Ruizhong Du

Orcid: 0000-0003-1794-1504

According to our database1, Ruizhong Du authored at least 42 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control.
J. Parallel Distributed Comput., March, 2024

Anonymous federated learning framework in the internet of things.
Concurr. Comput. Pract. Exp., 2024

2023
Refined statistical attacks against searchable symmetric encryption using non-indexed documents.
J. Inf. Secur. Appl., December, 2023

Enabling efficient and verifiable secure search on cloud-based encrypted big data.
Peer Peer Netw. Appl., September, 2023

Block verifiable dynamic searchable encryption using redactable blockchain.
J. Inf. Secur. Appl., June, 2023

Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios.
IEEE Trans. Veh. Technol., May, 2023

DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain.
IEEE Trans. Cloud Comput., 2023

Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs.
IEEE Trans. Cloud Comput., 2023

Quantum Network Coding Based on Quantum Steering.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

RVDSE: Efficient Result Verifiable Searchable Encryption in Redactable Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Pattern-protecting Dynamic Searchable Symmetric Encryption Based on Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2023

A Highly Accurate Statistical Attack against Searchable Symmetric Encryption.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval.
Proceedings of the Advances in Computer Graphics, 2023

2022
A Lightweight Flow Feature-Based IoT Device Identification Scheme.
Secur. Commun. Networks, 2022

Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries.
Mob. Networks Appl., 2022

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.
Mob. Networks Appl., 2022

Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain.
J. Web Eng., 2022

Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning.
J. Grid Comput., 2022

Multiuser physical layer security mechanism in the wireless communication system of the IIOT.
Comput. Secur., 2022

Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2022

Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Lightweight Searchable Encryption with Small Clients on Edge Cloud.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Identification of IoT Devices Based on Feature Vector Split.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A lightweight heterogeneous network clustering algorithm based on edge computing for 5G.
Wirel. Networks, 2020

Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing.
IEEE Access, 2020

Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020

Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Virtual Machine Security Migration Strategy Based on the Edge Computing Environment.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Double Regularization Matrix Factorization Recommendation Algorithm.
IEEE Access, 2019

2018
Date Hierarchical Storage Strategy for Data Disaster Recovery.
IEEE Access, 2018

2011
Trust Evaluation Model based on Service Satisfaction.
J. Softw., 2011

Trust Evaluation Model based on Multiple Service Attributes.
J. Networks, 2011

Subjective Trust Evaluation Model Based on Preferences.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Dynamic Trust Model Based on Perceived Risk.
Proceedings of the International Conference on E-Business and E-Government, 2010

2005
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Data Fusion Model of Intrusion Detection-IDSFP.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...