Ruizhong Du

According to our database1, Ruizhong Du authored at least 26 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
A Lightweight Flow Feature-Based IoT Device Identification Scheme.
Secur. Commun. Networks, 2022

Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries.
Mob. Networks Appl., 2022

Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.
Mob. Networks Appl., 2022

Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain.
J. Web Eng., 2022

Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning.
J. Grid Comput., 2022

Multiuser physical layer security mechanism in the wireless communication system of the IIOT.
Comput. Secur., 2022

Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Real-time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Identification of IoT Devices Based on Feature Vector Split.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A lightweight heterogeneous network clustering algorithm based on edge computing for 5G.
Wirel. Networks, 2020

Multiattribute Evaluation Model Based on the KSP Algorithm for Edge Computing.
IEEE Access, 2020

Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020

Verifiable Blockchain-Based Searchable Encryption with forward and backward privacy.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Virtual Machine Security Migration Strategy Based on the Edge Computing Environment.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

2019
Double Regularization Matrix Factorization Recommendation Algorithm.
IEEE Access, 2019

2018
Date Hierarchical Storage Strategy for Data Disaster Recovery.
IEEE Access, 2018

2011
Trust Evaluation Model based on Service Satisfaction.
J. Softw., 2011

Trust Evaluation Model based on Multiple Service Attributes.
J. Networks, 2011

Subjective Trust Evaluation Model Based on Preferences.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
Dynamic Trust Model Based on Perceived Risk.
Proceedings of the International Conference on E-Business and E-Government, 2010

2005
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Data Fusion Model of Intrusion Detection-IDSFP.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...