Ru Li

Orcid: 0000-0001-6660-5633

Affiliations:
  • Inner Mongolia University, Hohhot, China


According to our database1, Ru Li authored at least 51 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Trustworthiness Sequence Prediction Scheme Based on Neural Networks and Mathematical Calculations.
IEEE Internet Things J., June, 2024

A Trustworthiness Evaluation Mechanism Based on Principles-Assumptions Model.
IEEE Internet Things J., May, 2024

A Distance Metric Learning Model Based On Variational Information Bottleneck.
CoRR, 2024

DART: A Low-Cost and Secure Cross-Chain Scheme for Popular Digital Assets.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

CLPSD: Detecting Ethereum Phishing Scams based on Curriculum Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024

Data Lineage Construction Method for Multi-Chain-Based Data Assets Marketplaces.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Curriculum Learning for Ethereum Phishing Scam Detection.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Ethereum Phishing Scams Detection Based on Graph Contrastive Learning with Augmentations.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
A Parallel Consensus Mechanism Using PBFT Based on DAG-Lattice Structure in the Internet of Vehicles.
IEEE Internet Things J., 2023

A Comprehensive Review for 4-D Trust Management in Distributed IoT.
IEEE Internet Things J., 2023

Referable NFT-based Revenue Allocation Mechanism in Data Marketplace.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Information Entropy Composition Algorithms for Multipath Trust Relationships in Trust Propagation.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Research on False Comment Recognition Algorithm Integrating crazy fan base Subculture Phenomenon.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Blockchain-based Trust Management Mechanism in V-NDN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

A Fake Message and Malicious Node Detection Method Using Machine Learning in V-NDN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Information Dissemination Model Based on Blockchain Social Network.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Research on Medical Data Storage and Secure Sharing Scheme Based on Blockchain.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Multi-feature content popularity prediction algorithm based on GRU-Attention in V-NDN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Research on Malicious Account Detection Mechanism of Ethereum Based on Community Discovery.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Access Service Records Based Trust Management Scheme for Internet of Things.
CoRR, 2022

NFT-basedAccess Control in Named Data Networks.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Detecting Phishing Scams on Ethereum Using Graph Convolutional Networks with Conditional Random Field.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Research on Automatic Generation of Comment Labels Oriented to Users' Individualized Needs.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

User Preference Modeling on Heterogeneous Implicit Feedback with Transfer Learning<sup>1</sup>.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Research on User's Mental Health Based on Comment Text.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2022

2021
V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2021

Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network.
Secur. Commun. Networks, 2021

The Random Content Poisoning Attack in NDN.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Survey on Blockchain Data Analysis.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
A caching strategy based on dynamic popularity for named data networking.
Int. J. Inf. Technol. Manag., 2020

Smart Contract-Based Trusted Content Retrieval Mechanism for NDN.
IEEE Access, 2020

A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control.
IEEE Access, 2020

Permission Token Segmentation Scheme based on Blockchain Access Control.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDN.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

2019
Study on data sparsity in social network-based recommender system.
Int. J. Comput. Sci. Eng., 2019

Register before Publishing with Smart Forwarding, Mitigate Content Poisoning Attack in ICN.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

A Distributed Content Placement Strategy Based on Popularity for ICN.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

A Charging/Rewarding mechanism-based Interest Flooding Attack mitigation strategy in NDN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

An ARI-HMM based Interest Flooding Attack countermeasure in NDN.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

2018
A Probabilistic Model of File Transfer Time Based on Markov Chain in Vehicular Ad Hoc Networks.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

A Cache Replacement Strategy Based on Hierarchical Popularity in NDN.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

User-Driven Smart Home Control System Based on Named Data Networking.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Dynamic Popularity-Based Caching Permission Strategy for Named Data Networking.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Modeling User Purchase Preference Based on Implicit Feedback.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Research on Access Control of Smart Home in NDN (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Research of the interest packet popple broadcast diffusion attack in NDN VANET.
Proceedings of the Symposium on Applied Computing, 2017

ROI-Based forwarding strategy for named data delay tolerant networking.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

A greedy and neighbor aware data forwarding protocol in named data MANETs.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

E-commerce purchase prediction approach by user behavior data.
Proceedings of the International Conference on Computer, 2017

2016
Limited space oriented optimized storage protocol in autonomous mobile cloud.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016


  Loading...