Yizhi Ren

According to our database1, Yizhi Ren authored at least 77 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2024

2023
SNN-PPRL: A secure record matching scheme based on siamese neural network.
J. Inf. Secur. Appl., August, 2023

S-DeepTrust: A deep trust prediction method based on sentiment polarity perception.
Inf. Sci., July, 2023

A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services.
IEEE Trans. Cloud Comput., 2023

Chinese Event Causality Identification Based on Retrieval Enhancement.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

2022
SDoS: Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2022

A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022

Foreword.
IEICE Trans. Inf. Syst., 2022

Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems.
IEICE Trans. Inf. Syst., 2022

Black-box adversarial attacks on XSS attack detection model.
Comput. Secur., 2022

Label Semantic Extension for Chinese Event Extraction.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

2021
Chinese Named Entity Recognition: Applications and Challenges.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

TruthTrust: Truth Inference-Based Trust Management Mechanism on a Crowdsourcing Platform.
Sensors, 2021

2020
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks.
IEICE Trans. Inf. Syst., 2020

Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts.
Concurr. Comput. Pract. Exp., 2020

Query-efficient label-only attacks against black-box machine learning models.
Comput. Secur., 2020

An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020

IEEE Access Special Section Editorial: Mobile Edge Computing.
IEEE Access, 2020

Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things.
IEEE Access, 2020

2019
SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks.
Sensors, 2019

Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks.
Sensors, 2019

Greedily Remove k Links to Hide Important Individuals in Social Network.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Data Poisoning Attacks on Graph Convolutional Matrix Completion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Heterogeneous investment in spatial public goods game with mixed strategy.
Soft Comput., 2018

Deep Reinforcement Learning for Multimedia Traffic Control in Software Defined Networking.
IEEE Netw., 2018

Rigorous or tolerant: The effect of different reputation attitudes in complex networks.
Future Gener. Comput. Syst., 2018

User influence analysis for Github developer social networks.
Expert Syst. Appl., 2018

Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Appl. Math. Comput., 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Extended Exploration to the Epidemic Containment Game.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Practical <i>m</i>-<i>k</i>-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Secur. Commun. Networks, 2017

DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
CoRR, 2017

A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017

Spatial-temporal analysis on bird habitat discovery in China.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Poster: DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016

Effect of Different Migration Strategies on Evolution of Cooperation in Spatial Prisoner's Dilemma Game.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Insurance Strategy Can Promote Cooperation in the Presence of Antisocial Punishment in Public Goods Game.
Proceedings of the International Conference on Identification, 2015

Reputation-Based Conditional Investment Enhances the Evolution of Cooperation in Spatial Public Goods Game.
Proceedings of the International Conference on Identification, 2015

Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments.
J. Netw. Comput. Appl., 2014

A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite.
J. Comput., 2014

A Forensic Analysis Method for Redis Database based on RDB and AOF File.
J. Comput., 2014

A File Fragment Classification Method Based on Grayscale Image.
J. Comput., 2014

A Location Inferring Model Based on Tweets and Bilateral Follow Friends.
J. Comput., 2014

2013
A similarity metric method of obfuscated malware using function-call graph.
J. Comput. Virol. Hacking Tech., 2013

Evolution of cooperation in reputation system by group-based scheme.
J. Supercomput., 2013

Reliable workflow scheduling with less resource redundancy.
Parallel Comput., 2013

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Inf. Secur., 2013

A Webmail Reconstructing Method from Windows XP Memory Dumps.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Recovery Approach for SQLite History Recorders from YAFFS2.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
Reversible secret image sharing with steganography and dynamic embedding.
Secur. Commun. Networks, 2012

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012

Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Netw. Comput. Appl., 2012

Behavior-based reputation management in P2P file-sharing networks.
J. Comput. Syst. Sci., 2012

A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

A QoS-based fine-grained reputation system in the grid environment.
Concurr. Comput. Pract. Exp., 2012

2011
FineTrust: a fine-grained trust model for peer-to-peer networks.
Secur. Commun. Networks, 2011

PPS: A Scheme of Predicting User Preference based on Multivariate.
J. Next Gener. Inf. Technol., 2011

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010

Fault tolerant scheduling with dynamic number of replicas in heterogeneous system.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

2009
Modeling Security Bridge Certificate Authority Architecture.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Efficient Intrusion Detection Based on Static Analysis and Stack Walks.
Proceedings of the Advances in Information and Computer Security, 2009

Security Analysis for P2P Routing Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Intelligent Security Multi-agent Framework in Grid Computing.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008


  Loading...