Ruixuan Li

Affiliations:
  • School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China
  • Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China


According to our database1, Ruixuan Li authored at least 232 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Embedding Compression in Recommender Systems: A Survey.
ACM Comput. Surv., May, 2024

Hierarchical Local-Global Transformer for Temporal Sentence Grounding.
IEEE Trans. Multim., 2024

Masked Graph Autoencoder with Non-discrete Bandwidths.
CoRR, 2024

2023
SSTP: Social and Spatial-Temporal Aware Next Point-of-Interest Recommendation.
Data Sci. Eng., December, 2023

Few-Shot Temporal Sentence Grounding via Memory-Guided Semantic Learning.
IEEE Trans. Circuits Syst. Video Technol., May, 2023

The Security and Privacy of Mobile-Edge Computing: An Artificial Intelligence Perspective.
IEEE Internet Things J., 2023

A Blockchain-Based Secure Searching Strategy for Metadata in Mobile Edge Computing.
IEEE Internet Things J., 2023

PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation.
IACR Cryptol. ePrint Arch., 2023

Decoupling Representation and Knowledge for Few-Shot Intent Classification and Slot Filling.
CoRR, 2023

Enhancing the Rationale-Input Alignment for Self-explaining Rationalization.
CoRR, 2023

D-Separation for Causal Self-Explanation.
CoRR, 2023

Data-free Knowledge Distillation for Reusing Recommendation Models.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

Gradient Matching for Categorical Data Distillation in CTR Prediction.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

Decompose, Then Reconstruct: A Framework of Network Structures for Click-Through Rate Prediction.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

D-Separation for Causal Self-Explanation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Decoupled Rationalization with Asymmetric Learning Rates: A Flexible Lipschitz Restraint.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation.
Proceedings of the IEEE INFOCOM 2023, 2023

CSGCL: Community-Strength-Enhanced Graph Contrastive Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Semantic Stage-Wise Learning for Knowledge Distillation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Structure Diagram Recognition in Financial Announcements.
Proceedings of the Document Analysis and Recognition - ICDAR 2023, 2023

XFed: Improving Explainability in Federated Learning by Intersection Over Union Ratio Extended Client Selection.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Orthrus: A Dual-Branch Model for Time Series Forecasting with Multiple Exogenous Series.
Proceedings of the Database Systems for Advanced Applications, 2023

DaFKD: Domain-aware Federated Knowledge Distillation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

MGR: Multi-generator Based Rationalization.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

Adaptive Low-Precision Training for Embeddings in Click-Through Rate Prediction.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Error-Compensated Sparsification for Communication-Efficient Decentralized Training in Edge Environment.
IEEE Trans. Parallel Distributed Syst., 2022

A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing.
ACM Trans. Internet Techn., 2022

A Shapley value-based thermal-efficient workload distribution in heterogeneous data centers.
J. Supercomput., 2022

Intermittent Pulling With Local Compensation for Communication-Efficient Distributed Learning.
IEEE Trans. Emerg. Top. Comput., 2022

Loco-Store: Locality-Based Oblivious Data Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Heterogeneity-Aware Gradient Coding for Tolerating and Leveraging Stragglers.
IEEE Trans. Computers, 2022

Server temperature prediction using deep neural networks to assist thermal-aware scheduling.
Sustain. Comput. Informatics Syst., 2022

Trajectory planning for UAV navigation in dynamic environments with matrix alignment Dijkstra.
Soft Comput., 2022

Multimodal information fusion for android malware detection using lazy learning.
Multim. Tools Appl., 2022

A Comprehensive Survey on Training Acceleration for Large Machine Learning Models in IoT.
IEEE Internet Things J., 2022

Gradient Scheduling With Global Momentum for Asynchronous Federated Learning in Edge Environment.
IEEE Internet Things J., 2022

Android malware obfuscation variants detection method based on multi-granularity opcode features.
Future Gener. Comput. Syst., 2022

TSS: A two-party secure server-aid chunking algorithm.
Concurr. Comput. Pract. Exp., 2022

Community detection using multitopology and attributes in social networks.
Concurr. Comput. Pract. Exp., 2022

