关注
Ruixuan Li
Ruixuan Li
Professor of Computer Science, Huazhong University of Science and Technology
在 hust.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cloud computing: IT as a service
G Lin, D Fu, J Zhu, G Dasmalchi
IT professional 11 (2), 10-13, 2009
394*2009
Sentiment analysis using deep learning approaches: an overview
O Habimana, Y Li, R Li, X Gu, G Yu
Science China Information Sciences 63, 1-36, 2020
1872020
Efficient multi-keyword ranked query over encrypted data in cloud computing
R Li, Z Xu, W Kang, KC Yow, CZ Xu
Future Generation Computer Systems 30, 179-190, 2014
1582014
Multiagent deep reinforcement learning for joint multichannel access and task offloading of mobile-edge computing in industry 4.0
Z Cao, P Zhou, R Li, S Huang, D Wu
IEEE Internet of Things Journal 7 (7), 6201-6213, 2020
1392020
Secure sensitive data sharing on a big data platform
X Dong, R Li, H He, W Zhou, Z Xue, H Wu
Tsinghua science and technology 20 (1), 72-80, 2015
1232015
A lightweight secure data sharing scheme for mobile cloud computing
R Li, C Shen, H He, X Gu, Z Xu, CZ Xu
IEEE Transactions on Cloud Computing 6 (2), 344-357, 2017
1032017
Incremental K-clique clustering in dynamic social networks
D Duan, Y Li, R Li, Z Lu
Artificial Intelligence Review 38, 129-147, 2012
952012
A MapReduce task scheduling algorithm for deadline constraints
Z Tang, J Zhou, K Li, R Li
Cluster computing 16, 651-662, 2013
902013
Blockchain based data integrity verification in P2P cloud storage
D Yue, R Li, Y Zhang, W Tian, C Peng
2018 IEEE 24th international conference on parallel and distributed systems …, 2018
812018
Efficient multi-keyword ranked query on encrypted data in the cloud
Z Xu, W Kang, R Li, KC Yow, CZ Xu
2012 IEEE 18th international conference on parallel and distributed systems …, 2012
792012
Secure, efficient and fine-grained data access control mechanism for P2P storage cloud
H He, R Li, X Dong, Z Zhang
IEEE transactions on cloud computing 2 (4), 471-484, 2014
732014
Dynamic role and context-based access control for grid applications
H Yao, H Hu, B Huang, R Li
Sixth International Conference on Parallel and Distributed Computing …, 2005
67*2005
Role mining based on weights
X Ma, R Li, Z Lu
Proceedings of the 15th ACM symposium on Access control models and …, 2010
582010
EADP: An extended adaptive density peaks clustering for overlapping community detection in social networks
M Xu, Y Li, R Li, F Zou, X Gu
Neurocomputing 337, 287-302, 2019
552019
Blockchain-based verification framework for data integrity in edge-cloud storage
D Yue, R Li, Y Zhang, W Tian, Y Huang
Journal of Parallel and Distributed Computing 146, 1-14, 2020
512020
Android malware obfuscation variants detection method based on multi-granularity opcode features
J Tang, R Li, Y Jiang, X Gu, Y Li
Future Generation Computer Systems 129, 141-151, 2022
412022
A novel hybrid method to analyze security vulnerabilities in android applications
J Tang, R Li, K Wang, X Gu, Z Xu
Tsinghua Science and Technology 25 (5), 589-603, 2020
402020
A new RBAC based access control model for cloud computing
Z Tang, J Wei, A Sallam, K Li, R Li
Advances in Grid and Pervasive Computing: 7th International Conference, GPC …, 2012
392012
Mining constraints in role-based access control
X Ma, R Li, Z Lu, W Wang
Mathematical and Computer Modelling 55 (1-2), 87-96, 2012
382012
MTSD: A task scheduling algorithm for MapReduce base on deadline constraints
Z Tang, J Zhou, K Li, R Li
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
372012
系统目前无法执行此操作,请稍后再试。
文章 1–20