Rui Zhang

Orcid: 0000-0002-4117-2656

Affiliations:
  • Ocean University of China, College of Computer Science and Technology, Qingdao, China
  • Qingdao University, College of Computer Science and Technology, China


According to our database1, Rui Zhang authored at least 39 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CATIL: Customized adversarial training based on instance loss.
Inf. Sci., 2025

KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning.
Future Gener. Comput. Syst., 2025

2024
Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices.
IEEE Trans. Consumer Electron., February, 2024

MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users.
IEEE Trans. Consumer Electron., February, 2024

Classification optimization node injection attack on graph neural networks.
Knowl. Based Syst., 2024

FedNor: A robust training framework for federated learning based on normal aggregation.
Inf. Sci., 2024

Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack.
IEEE Internet Things J., 2024

FLPM: A property modification scheme for data protection in federated learning.
Future Gener. Comput. Syst., 2024

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation.
Future Gener. Comput. Syst., 2024

Multi-agent DRL for edge computing: A real-time proportional compute offloading.
Comput. Networks, 2024

Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2024

DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Collaborative Adversarial Learning for Unsupervised Federated Domain Adaptation.
Proceedings of the Knowledge Science, Engineering and Management, 2024

An Invisible Backdoor Attack on Cloud Computing in the Internet of Things.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

2023
Reinvigorating sustainability in Internet of Things marketing: Framework for multi-round real-time bidding with game machine learning.
Internet Things, December, 2023

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things.
Expert Syst. Appl., December, 2023

FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition.
Comput. Secur., December, 2023

FedME<sup>2</sup>: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN.
IEEE J. Sel. Areas Commun., November, 2023

Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network.
IEEE Trans. Knowl. Data Eng., May, 2023

A dynamic adaptive iterative clustered federated learning scheme.
Knowl. Based Syst., 2023

QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

2022
Generating Adversarial Examples With Shadow Model.
IEEE Trans. Ind. Informatics, 2022

FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair.
CoRR, 2022

AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture.
CoRR, 2022

SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?
CoRR, 2022

Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Network Defense Resource Allocation Scheme with Multi-armed Bandits.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning.
Wirel. Commun. Mob. Comput., 2021

Optimization scheme for intrusion detection scheme GBDT in edge computing center.
Comput. Commun., 2021

Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas.
IEEE/ACM Trans. Netw., 2020

An Intrusion Detection Scheme Based on Repeated Game in Smart Home.
Mob. Inf. Syst., 2020

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020

A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020

Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020

A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019


  Loading...