Yizhi Ren
Orcid: 0000-0002-1421-9164
According to our database1,
Yizhi Ren
authored at least 86 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
High invisibility image steganography with wavelet transform and generative adversarial network.
Expert Syst. Appl., 2024
Deep video inpainting detection and localization based on ConvNeXt dual-stream network.
Expert Syst. Appl., 2024
CoRR, 2024
2023
Mob. Networks Appl., October, 2023
J. Inf. Secur. Appl., August, 2023
Inf. Sci., July, 2023
A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services.
IEEE Trans. Cloud Comput., 2023
Proceedings of the Natural Language Processing and Chinese Computing, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems.
IEICE Trans. Inf. Syst., 2022
Proceedings of the Natural Language Processing and Chinese Computing, 2022
2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
TruthTrust: Truth Inference-Based Trust Management Mechanism on a Crowdsourcing Platform.
Sensors, 2021
2020
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks.
IEICE Trans. Inf. Syst., 2020
Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts.
Concurr. Comput. Pract. Exp., 2020
Comput. Secur., 2020
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things.
IEEE Access, 2020
2019
SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks.
Sensors, 2019
Sensors, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
Soft Comput., 2018
Deep Reinforcement Learning for Multimedia Traffic Control in Software Defined Networking.
IEEE Netw., 2018
Rigorous or tolerant: The effect of different reputation attitudes in complex networks.
Future Gener. Comput. Syst., 2018
Expert Syst. Appl., 2018
Appl. Math. Comput., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
Practical <i>m</i>-<i>k</i>-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Secur. Commun. Networks, 2017
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016
Effect of Different Migration Strategies on Evolution of Cooperation in Spatial Prisoner's Dilemma Game.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Insurance Strategy Can Promote Cooperation in the Presence of Antisocial Punishment in Public Goods Game.
Proceedings of the International Conference on Identification, 2015
Reputation-Based Conditional Investment Enhances the Evolution of Cooperation in Spatial Public Goods Game.
Proceedings of the International Conference on Identification, 2015
Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments.
J. Netw. Comput. Appl., 2014
J. Comput., 2014
J. Comput., 2014
J. Comput., 2014
2013
J. Comput. Virol. Hacking Tech., 2013
J. Supercomput., 2013
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Inf. Secur., 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2012
Secur. Commun. Networks, 2012
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012
Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Netw. Comput. Appl., 2012
J. Comput. Syst. Sci., 2012
Int. J. Comput. Intell. Syst., 2012
Concurr. Comput. Pract. Exp., 2012
2011
Secur. Commun. Networks, 2011
J. Next Gener. Inf. Technol., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
Proceedings of the Symposia and Workshops on Ubiquitous, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008