关注
Yizhi Ren
Yizhi Ren
Hangzhou Dianzi University; Pengcheng Laboratory
在 hdu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fine-grained database field search using attribute-based encryption for e-healthcare clouds
C Guo, R Zhuang, Y Jie, Y Ren, T Wu, KKR Choo
Journal of medical systems 40, 1-8, 2016
1132016
Flexible service selection with user-specific QoS support in service-oriented architecture
L Zhao, Y Ren, M Li, K Sakurai
Journal of Network and Computer Applications 35 (3), 962-973, 2012
1132012
Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems
L Zhao, Y Ren, Y Xiang, K Sakurai
2010 IEEE 12th International Conference on High Performance Computing and …, 2010
1122010
Deep reinforcement learning for multimedia traffic control in software defined networking
X Huang, T Yuan, G Qiao, Y Ren
IEEE Network 32 (6), 35-41, 2018
1052018
Reliable workflow scheduling with less resource redundancy
L Zhao, Y Ren, K Sakurai
Parallel Computing 39 (10), 567-585, 2013
882013
A similarity metric method of obfuscated malware using function-call graph
M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren, N Zheng
Journal of Computer Virology and Hacking Techniques 9, 35-47, 2013
692013
Cyberbullying detection in social media text based on character‐level convolutional neural network with shortcuts
N Lu, G Wu, Z Zhang, Y Zheng, Y Ren, KKR Choo
Concurrency and Computation: Practice and Experience 32 (23), e5627, 2020
632020
User influence analysis for github developer social networks
Y Hu, S Wang, Y Ren, KKR Choo
Expert Systems with Applications 108, 108-118, 2018
572018
Behavior-based reputation management in P2P file-sharing networks
X Fan, M Li, J Ma, Y Ren, H Zhao, Z Su
Journal of Computer and System Sciences 78 (6), 1737-1750, 2012
362012
A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems
L Zhao, Y Ren, K Sakurai
2011 IEEE international conference on advanced information networking and …, 2011
312011
A recovery approach for SQLite history recorders from YAFFS2
B Wu, M Xu, H Zhang, J Xu, Y Ren, N Zheng
Information and Communication Technology: International Conference, ICT …, 2013
302013
A Forensic Analysis Method for Redis Database based on RDB and AOF File.
M Xu, X Xu, J Xu, Y Ren, H Zhang, N Zheng
J. Comput. 9 (11), 2538-2544, 2014
262014
Black-box adversarial attacks on XSS attack detection model
Q Wang, H Yang, G Wu, KKR Choo, Z Zhang, G Miao, Y Ren
Computers & Security 113, 102554, 2022
242022
SPS and DPS: Two new grid-based source location privacy protection schemes in wireless sensor networks
Q Wang, J Zhan, X Ouyang, Y Ren
Sensors 19 (9), 2074, 2019
222019
Heterogeneous investment in spatial public goods game with mixed strategy
H Ding, Y Zhang, Y Ren, B Shi, KKR Choo
Soft Computing 22 (4), 1287–1294, 2018
212018
A File Fragment Classification Method Based on Grayscale Image.
T Xu, M Xu, Y Ren, J Xu, H Zhang, N Zheng
J. Comput. 9 (8), 1863-1870, 2014
212014
Subsidy strategy based on history information can stimulate voluntary vaccination behaviors on seasonal diseases
H Ding, JH Xu, Z Wang, YZ Ren, GH Cui
Physica A: Statistical Mechanics and its Applications 503, 390-399, 2018
202018
Novel threshold changeable secret sharing schemes based on polynomial interpolation
L Yuan, M Li, C Guo, KKR Choo, Y Ren
PloS one 11 (10), e0165512, 2016
202016
Reputation-based investment helps to optimize group behaviors in spatial lattice networks
H Ding, L Cao, Y Ren, KKR Choo, B Shi
PloS one 11 (9), e0162781, 2016
202016
Voluntary vaccination through self-organizing behaviors on locally-mixed social networks
B Shi, H Qiu, W Niu, Y Ren, H Ding, D Chen
Scientific reports 7 (1), 2665, 2017
192017
系统目前无法执行此操作,请稍后再试。
文章 1–20