Margin-Based Few-Shot Class-Incremental Learning with Class-Level Overfitting Mitigation.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FR: Folded Rationalization with a Unified Encoder.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Deep Neural Factorization Machine for Recommender System.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Cross-domain Resemblance Detection based on Meta-learning for Cloud Storage.
Proceedings of the IEEE International Performance, 2022

Your Social Circle Affects Your Interests: Social Influence Enhanced Session-Based Recommendation.
Proceedings of the Computational Science - ICCS 2022, 2022

Contrastive Learning for Session-Based Recommendation.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Chunk Content is not Enough: Chunk-Context Aware Resemblance Detection for Deduplication Delta Compression.
Proceedings of the Data Compression Conference, 2022

CLZT: A Contrastive Learning Based Framework for Zero-Shot Text Classification.
Proceedings of the Database Systems for Advanced Applications, 2022

Context-aware Resemblance Detection based Deduplication Ratio Prediction for Cloud Storage.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

Contrastive Graph Learning for Session-based Recommendation.
Proceedings of the 4th International Conference on Artificial Intelligence and Advanced Manufacturing, 2022

2021
Corrections to "Joint Domain Adaptation Based on Adversarial Dynamic Parameter Learning".
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Joint Domain Adaptation Based on Adversarial Dynamic Parameter Learning.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Multi-granularity Deep Local Representations for Irregular Scene Text Recognition.
Trans. Data Sci., 2021

LOSP: Overlap Synchronization Parallel With Local Compensation for Fast Distributed Training.
IEEE J. Sel. Areas Commun., 2021

SNEAK: Synonymous Sentences-Aware Adversarial Attack on Natural Language Video Localization.
CoRR, 2021

Chunk Content is not Enough: Chunk-Context Aware Resemblance Detection for Deduplication Delta Compression.
CoRR, 2021

Sed-Dedup: An efficient secure deduplication system with data modifications.
Concurr. Comput. Pract. Exp., 2021

Multi-topical authority sensitive influence maximization with authority based graph pruning and three-stage heuristic optimization.
Appl. Intell., 2021

Fast Variable-Grained Resemblance Data Deduplication For Cloud Storage.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2021

Efficient Resolution-preserving Network for Real-time Semantic Segmentation.
Proceedings of the International Joint Conference on Neural Networks, 2021

Word Sense Disambiguation based on Sequence Topic Model using sense dependency.
Proceedings of the International Joint Conference on Neural Networks, 2021

Deep Reinforcement Learning based Optimization of Battery Charging and Discharging Management for Data Center.
Proceedings of the International Joint Conference on Neural Networks, 2021

Workload Prediction and VM Clustering Based Server Energy Optimization in Enterprise Cloud Data Center.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

HotFed: Hot Start through Self-Supervised Learning in Federated Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint Tracking.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

Chinese Administrative Penalty Event Extraction for Due Diligence in Financial Markets.
Proceedings of the Web Information Systems and Applications, 2021

2020
HeteroYARN: A Heterogeneous FPGA-Accelerated Architecture Based on YARN.
IEEE Trans. Parallel Distributed Syst., 2020

AMNN: Attention-Based Multimodal Neural Network Model for Hashtag Recommendation.
IEEE Trans. Comput. Soc. Syst., 2020

Adversarial joint domain adaptation of asymmetric feature mapping based on least squares distance.
Pattern Recognit. Lett., 2020

Attentive convolutional gated recurrent network: a contextual model to sentiment analysis.
Int. J. Mach. Learn. Cybern., 2020

Blockchain-based verification framework for data integrity in edge-cloud storage.
J. Parallel Distributed Comput., 2020

Blockchain-based accountability for multi-party oblivious RAM.
J. Parallel Distributed Comput., 2020

Multiagent Deep Reinforcement Learning for Joint Multichannel Access and Task Offloading of Mobile-Edge Computing in Industry 4.0.
IEEE Internet Things J., 2020

Intermittent Pulling with Local Compensation for Communication-Efficient Federated Learning.
CoRR, 2020

Sentiment analysis using deep learning approaches: an overview.
Sci. China Inf. Sci., 2020

Automated Rogue Behavior Detection for Android Applications.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

A Multi-Task Learning Approach to Improve Sentiment Analysis with Explicit Recommendation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Information Distribution Based Defense Against Physical Attacks on Object Detection.
Proceedings of the 2020 IEEE International Conference on Multimedia & Expo Workshops, 2020

