Rui Zhang

Orcid: 0000-0002-4117-2656

Affiliations:
  • Ocean University of China, College of Computer Science and Technology, Qingdao, China
  • Qingdao University, College of Computer Science and Technology, China


According to our database1, Rui Zhang authored at least 23 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things.
Expert Syst. Appl., December, 2023

FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition.
Comput. Secur., December, 2023

FedME<sup>2</sup>: Memory Evaluation & Erase Promoting Federated Unlearning in DTMN.
IEEE J. Sel. Areas Commun., November, 2023

Robust Clustering Model Based on Attention Mechanism and Graph Convolutional Network.
IEEE Trans. Knowl. Data Eng., May, 2023

A dynamic adaptive iterative clustered federated learning scheme.
Knowl. Based Syst., 2023

QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

2022
Generating Adversarial Examples With Shadow Model.
IEEE Trans. Ind. Informatics, 2022

FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair.
CoRR, 2022

AdvSmo: Black-box Adversarial Attack by Smoothing Linear Structure of Texture.
CoRR, 2022

SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors?
CoRR, 2022

Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Network Defense Resource Allocation Scheme with Multi-armed Bandits.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning.
Wirel. Commun. Mob. Comput., 2021

Optimization scheme for intrusion detection scheme GBDT in edge computing center.
Comput. Commun., 2021

Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas.
IEEE/ACM Trans. Netw., 2020

An Intrusion Detection Scheme Based on Repeated Game in Smart Home.
Mob. Inf. Syst., 2020

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020

A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020

Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020

A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019


  Loading...