Ruizhong Du

Orcid: 0000-0003-1794-1504

According to our database1, Ruizhong Du authored at least 59 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things.
J. Supercomput., November, 2024

MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System.
IEEE Trans. Netw. Serv. Manag., October, 2024

Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks.
J. Supercomput., May, 2024

Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach.
J. Supercomput., May, 2024

A collaborative offloading framework for multiple UAV considering service caching.
Wirel. Networks, April, 2024

MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control.
J. Parallel Distributed Comput., March, 2024

DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing.
J. Comput. Secur., 2024

Anonymous federated learning framework in the internet of things.
Concurr. Comput. Pract. Exp., 2024

Privacy-preserving quadratic truth discovery based on Precision partitioning.
Comput. Secur., 2024

StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT.
Comput. Networks, 2024

Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

A Behavioral Recognition-Based Federated Learning Framework for IoT Environments.
Proceedings of the International Joint Conference on Neural Networks, 2024

Multi-attribute Semantic Adversarial Attack Based on Cross-layer Interpolation for Face Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2024

Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2024

TVD-BERT: A Domain-Adaptation Pre-trained Model for Textural Vulnerability Descriptions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

DP-Discriminator: A Differential Privacy Evaluation Tool Based on GAN.
Proceedings of the 21st ACM International Conference on Computing Frontiers, 2024

2023
Refined statistical attacks against searchable symmetric encryption using non-indexed documents.
J. Inf. Secur. Appl., December, 2023

Enabling efficient and verifiable secure search on cloud-based encrypted big data.
Peer Peer Netw. Appl., September, 2023

Block verifiable dynamic searchable encryption using redactable blockchain.
J. Inf. Secur. Appl., June, 2023

Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios.
IEEE Trans. Veh. Technol., May, 2023

DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain.
IEEE Trans. Cloud Comput., 2023

Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs.
IEEE Trans. Cloud Comput., 2023

Quantum Network Coding Based on Quantum Steering.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

RVDSE: Efficient Result Verifiable Searchable Encryption in Redactable Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Pattern-protecting Dynamic Searchable Symmetric Encryption Based on Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2023

A Highly Accurate Statistical Attack against Searchable Symmetric Encryption.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval.
Proceedings of the Advances in Computer Graphics, 2023

2022
A Lightweight Flow Feature-Based IoT Device Identification Scheme.
Secur. Commun. Networks, 2022

Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries.
Mob. Networks Appl., 2022

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.
Mob. Networks Appl., 2022

Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain.
J. Web Eng., 2022

Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning.
J. Grid Comput., 2022

Multiuser physical layer security mechanism in the wireless communication system of the IIOT.
Comput. Secur., 2022

Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2022

Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Lightweight Searchable Encryption with Small Clients on Edge Cloud.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Identification of IoT Devices Based on Feature Vector Split.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A lightweight heterogeneous network clustering algorithm based on edge computing for 5G.
Wirel. Networks, 2020

Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing.
IEEE Access, 2020

Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020

Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Virtual Machine Security Migration Strategy Based on the Edge Computing Environment.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Double Regularization Matrix Factorization Recommendation Algorithm.
IEEE Access, 2019

2018
Date Hierarchical Storage Strategy for Data Disaster Recovery.
IEEE Access, 2018

2011
Trust Evaluation Model based on Service Satisfaction.
J. Softw., 2011

Trust Evaluation Model based on Multiple Service Attributes.
J. Networks, 2011

Subjective Trust Evaluation Model Based on Preferences.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Dynamic Trust Model Based on Perceived Risk.
Proceedings of the International Conference on E-Business and E-Government, 2010

2005
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Data Fusion Model of Intrusion Detection-IDSFP.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...