Ou Ruan

Orcid: 0000-0001-8189-3258

According to our database1, Ou Ruan authored at least 30 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Tensor-based gated graph neural network for automatic vulnerability detection in source code.
Softw. Test. Verification Reliab., March, 2024

2022
Secure and efficient publicly verifiable ridge regression outsourcing scheme.
Proceedings of the IEEE International Conference on Trust, 2022

Nonconvex-NLTV Regularization-Based SAR Image Feature Enhancement with Water Body Information Extraction Using QILU-1 SAR Data.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

A Delegated Offline Private Set Intersection Protocol for Cloud Computing Environments.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

2021
Location-sharing protocol for privacy protection in mobile online social networks.
EURASIP J. Wirel. Commun. Netw., 2021

2020
Efficient Private Set Intersection Using Point-Value Polynomial Representation.
Secur. Commun. Networks, 2020

An Efficient Private Set Intersection Protocol for the Cloud Computing Environments.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

2019
Provably leakage-resilient three-party password-based authenticated key exchange.
J. Ambient Intell. Humaniz. Comput., 2019

Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange.
Int. J. Netw. Secur., 2019

New Approach to Set Representation and Practical Private Set-Intersection Protocols.
IEEE Access, 2019

An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange.
IEEE Syst. J., 2018

An Efficient Oblivious Transfer Protocol with Access Control.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model.
IEEE Access, 2017

An Efficient Provably Secure Password-Based Authenticated Key Agreement.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Leakage-Resilient Password-Based Authenticated Key Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Advances in Internetworking, 2017

Fast Iterative Reconstruction Based on Condensed Hierarchy Tree.
Proceedings of the Advances in Internetworking, 2017

Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image.
Proceedings of the Advances in Internetworking, 2017

The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering.
Proceedings of the Advances in Internetworking, 2017

A Method for Estimating the Camera Parameters Based on Vanishing Points.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

PaEffExtr: A Method to Extract Effect Statements Automatically from Patents.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
An efficient resource-fair commit-prove-fair-open protocol.
Int. J. Electron. Secur. Digit. Forensics, 2016

2015
Efficient provably secure password-based explicit authenticated key agreement.
Pervasive Mob. Comput., 2015

2014
An efficient fair UC-secure protocol for two-party computation.
Secur. Commun. Networks, 2014

A New Identity-Based Authentication Scheme for SIP.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Efficient Fair Secure Two-Party Computation.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
An Efficient Protocol for the Commit-Prove-Fair-Open functionality.
IACR Cryptol. ePrint Arch., 2011


  Loading...