Ruizhong Du
Orcid: 0000-0003-1794-1504
According to our database1,
Ruizhong Du
authored at least 79 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., July, 2025
J. Grid Comput., March, 2025
Type classification and identification of IoT devices by using traffic characteristics.
Wirel. Networks, January, 2025
Verifiable Encrypted Image Retrieval With Reversible Data Hiding in Cloud Environment.
IEEE Trans. Cloud Comput., 2025
IEEE Internet Things J., 2025
Deep reinforcement learning with dual-Q and Kolmogorov-Arnold Networks for computation offloading in Industrial IoT.
Comput. Networks, 2025
ADMMOA: Attribute-Driven Multimodal Optimization for Face Recognition Adversarial Attacks.
Proceedings of the Computational Visual Media - 13th International Conference, 2025
AIDPFL: An Adaptive Improvement Approach for Differential Privacy Federated Learning.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Lyapunov-Guided Deep Reinforcement Learning for Computation Offloading in Ocean Internet of Things.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Carchain: A Blockchain-Based Federated Learning Optimization Scheme in Autonomous-Driving Scenario.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Collaborative Optimization of Label Protection in Large Language Models with an Adaptive Rényi Divergence Approach.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
2024
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things.
J. Supercomput., November, 2024
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System.
IEEE Trans. Netw. Serv. Manag., October, 2024
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks.
J. Supercomput., May, 2024
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach.
J. Supercomput., May, 2024
Wirel. Networks, April, 2024
MSLShard: An efficient sharding-based trust management framework for blockchain-empowered IoT access control.
J. Parallel Distributed Comput., March, 2024
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing.
J. Comput. Secur., 2024
Concurr. Comput. Pract. Exp., 2024
Comput. Secur., 2024
StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT.
Comput. Networks, 2024
FL-PPELA: Partial Parameter Enhancement and Local Adaptive Aggregation for Personalized Federated Learning.
Proceedings of the Web Information Systems Engineering - WISE 2024 PhD Symposium, Demos and Workshops, 2024
Proceedings of the 23rd IEEE International Conference on Trust, 2024
Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
BTVD-BERT: A Bilingual Domain-Adaptation Pre-Trained Model for Textural Vulnerability Descriptions.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2024
AODPFL: An Adaptive Optimization Method for Differentially Private Federated Learning.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2024
Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
High-Precision Encrypted Image Retrieval Scheme Using Dual-Stream Convolution Feature Fusion in Cloud Computing.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Integrity Audit Scheme Based on Collaborative Cache in Industrial Internet of Things Environment.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Multi-attribute Semantic Adversarial Attack Based on Cross-layer Interpolation for Face Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2024
Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2024
TVD-BERT: A Domain-Adaptation Pre-trained Model for Textural Vulnerability Descriptions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the 21st ACM International Conference on Computing Frontiers, 2024
2023
Refined statistical attacks against searchable symmetric encryption using non-indexed documents.
J. Inf. Secur. Appl., December, 2023
Peer Peer Netw. Appl., September, 2023
J. Inf. Secur. Appl., June, 2023
Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios.
IEEE Trans. Veh. Technol., May, 2023
DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain.
IEEE Trans. Cloud Comput., 2023
Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs.
IEEE Trans. Cloud Comput., 2023
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Pattern-protecting Dynamic Searchable Symmetric Encryption Based on Differential privacy.
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
A Multi-label Privacy-Preserving Image Retrieval Scheme Based on Object Detection for Efficient and Secure Cloud Retrieval.
Proceedings of the Advances in Computer Graphics, 2023
2022
Secur. Commun. Networks, 2022
Mob. Networks Appl., 2022
Mob. Networks Appl., 2022
Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain.
J. Web Eng., 2022
Collaborative Cloud-Edge-End Task Offloading in NOMA-Enabled Mobile Edge Computing Using Deep Learning.
J. Grid Comput., 2022
Multiuser physical layer security mechanism in the wireless communication system of the IIOT.
Comput. Secur., 2022
Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
A lightweight heterogeneous network clustering algorithm based on edge computing for 5G.
Wirel. Networks, 2020
IEEE Access, 2020
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things.
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
2019
IEEE Access, 2019
2018
2011
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2010
Proceedings of the International Conference on E-Business and E-Government, 2010
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Advances in Machine Learning and Cybernetics, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005