Ruixuan Li

According to our database1, Ruixuan Li authored at least 128 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Traffic identification method based on multiple probabilistic neural network model.
Neural Computing and Applications, 2019

Polynomial and Exponential Bounded Logic Programs with Function Symbols: Some New Decidable Classes.
J. Artif. Intell. Res., 2019

A GPU memory efficient speed-up scheme for training ultra-deep neural networks: poster.
Proceedings of the 24th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2019

2018
Identify and Inspect Libraries in Android Applications.
Wireless Personal Communications, 2018

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.
IEEE Trans. Cloud Computing, 2018

Mimir: a term-distributed retrieval system for secret documents.
IJICT, 2018

FRFB: Top-k Followee Recommendation by exploring the Following Behaviors in social networks.
Concurrency and Computation: Practice and Experience, 2018

Topical Authority-Sensitive Influence Maximization.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

A Practical Accountability Scheme for Oblivious RAM in Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Distant Domain Adaptation for Text Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Stock Price Prediction Using Time Convolution Long Short-Term Memory Network.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Blockchain Based Data Integrity Verification in P2P Cloud Storage.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Topic-Bigram Enhanced Word Embedding Model.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Self-inhibition Residual Convolutional Networks for Chinese Sentence Classification.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Hashtag Recommendation with Attention-Based Neural Image Hashtagging Network.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

PTS-Dep: A High-Performance Two-Party Secure Deduplication for Cloud Storage.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Rank-Integrated Topic Modeling: A General Framework.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

Collaborative Caching in P2P Streaming Systems.
Proceedings of the Web Information Systems and Applications, 2018

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

EDS: An Efficient Data Selection policy for search engine storage architectures.
Future Generation Comp. Syst., 2017

Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Does the content defined chunking really solve the local boundary shift problem?
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

A Practical Compartmentation Approach for the Android App Coexistence.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Microblogging User Tag Prediction Based on Bayesian.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
Truncated Kernel Projection Machine for Link Prediction.
JCSE, 2016

Identifying malicious Android apps using permissions and system events.
IJES, 2016

Role mining using answer set programming.
Future Generation Comp. Syst., 2016

Divide-and-conquer approach for solving singular value decomposition based on MapReduce.
Concurrency and Computation: Practice and Experience, 2016

An Approach for Automatically Generating R2RML-Based Direct Mapping from Relational Databases.
Proceedings of the Social Computing, 2016

DC-Top-k: A Novel Top-k Selecting Algorithm and Its Parallelization.
Proceedings of the 45th International Conference on Parallel Processing, 2016

2015
Role mining based on permission cardinality constraint and user cardinality constraint.
Security and Communication Networks, 2015

Role mining based on cardinality constraints.
Concurrency and Computation: Practice and Experience, 2015

Semantic SPARQL Query in a Relational Database Based on Ontology Construction.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

Subtopic-Level Sentiment Analysis of Emergencies.
Proceedings of the Knowledge Science, Engineering and Management, 2015

An Efficient Data Selection Policy for Search Engine Cache Management.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Intersection Cache Based on Frequent Itemset Mining in Large Scale Search Engines.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

An Approach for Mapping Relational Database into Ontology.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
LIMTopic: A Framework of Incorporating Link Based Importance into Topic Modeling.
IEEE Trans. Knowl. Data Eng., 2014

Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud.
IEEE Trans. Cloud Computing, 2014

An efficient ECC-based mechanism for securing network coding-based P2P content distribution.
Peer-to-Peer Networking and Applications, 2014

Efficient multi-keyword ranked query over encrypted data in cloud computing.
Future Generation Comp. Syst., 2014

Distributed caching in unstructured peer-to-peer file sharing networks.
Computers & Electrical Engineering, 2014

Optimizing ranking method using social annotations based on language model.
Artif. Intell. Rev., 2014

Name disambiguation in scientific cooperation network by exploiting user feedback.
Artif. Intell. Rev., 2014

Detecting network communities using regularized spectral clustering algorithm.
Artif. Intell. Rev., 2014

2013
Measurement study on P2P streaming systems.
The Journal of Supercomputing, 2013

Finding high-influence microblog users with an improved PSO algorithm.
IJMIC, 2013

A MapReduce task scheduling algorithm for deadline constraints.
Cluster Computing, 2013

MEI: Mutual Enhanced Infinite Community-Topic Model for Analyzing Text-Augmented Social Networks.
Comput. J., 2013

A model based transformation paradigm for cross-language collaborations.
Advanced Engineering Informatics, 2013

Role Mining Using Boolean Matrix Decomposition with Hierarchy.
Proceedings of the 12th IEEE International Conference on Trust, 2013

RMiner: a tool set for role mining.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Keyword-Matched Data Skyline in Peer-to-Peer Systems.
Proceedings of the Database Systems for Advanced Applications, 2013

A divide-and-conquer approach for solving singular value decomposition on a heterogeneous system.
Proceedings of the Computing Frontiers Conference, 2013

2012
Mining constraints in role-based access control.
Mathematical and Computer Modelling, 2012

Proactive replication for rare objects in unstructured peer-to-peer networks.
J. Network and Computer Applications, 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Transactions, 2012

