关注
Ruinian Li
Ruinian Li
Assistant professor, Bowing Green State University
在 bgsu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
A privacy preserving communication protocol for IoT applications in smart homes
T Song, R Li, B Mei, J Yu, X Xing, X Cheng
IEEE Internet of Things Journal 4 (6), 1844-1852, 2017
3682017
Blockchain for large-scale internet of things data storage and protection
R Li, T Song, B Mei, H Li, X Cheng, L Sun
IEEE Transactions on Services Computing 12 (5), 762-771, 2018
3532018
IoT applications on secure smart shopping system
R Li, T Song, N Capurso, J Yu, J Couture, X Cheng
IEEE Internet of Things Journal 4 (6), 1945-1954, 2017
1832017
Incentive mechanism design for joint resource allocation in blockchain-based federated learning
Z Wang, Q Hu, R Li, M Xu, Z Xiong
IEEE Transactions on Parallel and Distributed Systems 34 (5), 1536-1547, 2023
442023
Image and attribute based convolutional neural network inference attacks in social networks
B Mei, Y Xiao, R Li, H Li, X Cheng, Y Sun
IEEE Transactions on Network Science and Engineering 7 (2), 869-879, 2018
372018
Ultraviolet radiation measurement via smart devices
B Mei, R Li, W Cheng, J Yu, X Cheng
IEEE Internet of Things Journal 4 (4), 934-944, 2017
352017
A novel secure and efficient data aggregation scheme for IoT
R Li, C Sturtivant, J Yu, X Cheng
IEEE Internet of Things Journal 6 (2), 1551-1560, 2018
322018
BDRA: Blockchain and decentralized identifiers assisted secure registration and authentication for VANETs
X Li, T Jing, R Li, H Li, X Wang, D Shen
IEEE Internet of Things Journal 10 (14), 12140-12155, 2022
282022
Efficient CityCam-to-edge cooperative learning for vehicle counting in ITS
H Xu, Z Cai, R Li, W Li
IEEE Transactions on Intelligent Transportation Systems 23 (9), 16600-16611, 2022
252022
An overview of privacy preserving schemes for industrial Internet of Things
Y Huo, C Meng, R Li, T Jing
China Communications 17 (10), 1-18, 2020
232020
A cross-layer cooperative jamming scheme for social internet of things
Y Huo, J Fan, Y Wen, R Li
Tsinghua Science and Technology 26 (4), 523-535, 2021
222021
Efficient privacy-preserving schemes for dot-product computation in mobile computing
C Hu, R Li, W Li, J Yu, Z Tian, R Bie
Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, 51-59, 2016
212016
IoT applications on secure smart shopping
R Li, T Song, N Capurso, J Yu, X Cheng
2016 International Conference on Identification, Information and Knowledge …, 2016
192016
Secure auctions without an auctioneer via verifiable secret sharing
M Larson, C Hu, R Li, W Li, X Cheng
Proceedings of the 2015 workshop on privacy-aware mobile computing, 1-6, 2015
192015
Secure multi‐unit sealed first‐price auction mechanisms
W Li, M Larson, C Hu, R Li, X Cheng, R Bie
Security and Communication Networks 9 (16), 3833-3843, 2016
182016
A bidder-oriented privacy-preserving vcg auction scheme
M Larson, R Li, C Hu, W Li, X Cheng, R Bie
Wireless Algorithms, Systems, and Applications: 10th International …, 2015
162015
Privacy-preserving combinatorial auction without an auctioneer
C Hu, R Li, B Mei, W Li, A Alrawais, R Bie
EURASIP Journal on Wireless Communications and Networking 2018, 1-8, 2018
132018
A privacy-preserving outsourcing computing scheme based on secure trusted environment
Z Liu, C Hu, R Li, T Xiang, X Li, J Yu, H Xia
IEEE Transactions on Cloud Computing 11 (3), 2325-2336, 2022
122022
Cryptographic algorithms for privacy-preserving online applications.
R Li, Y Xiao, C Zhang, T Song, C Hu
Math. Found. Comput. 1 (4), 311-330, 2018
122018
Perturbation-based private profile matching in social networks
R Li, H Li, X Cheng, X Zhou, K Li, S Wang, R Bie
IEEE Access 5, 19720-19732, 2017
112017
系统目前无法执行此操作,请稍后再试。
文章 1–20