Accelerating Distributed Deep Learning By Adaptive Gradient Quantization.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

CBI: A Data Access Control System Based on Cloud and Blockchain Integration.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Fine-Grained Text Sentiment Transfer via Dependency Parsing.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Tail: An Automated and Lightweight Gradient Compression Framework for Distributed Deep Learning.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

An Event-Oriented Neural Ranking Model for News Retrieval.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method.
Secur. Commun. Networks, 2019

Traffic identification method based on multiple probabilistic neural network model.
Neural Comput. Appl., 2019

面向Android第三方库的共谋行为检测 (Collusion Behavior Detection Towards Android Third-party Libraries).
计算机科学, 2019

Collaborative Caching in P2P Streaming Networks.
J. Netw. Syst. Manag., 2019

Polynomial and Exponential Bounded Logic Programs with Function Symbols: Some New Decidable Classes.
J. Artif. Intell. Res., 2019

Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019

EADP: An extended adaptive density peaks clustering for overlapping community detection in social networks.
Neurocomputing, 2019

AccUDNN: A GPU Memory Efficient Accelerator for Training Ultra-deep Deep Neural Networks.
CoRR, 2019

TDP: Personalized Taxi Demand Prediction Based on Heterogeneous Graph Embedding.
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019

A GPU memory efficient speed-up scheme for training ultra-deep neural networks: poster.
Proceedings of the 24th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2019

Privacy-Preserving MEC-Enabled Contextual Online Learning via SDN for Service Selection in IoT.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

Personalizing Session-based Recommendation with Dual Attentive Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2019

Ensemble Attention For Text Recognition In Natural Images.
Proceedings of the International Joint Conference on Neural Networks, 2019

ST-RNet: A Time-aware Point-of-interest Recommendation Method based on Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2019

OSP: Overlapping Computation and Communication in Parameter Server for Fast Machine Learning.
Proceedings of the 48th International Conference on Parallel Processing, 2019

A Survey: Transformation for Integrating Relational Database with Semantic Web.
Proceedings of the 2019 3rd International Conference on Management Engineering, 2019

Self-Representation Convolutional Neural Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Heterogeneity-aware Gradient Coding for Straggler Tolerance.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

AccUDNN: A GPU Memory Efficient Accelerator for Training Ultra-Deep Neural Networks.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Imbalance Rectification in Deep Logistic Regression for Multi-Label Image Classification Using Random Noise Samples.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Text Recognition using local correlation.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

2018
The training dataset for accelerated machine learning algorithms.
Dataset, November, 2018

Identify and Inspect Libraries in Android Applications.
Wirel. Pers. Commun., 2018

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2018

Mimir: a term-distributed retrieval system for secret documents.
Int. J. Inf. Commun. Technol., 2018

FRFB: Top-k Followee Recommendation by exploring the Following Behaviors in social networks.
Concurr. Comput. Pract. Exp., 2018

Topical Authority-Sensitive Influence Maximization.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

A Practical Accountability Scheme for Oblivious RAM in Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Distant Domain Adaptation for Text Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Stock Price Prediction Using Time Convolution Long Short-Term Memory Network.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Blockchain Based Data Integrity Verification in P2P Cloud Storage.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Topic-Bigram Enhanced Word Embedding Model.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Self-inhibition Residual Convolutional Networks for Chinese Sentence Classification.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Hashtag Recommendation with Attention-Based Neural Image Hashtagging Network.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

PTS-Dep: A High-Performance Two-Party Secure Deduplication for Cloud Storage.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Rank-Integrated Topic Modeling: A General Framework.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

Collaborative Caching in P2P Streaming Systems.
Proceedings of the Web Information Systems and Applications, 2018

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

EDS: An Efficient Data Selection policy for search engine storage architectures.
Future Gener. Comput. Syst., 2017

Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Does the content defined chunking really solve the local boundary shift problem?
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

A Practical Compartmentation Approach for the Android App Coexistence.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Microblogging User Tag Prediction Based on Bayesian.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
Truncated Kernel Projection Machine for Link Prediction.
J. Comput. Sci. Eng., 2016

Identifying malicious Android apps using permissions and system events.
Int. J. Embed. Syst., 2016

