Suivre
Ruixuan Li
Ruixuan Li
Professor of Computer Science, Huazhong University of Science and Technology
Adresse e-mail validée de hust.edu.cn - Page d'accueil
Titre
Citée par
Citée par
Année
Cloud computing: IT as a service
G Lin, D Fu, J Zhu, G Dasmalchi
IT professional 11 (2), 10-13, 2009
404*2009
Sentiment analysis using deep learning approaches: an overview
O Habimana, Y Li, R Li, X Gu, G Yu
Science China Information Sciences 63, 1-36, 2020
2242020
Multiagent deep reinforcement learning for joint multichannel access and task offloading of mobile-edge computing in industry 4.0
Z Cao, P Zhou, R Li, S Huang, D Wu
IEEE Internet of Things Journal 7 (7), 6201-6213, 2020
1712020
Efficient multi-keyword ranked query over encrypted data in cloud computing
R Li, Z Xu, W Kang, KC Yow, CZ Xu
Future Generation Computer Systems 30, 179-190, 2014
1602014
Secure sensitive data sharing on a big data platform
X Dong, R Li, H He, W Zhou, Z Xue, H Wu
Tsinghua science and technology 20 (1), 72-80, 2015
1352015
A lightweight secure data sharing scheme for mobile cloud computing
R Li, C Shen, H He, X Gu, Z Xu, CZ Xu
IEEE Transactions on Cloud Computing 6 (2), 344-357, 2017
1122017
Incremental K-clique clustering in dynamic social networks
D Duan, Y Li, R Li, Z Lu
Artificial Intelligence Review 38, 129-147, 2012
1012012
A MapReduce task scheduling algorithm for deadline constraints
Z Tang, J Zhou, K Li, R Li
Cluster computing 16, 651-662, 2013
902013
Blockchain based data integrity verification in P2P cloud storage
D Yue, R Li, Y Zhang, W Tian, C Peng
2018 IEEE 24th international conference on parallel and distributed systems …, 2018
892018
Efficient multi-keyword ranked query on encrypted data in the cloud
Z Xu, W Kang, R Li, KC Yow, CZ Xu
2012 IEEE 18th international conference on parallel and distributed systems …, 2012
812012
Secure, efficient and fine-grained data access control mechanism for P2P storage cloud
H He, R Li, X Dong, Z Zhang
IEEE transactions on cloud computing 2 (4), 471-484, 2014
792014
Dynamic role and context-based access control for grid applications
H Yao, H Hu, B Huang, R Li
Sixth International Conference on Parallel and Distributed Computing …, 2005
67*2005
Blockchain-based verification framework for data integrity in edge-cloud storage
D Yue, R Li, Y Zhang, W Tian, Y Huang
Journal of Parallel and Distributed Computing 146, 1-14, 2020
632020
Margin-based few-shot class-incremental learning with class-level overfitting mitigation
Y Zou, S Zhang, Y Li, R Li
Advances in neural information processing systems 35, 27267-27279, 2022
592022
EADP: An extended adaptive density peaks clustering for overlapping community detection in social networks
M Xu, Y Li, R Li, F Zou, X Gu
Neurocomputing 337, 287-302, 2019
592019
Role mining based on weights
X Ma, R Li, Z Lu
Proceedings of the 15th ACM symposium on Access control models and …, 2010
592010
Android malware obfuscation variants detection method based on multi-granularity opcode features
J Tang, R Li, Y Jiang, X Gu, Y Li
Future Generation Computer Systems 129, 141-151, 2022
562022
Dafkd: Domain-aware federated knowledge distillation
H Wang, Y Li, W Xu, R Li, Y Zhan, Z Zeng
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2023
542023
A novel hybrid method to analyze security vulnerabilities in android applications
J Tang, R Li, K Wang, X Gu, Z Xu
Tsinghua Science and Technology 25 (5), 589-603, 2020
472020
A comprehensive survey on training acceleration for large machine learning models in IoT
H Wang, Z Qu, Q Zhou, H Zhang, B Luo, W Xu, S Guo, R Li
IEEE Internet of Things Journal 9 (2), 939-963, 2021
452021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20