Modeling semantic information in engineering applications: a review.
Artif. Intell. Rev., 2012

Incremental K-clique clustering in dynamic social networks.
Artif. Intell. Rev., 2012

Efficient Algorithms for Constrained Subspace Skyline Query in Structured Peer-to-Peer Systems.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

PASS: A Hybrid Storage System for Performance-Synchronization Tradeoffs Using SSDs.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

MTSD: A Task Scheduling Algorithm for MapReduce Base on Deadline Constraints.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

CAST: A page-level FTL with compact address mapping and parallel data blocks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

An Efficient SSD-based Hybrid Storage Architecture for Large-Scale Search Engines.
Proceedings of the 41st International Conference on Parallel Processing, 2012

Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

RankTopic: Ranking Based Topic Modeling.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Efficient Online Index Maintenance for SSD-based Information Retrieval Systems.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

A New RBAC Based Access Control Model for Cloud Computing.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

ℓ1-Graph Based Community Detection in Online Social Networks.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

A GPU-Based Accelerator for Chinese Word Segmentation.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Corrigendum to "A flabellate overlay network for multi-attribute search" [J. Parallel Distrib. Comput. 71 (2011) 407-423].
J. Parallel Distrib. Comput., 2011

A flabellate overlay network for multi-attribute search.
J. Parallel Distrib. Comput., 2011

RAR: A role-and-risk based flexible framework for secure collaboration.
Future Generation Comp. Syst., 2011

Type-2 fuzzy description logic.
Frontiers Comput. Sci. China, 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wireless Comm. and Networking, 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurrency and Computation: Practice and Experience, 2011

Topic-based ranking in Folksonomy via probabilistic model.
Artif. Intell. Rev., 2011

Incorporating User Feedback into Name Disambiguation of Scientific Cooperation Network.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A New Vector Space Model Exploiting Semantic Correlations of Social Annotations for Web Page Clustering.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

Measuring Social Tag Confidence: Is It a Good or Bad Tag?
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Fast Snippet Generation Based on CPU-GPU Hybrid System.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Distributed Caching Strategies in Peer-to-Peer Systems.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

MEI: Mutual Enhanced Infinite Generative Model for Simultaneous Community and Topic Detection.
Proceedings of the Discovery Science - 14th International Conference, 2011

Measurement Study on PPLive Based on Channel Popularity.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

An Encrypted Index Mechanism in Ciphertext Retrieval System.
Proceedings of the 8th Web Information Systems and Applications Conference, 2011

2010
PercolationNET: A multi-tree P2P overlay network supporting high coverage search.
IJPEDS, 2010

Consistency Checking of Safety and Availability in Access Control.
IEICE Transactions, 2010

Semantic Grounding of Hybridization for Tag Recommendation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Proactive Replication and Search for Rare Objects in Unstructured Peer-to-Peer Networks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Role mining based on weights.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Role updating for assignments.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Automatic Update of Access Control Policy.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

Topic-Sensitive Tag Ranking.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Searching Concepts and Association Relationships Based on Domain Ontology.
Proceedings of the GCC 2010, 2010

Optimizing Academic Conference Classification Using Social Tags.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Mimir: Term-distributed indexing and search for secret documents.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A logic for authorization provenance.
Proceedings of the 5th ACM Symposium on Information, 2010

TGP: Mining Top-K Frequent Closed Graph Pattern without Minimum Support.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
A Novel Approach to Improve the Security of P2P File-Sharing Systems.
IJCNS, 2009

On Role Mappings for RBAC-Based Secure Interoperation.
Proceedings of the Third International Conference on Network and System Security, 2009

Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

Managing Authorization Provenance: A Modal Logic Based Approach.
Proceedings of the ICTAI 2009, 2009

High Coverage Search in Multi-Tree Based P2P Overlay Network.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Request-driven role mapping framework for secure interoperation in multi-domain environments.
Comput. Syst. Sci. Eng., 2008

A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

SemSearch: A Scalable Semantic Searching Algorithm for Unstructured P2P Network.
Proceedings of the Progress in WWW Research and Development, 2008

FAN: A Scalable Flabellate P2P Overlay Supporting Multi-Dimensional Attributes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Towards a Type-2 Fuzzy Description Logic for Semantic Search Engine.
Proceedings of the Advances in Data and Web Management, 2007

ICache: A Size-Aware Cooperative Caching Architecture for Web Images.
Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), 2007

Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.
Proceedings of the Information Security and Cryptology, 2007

P2P-based Locking in Real-Time Collaborative Editing Systems.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An ECG Parallel Scheduling Algorithm for the Distributed Systems.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

An Improved Semantic Search Model Based on Hybrid Fuzzy Description Logic.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

A Semantic Search Conceptual Model and Application in Security Access Control.
Proceedings of the Semantic Web, 2006

2005
Dynamic Role and Context-Based Access Control for Grid Applications.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Service Publishing and Discovering Model in a Web Services Oriented Peer-to-Peer System.
Proceedings of the Web Engineering, 5th International Conference, 2005

WebPeer: A P2P-based System for Publishing and Discovering Web Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2003
Schema Mapping for Interoperability in XML-Based Multidatabase Systems.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2001
An Architecture for Multidatabase Systems Based on CORBA and XML.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001


  Loading...