Rui-dong Chen

Orcid: 0000-0002-3083-014X

According to our database1, Rui-dong Chen authored at least 26 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
T2TD: Text-3D Generation Model Based on Prior Knowledge Guidance.
IEEE Trans. Pattern Anal. Mach. Intell., January, 2025

2024
GBDT-IL: Incremental Learning of Gradient Boosting Decision Trees to Detect Botnets in Internet of Things.
Sensors, April, 2024

Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading.
IEEE Trans. Dependable Secur. Comput., 2024

Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing.
IEEE Internet Things J., 2024

An Adversarial and Deep Hashing-based Hierarchical Supervised Cross-Modal Image and Text Retrieval Algorithm.
Int. J. Robotics Autom., 2024

AnyScene: Customized Image Synthesis with Composited Foreground.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Network Attack Strategy Generation Based on Multiagent Reinforcement Learning.
Proceedings of the 3rd International Conference on Artificial Intelligence, 2024

2023
Knowledge Distillation for Lightweight 2D Single-Person Pose Estimation.
J. Circuits Syst. Comput., February, 2023

Point-PC: Point Cloud Completion Guided by Prior Knowledge via Causal Inference.
CoRR, 2023

Point Cloud Adversarial Perturbation Generation for Adversarial Attacks.
IEEE Access, 2023

SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Differential Privacy for Tensor-Valued Queries.
IEEE Trans. Inf. Forensics Secur., 2022

A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Semantic Maximum Relevance and Modal Alignment for Cross-Modal Retrieval.
Proceedings of the 2022 11th International Conference on Computing and Pattern Recognition, 2022

Achieving Secure Dynamic Searchable Symmetric Encryption for Data Sharing Services via Blockchain.
Proceedings of the CAIBDA 2022, 2022

2021
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.
Secur. Commun. Networks, 2021

Hybrid Deep Neural Network-Based Cross-Modal Image and Text Retrieval Method for Large-Scale Data.
J. Circuits Syst. Comput., 2021

2020
Convolutional Neural Networks-Based Object Detection Algorithm by Jointing Semantic Segmentation for Images.
Sensors, 2020

A Distributional Robustness Certificate by Randomized Smoothing.
CoRR, 2020

2018
Chain-based big data access control infrastructure.
J. Supercomput., 2018

V-Chain: A Blockchain-Based Car Lease Platform.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Payment Routing Protocol for Economic Systems Based on Blockchain.
Proceedings of the 2018 International Conference on Computing, 2018

2017
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Trans. Inf. Syst., 2017

2016
Modeling Attack Process of Advanced Persistent Threat.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

2014
Conpy: Concolic Execution Engine for Python Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
ADS-B Data Authentication Based on AH Protocol.
Proceedings of the IEEE 11th International Conference on Dependable, 2013


  Loading...