Role mining using answer set programming.
Future Gener. Comput. Syst., 2016

Divide-and-conquer approach for solving singular value decomposition based on MapReduce.
Concurr. Comput. Pract. Exp., 2016

An Approach for Automatically Generating R2RML-Based Direct Mapping from Relational Databases.
Proceedings of the Social Computing, 2016

DC-Top-k: A Novel Top-k Selecting Algorithm and Its Parallelization.
Proceedings of the 45th International Conference on Parallel Processing, 2016

2015
Role mining based on permission cardinality constraint and user cardinality constraint.
Secur. Commun. Networks, 2015

Role mining based on cardinality constraints.
Concurr. Comput. Pract. Exp., 2015

Semantic SPARQL Query in a Relational Database Based on Ontology Construction.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

Subtopic-Level Sentiment Analysis of Emergencies.
Proceedings of the Knowledge Science, Engineering and Management, 2015

An Efficient Data Selection Policy for Search Engine Cache Management.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Intersection Cache Based on Frequent Itemset Mining in Large Scale Search Engines.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

An Approach for Mapping Relational Database into Ontology.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
LIMTopic: A Framework of Incorporating Link Based Importance into Topic Modeling.
IEEE Trans. Knowl. Data Eng., 2014

Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud.
IEEE Trans. Cloud Comput., 2014

An efficient ECC-based mechanism for securing network coding-based P2P content distribution.
Peer-to-Peer Netw. Appl., 2014

Efficient multi-keyword ranked query over encrypted data in cloud computing.
Future Gener. Comput. Syst., 2014

Distributed caching in unstructured peer-to-peer file sharing networks.
Comput. Electr. Eng., 2014

Optimizing ranking method using social annotations based on language model.
Artif. Intell. Rev., 2014

Name disambiguation in scientific cooperation network by exploiting user feedback.
Artif. Intell. Rev., 2014

Detecting network communities using regularized spectral clustering algorithm.
Artif. Intell. Rev., 2014

2013
Measurement study on P2P streaming systems.
J. Supercomput., 2013

Finding high-influence microblog users with an improved PSO algorithm.
Int. J. Model. Identif. Control., 2013

A MapReduce task scheduling algorithm for deadline constraints.
Clust. Comput., 2013

MEI: Mutual Enhanced Infinite Community-Topic Model for Analyzing Text-Augmented Social Networks.
Comput. J., 2013

A model based transformation paradigm for cross-language collaborations.
Adv. Eng. Informatics, 2013

Role Mining Using Boolean Matrix Decomposition with Hierarchy.
Proceedings of the 12th IEEE International Conference on Trust, 2013

RMiner: a tool set for role mining.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Keyword-Matched Data Skyline in Peer-to-Peer Systems.
Proceedings of the Database Systems for Advanced Applications, 2013

A divide-and-conquer approach for solving singular value decomposition on a heterogeneous system.
Proceedings of the Computing Frontiers Conference, 2013

2012
Mining constraints in role-based access control.
Math. Comput. Model., 2012

Proactive replication for rare objects in unstructured peer-to-peer networks.
J. Netw. Comput. Appl., 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Trans. Commun., 2012

Modeling semantic information in engineering applications: a review.
Artif. Intell. Rev., 2012

Incremental K-clique clustering in dynamic social networks.
Artif. Intell. Rev., 2012

Efficient Algorithms for Constrained Subspace Skyline Query in Structured Peer-to-Peer Systems.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

PASS: A Hybrid Storage System for Performance-Synchronization Tradeoffs Using SSDs.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

MTSD: A Task Scheduling Algorithm for MapReduce Base on Deadline Constraints.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

CAST: A page-level FTL with compact address mapping and parallel data blocks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

An Efficient SSD-based Hybrid Storage Architecture for Large-Scale Search Engines.
Proceedings of the 41st International Conference on Parallel Processing, 2012

Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

RankTopic: Ranking Based Topic Modeling.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Efficient Online Index Maintenance for SSD-based Information Retrieval Systems.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

A New RBAC Based Access Control Model for Cloud Computing.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

ℓ1-Graph Based Community Detection in Online Social Networks.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

A GPU-Based Accelerator for Chinese Word Segmentation.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Corrigendum to "A flabellate overlay network for multi-attribute search" [J. Parallel Distrib. Comput. 71 (2011) 407-423].
J. Parallel Distributed Comput., 2011

