Yizhi Ren
Yizhi Ren
Hangzhou Dianzi University; Pengcheng Laboratory
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Flexible service selection with user-specific QoS support in service-oriented architecture
L Zhao, Y Ren, M Li, K Sakurai
Journal of Network and Computer Applications 35 (3), 962-973, 2012
Fine-grained database field search using attribute-based encryption for e-healthcare clouds
C Guo, R Zhuang, Y Jie, Y Ren, T Wu, KKR Choo
Journal of medical systems 40, 1-8, 2016
Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems
L Zhao, Y Ren, Y Xiang, K Sakurai
2010 IEEE 12th International Conference on High Performance Computing and …, 2010
Deep reinforcement learning for multimedia traffic control in software defined networking
X Huang, T Yuan, G Qiao, Y Ren
IEEE Network 32 (6), 35-41, 2018
Reliable workflow scheduling with less resource redundancy
L Zhao, Y Ren, K Sakurai
Parallel Computing 39 (10), 567-585, 2013
A similarity metric method of obfuscated malware using function-call graph
M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren, N Zheng
Journal of Computer Virology and Hacking Techniques 9, 35-47, 2013
User influence analysis for github developer social networks
Y Hu, S Wang, Y Ren, KKR Choo
Expert Systems with Applications 108, 108-118, 2018
Cyberbullying detection in social media text based on character‐level convolutional neural network with shortcuts
N Lu, G Wu, Z Zhang, Y Zheng, Y Ren, KKR Choo
Concurrency and Computation: Practice and Experience 32 (23), e5627, 2020
Behavior-based reputation management in P2P file-sharing networks
X Fan, M Li, J Ma, Y Ren, H Zhao, Z Su
Journal of Computer and System Sciences 78 (6), 1737-1750, 2012
A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems
L Zhao, Y Ren, K Sakurai
2011 IEEE international conference on advanced information networking and …, 2011
A recovery approach for SQLite history recorders from YAFFS2
B Wu, M Xu, H Zhang, J Xu, Y Ren, N Zheng
Information and Communication Technology: International Conference, ICT …, 2013
A Forensic Analysis Method for Redis Database based on RDB and AOF File.
M Xu, X Xu, J Xu, Y Ren, H Zhang, N Zheng
J. Comput. 9 (11), 2538-2544, 2014
Heterogeneous investment in spatial public goods game with mixed strategy
H Ding, Y Zhang, Y Ren, B Shi, KKR Choo
Soft Computing 22 (4), 1287–1294, 2018
SPS and DPS: Two new grid-based source location privacy protection schemes in wireless sensor networks
Q Wang, J Zhan, X Ouyang, Y Ren
Sensors 19 (9), 2074, 2019
Novel threshold changeable secret sharing schemes based on polynomial interpolation
L Yuan, M Li, C Guo, KKR Choo, Y Ren
PloS one 11 (10), e0165512, 2016
A File Fragment Classification Method Based on Grayscale Image.
T Xu, M Xu, Y Ren, J Xu, H Zhang, N Zheng
J. Comput. 9 (8), 1863-1870, 2014
Subsidy strategy based on history information can stimulate voluntary vaccination behaviors on seasonal diseases
H Ding, JH Xu, Z Wang, YZ Ren, GH Cui
Physica A: Statistical Mechanics and its Applications 503, 390-399, 2018
Reputation-based investment helps to optimize group behaviors in spatial lattice networks
H Ding, L Cao, Y Ren, KKR Choo, B Shi
PloS one 11 (9), e0162781, 2016
FineTrust: a fine‐grained trust model for peer‐to‐peer networks
Y Ren, M Li, K Sakurai
Security and Communication Networks 4 (1), 61-69, 2011
Black-box adversarial attacks on XSS attack detection model
Q Wang, H Yang, G Wu, KKR Choo, Z Zhang, G Miao, Y Ren
Computers & Security 113, 102554, 2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20