Yizhi Ren

According to our database1, Yizhi Ren authored at least 51 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Heterogeneous investment in spatial public goods game with mixed strategy.
Soft Comput., 2018

Deep Reinforcement Learning for Multimedia Traffic Control in Software Defined Networking.
IEEE Network, 2018

Rigorous or tolerant: The effect of different reputation attitudes in complex networks.
Future Generation Comp. Syst., 2018

User influence analysis for Github developer social networks.
Expert Syst. Appl., 2018

Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Applied Mathematics and Computation, 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Extended Exploration to the Epidemic Containment Game.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Security and Communication Networks, 2017

A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017

Spatial-temporal analysis on bird habitat discovery in China.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Poster: DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Systems, 2016

Effect of Different Migration Strategies on Evolution of Cooperation in Spatial Prisoner's Dilemma Game.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Insurance Strategy Can Promote Cooperation in the Presence of Antisocial Punishment in Public Goods Game.
Proceedings of the International Conference on Identification, 2015

Reputation-Based Conditional Investment Enhances the Evolution of Cooperation in Spatial Public Goods Game.
Proceedings of the International Conference on Identification, 2015

Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments.
J. Network and Computer Applications, 2014

A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite.
JCP, 2014

A Forensic Analysis Method for Redis Database based on RDB and AOF File.
JCP, 2014

A File Fragment Classification Method Based on Grayscale Image.
JCP, 2014

A Location Inferring Model Based on Tweets and Bilateral Follow Friends.
JCP, 2014

2013
A similarity metric method of obfuscated malware using function-call graph.
J. Computer Virology and Hacking Techniques, 2013

Evolution of cooperation in reputation system by group-based scheme.
The Journal of Supercomputing, 2013

Reliable workflow scheduling with less resource redundancy.
Parallel Computing, 2013

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Information Security, 2013

A Webmail Reconstructing Method from Windows XP Memory Dumps.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Recovery Approach for SQLite History Recorders from YAFFS2.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
Reversible secret image sharing with steganography and dynamic embedding.
Security and Communication Networks, 2012

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
JNW, 2012

Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Network and Computer Applications, 2012

Behavior-based reputation management in P2P file-sharing networks.
J. Comput. Syst. Sci., 2012

A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

A QoS-based fine-grained reputation system in the grid environment.
Concurrency and Computation: Practice and Experience, 2012

2011
FineTrust: a fine-grained trust model for peer-to-peer networks.
Security and Communication Networks, 2011

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table.
IEICE Transactions, 2011

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010

Fault tolerant scheduling with dynamic number of replicas in heterogeneous system.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

2009
Modeling Security Bridge Certificate Authority Architecture.
IEICE Transactions, 2009

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation.
IEICE Transactions, 2009

Efficient Intrusion Detection Based on Static Analysis and Stack Walks.
Proceedings of the Advances in Information and Computer Security, 2009

Security Analysis for P2P Routing Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Intelligent Security Multi-agent Framework in Grid Computing.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008


  Loading...