A flabellate overlay network for multi-attribute search.
J. Parallel Distributed Comput., 2011

Trustworthy assurance of service interoperation in cloud environment.
Int. J. Autom. Comput., 2011

RAR: A role-and-risk based flexible framework for secure collaboration.
Future Gener. Comput. Syst., 2011

Type-2 fuzzy description logic.
Frontiers Comput. Sci. China, 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wirel. Commun. Netw., 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurr. Comput. Pract. Exp., 2011

Topic-based ranking in Folksonomy via probabilistic model.
Artif. Intell. Rev., 2011

Incorporating User Feedback into Name Disambiguation of Scientific Cooperation Network.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A New Vector Space Model Exploiting Semantic Correlations of Social Annotations for Web Page Clustering.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

Measuring Social Tag Confidence: Is It a Good or Bad Tag?
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Fast Snippet Generation Based on CPU-GPU Hybrid System.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Distributed Caching Strategies in Peer-to-Peer Systems.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

MEI: Mutual Enhanced Infinite Generative Model for Simultaneous Community and Topic Detection.
Proceedings of the Discovery Science - 14th International Conference, 2011

Measurement Study on PPLive Based on Channel Popularity.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

An Encrypted Index Mechanism in Ciphertext Retrieval System.
Proceedings of the 8th Web Information Systems and Applications Conference, 2011

2010
PercolationNET: A multi-tree P2P overlay network supporting high coverage search.
Int. J. Parallel Emergent Distributed Syst., 2010

Consistency Checking of Safety and Availability in Access Control.
IEICE Trans. Inf. Syst., 2010

Semantic Grounding of Hybridization for Tag Recommendation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Proactive Replication and Search for Rare Objects in Unstructured Peer-to-Peer Networks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Role mining based on weights.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Role updating for assignments.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Automatic Update of Access Control Policy.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

Topic-Sensitive Tag Ranking.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Searching Concepts and Association Relationships Based on Domain Ontology.
Proceedings of the GCC 2010, 2010

Optimizing Academic Conference Classification Using Social Tags.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Mimir: Term-distributed indexing and search for secret documents.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A logic for authorization provenance.
Proceedings of the 5th ACM Symposium on Information, 2010

TGP: Mining Top-K Frequent Closed Graph Pattern without Minimum Support.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
A Novel Approach to Improve the Security of P2P File-Sharing Systems.
Int. J. Commun. Netw. Syst. Sci., 2009

On Role Mappings for RBAC-Based Secure Interoperation.
Proceedings of the Third International Conference on Network and System Security, 2009

Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

Managing Authorization Provenance: A Modal Logic Based Approach.
Proceedings of the ICTAI 2009, 2009

High Coverage Search in Multi-Tree Based P2P Overlay Network.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Request-driven role mapping framework for secure interoperation in multi-domain environments.
Comput. Syst. Sci. Eng., 2008

A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

SemSearch: A Scalable Semantic Searching Algorithm for Unstructured P2P Network.
Proceedings of the Progress in WWW Research and Development, 2008

FAN: A Scalable Flabellate P2P Overlay Supporting Multi-Dimensional Attributes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Towards a Type-2 Fuzzy Description Logic for Semantic Search Engine.
Proceedings of the Advances in Data and Web Management, 2007

ICache: A Size-Aware Cooperative Caching Architecture for Web Images.
Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), 2007

Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.
Proceedings of the Information Security and Cryptology, 2007

P2P-based Locking in Real-Time Collaborative Editing Systems.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An ECG Parallel Scheduling Algorithm for the Distributed Systems.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

An Improved Semantic Search Model Based on Hybrid Fuzzy Description Logic.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

A Semantic Search Conceptual Model and Application in Security Access Control.
Proceedings of the Semantic Web, 2006

2005
Dynamic Role and Context-Based Access Control for Grid Applications.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Service Publishing and Discovering Model in a Web Services Oriented Peer-to-Peer System.
Proceedings of the Web Engineering, 5th International Conference, 2005

WebPeer: A P2P-based System for Publishing and Discovering Web Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2003
Schema Mapping for Interoperability in XML-Based Multidatabase Systems.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2001
An Architecture for Multidatabase Systems Based on CORBA and XML.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001


  Loading...