Ruizhong Du
Orcid: 0000-0003-1794-1504
According to our database1,
Ruizhong Du
authored at least 59 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things.
J. Supercomput., November, 2024
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System.
IEEE Trans. Netw. Serv. Manag., October, 2024
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks.
J. Supercomput., May, 2024
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach.
J. Supercomput., May, 2024
Wirel. Networks, April, 2024
MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control.
J. Parallel Distributed Comput., March, 2024
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing.
J. Comput. Secur., 2024
Concurr. Comput. Pract. Exp., 2024
Comput. Secur., 2024
StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT.
Comput. Networks, 2024
Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Multi-attribute Semantic Adversarial Attack Based on Cross-layer Interpolation for Face Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2024
Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2024
TVD-BERT: A Domain-Adaptation Pre-trained Model for Textural Vulnerability Descriptions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the 21st ACM International Conference on Computing Frontiers, 2024
2023
Refined statistical attacks against searchable symmetric encryption using non-indexed documents.
J. Inf. Secur. Appl., December, 2023
Peer Peer Netw. Appl., September, 2023
J. Inf. Secur. Appl., June, 2023
Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios.
IEEE Trans. Veh. Technol., May, 2023
DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain.
IEEE Trans. Cloud Comput., 2023
Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs.
IEEE Trans. Cloud Comput., 2023
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Pattern-protecting Dynamic Searchable Symmetric Encryption Based on Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval.
Proceedings of the Advances in Computer Graphics, 2023
2022
Secur. Commun. Networks, 2022
Mob. Networks Appl., 2022
Mob. Networks Appl., 2022
Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain.
J. Web Eng., 2022
Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning.
J. Grid Comput., 2022
Multiuser physical layer security mechanism in the wireless communication system of the IIOT.
Comput. Secur., 2022
Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
A lightweight heterogeneous network clustering algorithm based on edge computing for 5G.
Wirel. Networks, 2020
IEEE Access, 2020
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
2019
IEEE Access, 2019
2018
2011
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2010
Proceedings of the International Conference on E-Business and E-Government, 2010
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Advances in Machine Learning and Cybernetics, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005