1657-1670 (2024) - [c31]Yushan Zhang, Xiaoyan Liang, Ruizhong Du, Junfeng Tian:
DP-Discriminator: A Differential Privacy Evaluation Tool Based on GAN. CF 2024 - [c30]Ruizhong Du, Xijie She, Mingyue Li, Ziyuan Wang:
Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions. ICIC (9) 2024: 110-121 - [c29]Ziyuan Wang, Xiaoyan Liang, Ruizhong Du, Junfeng Tian, Siyi Zhang:
TVD-BERT: A Domain-Adaptation Pre-trained Model for Textural Vulnerability Descriptions. ICIC (LNAI 1) 2024: 197-208 - [c28]Ruizhong Du, Yifan Wang, Mingyue Li, Tao Shang:
Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer. ICIC (8) 2024: 403-415 - [c27]Caixia Ma, Chunfu Jia, Ruizhong Du, Guanxiong Ha, Mingyue Li:
Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy. ICWS 2024: 371-382 - [c26]Ruizhong Du, Yidan Li, Mingyue Li, Jinjia Peng, Yuting Zhu, Caixia Ma:
Multi-attribute Semantic Adversarial Attack Based on Cross-layer Interpolation for Face Recognition. IJCNN 2024: 1-9 - [c25]Ruizhong Du, Shuai Li, Pengyuan Zhao:
A Behavioral Recognition-Based Federated Learning Framework for IoT Environments. IJCNN 2024: 1-9 - [c24]Mingyue Li, Yuting Zhu, Ruizhong Du, Chunfu Jia:
Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index. ICMR 2024: 193-201 - 2023
- [j18]Ruizhong Du, Na Liu, Mingyue Li, Junfeng Tian:
Block verifiable dynamic searchable encryption using redactable blockchain. J. Inf. Secur. Appl. 75: 103504 (2023) - [j17]Ruizhong Du, Yuchi Tai, Mingyue Li:
Refined statistical attacks against searchable symmetric encryption using non-indexed documents. J. Inf. Secur. Appl. 79: 103652 (2023) - [j16]Ruizhong Du, Chenghao Yu, Mingyue Li:
Enabling efficient and verifiable secure search on cloud-based encrypted big data. Peer Peer Netw. Appl. 16(5): 2574-2590 (2023) - [j15]Mingyue Li, Chunfu Jia, Ruizhong Du, Wei Shao:
Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs. IEEE Trans. Cloud Comput. 11(1): 1091-1102 (2023) - [j14]Mingyue Li, Chunfu Jia, Ruizhong Du, Wei Shao, Guanxiong Ha:
DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain. IEEE Trans. Cloud Comput. 11(3): 2856-2872 (2023) - [j13]Ruizhong Du, Lin Zhen, Yan Liu:
Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios. IEEE Trans. Veh. Technol. 72(5): 6154-6164 (2023) - [c23]Ruizhong Du, Jing Cui, Mingyue Li:
A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval. CGI (1) 2023: 43-55 - [c22]Ruizhong Du, Yuchi Tai, Mingyue Li:
A Highly Accurate Statistical Attack against Searchable Symmetric Encryption. ICPADS 2023: 2823-2826 - [c21]Ruizhong Du, Caixia Ma, Mingyue Li, Ziyang Zhang:
Pattern-protecting Dynamic Searchable Symmetric Encryption Based on Differential privacy. ICWS 2023: 626-637 - [c20]Ruizhong Du, Na Liu, Mingyue Li, Junfeng Tian:
RVDSE: Efficient Result Verifiable Searchable Encryption in Redactable Blockchain. ISCC 2023: 1013-1019 - [c19]Ruizhong Du, Na Liu, Mingyue Li, Caixia Ma:
Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries. ISCC 2023: 1362-1368 - [c18]Ruizhong Du, Jing Cui, Mingyue Li, Yuqing Zhang:
CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering. TrustCom 2023: 823-832 - [c17]Tao Shang, Jiayu Liu, Yuchen Liu, Yuanjing Zhang, Yazhuo Jiang, Ruizhong Du:
Quantum Network Coding Based on Quantum Steering. WCSP 2023: 171-176 - 2022
- [j12]Ruizhong Du, Lin Zhen:
Multiuser physical layer security mechanism in the wireless communication system of the IIOT. Comput. Secur. 113: 102559 (2022) - [j11]Ruizhong Du, Cui Liu, Yan Gao, PengNan Hao, ZiYuan Wang:
Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning. J. Grid Comput. 20(2): 14 (2022) - [j10]Ruizhong Du, Yan Gao, Cui Liu:
Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain. J. Web Eng. 21(5) (2022) - [j9]Mingyue Li, Ruizhong Du, Chunfu Jia:
Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries. Mob. Networks Appl. 27(1): 417-430 (2022) - [j8]Ruizhong Du, Yun Li, Xiaoyan Liang, Junfeng Tian:
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration. Mob. Networks Appl. 27(1): 431-440 (2022) - [j7]Ruizhong Du, Jingze Wang, Shuang Li:
A Lightweight Flow Feature-Based IoT Device Identification Scheme. Secur. Commun. Networks 2022: 8486080:1-8486080:10 (2022) - [c16]Ruizhong Du, Haoyu Jiang, Mingyue Li:
Lightweight Searchable Encryption with Small Clients on Edge Cloud. AsiaJCIS 2022: 41-48 - [c15]Ruizhong Du, Yan Gao:
DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing. DSN Workshops 2022: 182-185 - [c14]Ruizhong Du, Yuan Wang, ZiYuan Wang:
Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment. ISCC 2022: 1-7 - [c13]Ruizhong Du, Tianhe Zhang:
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme. SecureComm 2022: 272-289 - [c12]Ruizhong Du, Lin Zhen, Yan Liu:
Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks. WASA (1) 2022: 567-578 - 2021
- [c11]Ruizhong Du, Xiaoya Li, Yan Liu:
A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof. ICA3PP (2) 2021: 647-664 - [c10]Ruizhong Du, Shuang Li:
Identification of IoT Devices Based on Feature Vector Split. ISCC 2021: 1-6 - 2020
- [j6]Ruizhong Du, Kunqi Xu, Xiaoyan Liang:
Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing. IEEE Access 8: 146932-146943 (2020) - [j5]Ruizhong Du, Yan Liu, Liqun Liu, Wenpeng Du:
A lightweight heterogeneous network clustering algorithm based on edge computing for 5G. Wirel. Networks 26(3): 1631-1641 (2020) - [c9]Ruizhong Du, Yi Wang:
Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy. MSN 2020: 630-635 - [c8]Ruizhong Du, Wangkai He, Junfeng Tian:
Virtual Machine Security Migration Strategy Based on the Edge Computing Environment. MSN 2020: 803-808 - [c7]Yan Liu, Ruizhong Du:
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things. NaNA 2020: 375-380
2010 – 2019
- 2019
- [j4]Ruizhong Du, Jiaojiao Lu, Hongyun Cai:
Double Regularization Matrix Factorization Recommendation Algorithm. IEEE Access 7: 139668-139677 (2019) - 2018
- [j3]Junfeng Tian, Jiayao Zhang, Ruizhong Du:
Date Hierarchical Storage Strategy for Data Disaster Recovery. IEEE Access 6: 45606-45616 (2018) - 2011
- [j2]Xiaoxue Ma, Zixian Wang, Ruizhong Du:
Trust Evaluation Model based on Multiple Service Attributes. J. Networks 6(6): 842-849 (2011) - [j1]Ruizhong Du, Xiaoxue Ma:
Trust Evaluation Model based on Service Satisfaction. J. Softw. 6(10): 2001-2008 (2011) - [c6]Ruizhong Du, Pengyuan Zhao:
Subjective Trust Evaluation Model Based on Preferences. CSEE (2) 2011: 466-472 - 2010
- [c5]Ruizhong Du, Xiaoxue Ma, Zixian Wang:
Dynamic Trust Model Based on Perceived Risk. ICEE 2010: 2037-2040
2000 – 2009
- 2005
- [c4]Junfeng Tian, Weidong Zhao, Ruizhong Du:
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. CIS (2) 2005: 244-251 - [c3]Junfeng Tian, Yuling Liu, Xiao-hui Yang, Ruizhong Du:
Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent. ICMLC 2005: 70-80 - [c2]Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang:
A New Data Fusion Model of Intrusion Detection-IDSFP. ISPA 2005: 371-382 - [c1]Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang:
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection. PDCAT 2005: 115-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint