Ruizhong Du

ORCID: 0000-0002-3952-2370
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Access Control and Trust
  • Anomaly Detection Techniques and Applications
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Distributed and Parallel Computing Systems
  • Peer-to-Peer Network Technologies
  • Advanced Data Storage Technologies
  • Advanced Steganography and Watermarking Techniques
  • Service-Oriented Architecture and Web Services
  • Advanced Computational Techniques and Applications
  • Energy Efficient Wireless Sensor Networks
  • Topic Modeling
  • Mobile Agent-Based Network Management
  • Complexity and Algorithms in Graphs
  • Molecular Communication and Nanonetworks
  • Advanced Image and Video Retrieval Techniques
  • Cloud Computing and Resource Management
  • Image Retrieval and Classification Techniques

Hebei University
2011-2025

Nankai University
2021

Beijing Computing Center
2012

Chinese University of Hong Kong
2004-2006

While users enjoy the convenience of data outsourcing in cloud, they also face risks modification and private information leakage. Searchable encryption technology can perform keyword searches over encrypted while protecting their privacy guaranteeing integrity by verifying search results. However, some associated problems are still encountered, such as low efficiency verification uncontrollable query Accordingly, this paper proposes a Privacy-Preserving Encryption (PPSE) scheme based on...

10.26599/tst.2021.9010070 article EN Tsinghua Science & Technology 2022-07-21

Internet of Things (IoT) device identification is a key step in the management IoT devices. The devices connected to network must be controlled by manager. For this purpose, many schemes are proposed identify devices, especially working on gateway. However, almost all researchers do not pay close attention cost. Thus, considering gateway’s limited storage and computational resources, new lightweight scheme proposed. First, DFI (deep/dynamic flow inspection) technology utilized efficiently...

10.1155/2022/8486080 article EN cc-by Security and Communication Networks 2022-01-15

Thermal analysis using finite element modeling (FEM) is widely used in automotive industry nowadays. FEM can give simulation results at design stage. However, as a kind of simulations, it normally suffers from deviations with experimental results. Therefore, measurement necessary. To measure the 3D temperature distribution on car body, we use number sensors and then record values according to positions sensors. It provide different positions. Using this information, obtain body. method time...

10.1109/icia.2005.1635046 article EN IEEE International Conference on Information Acquisition 2006-06-08

10.1016/j.jisa.2023.103504 article EN Journal of Information Security and Applications 2023-05-10

Based on the D-S Evidence Theory and its Data Fusion technology, a new Intrusion Detection Model-IDSDFM is presented. This model can merge alerts of different types IDSs, make intelligent inference by applying Theory, estimate current security situation according to fusion result. Then some IDSs in network are dynamically adjusted strengthen detection data that relate attack attempt. Consequently, false positive rate negative effectively reduced, efficiency IDS accordingly improved.

10.1109/pdcat.2005.109 article EN 2005-01-01

With strong heterogeneity and the limited computing ability of IoT nodes, this dissertation proposes a Trust Authorization Model based on detection feedback in that is combined with current trust model as well implement storage other tasks.By calculating storing cluster head node along its to facilitate data transmission search for energy consumption, it prevents local network from being by power device.In terms calculation, threshold value recommendation.At same time, BP neural algorithm...

10.23940/ijpe.18.03.p6.453462 article EN International Journal of Performability Engineering 2018-01-01

Dynamic searchable encryption, which allows clients to outsource their encrypted data cloud servers and retain the ability query update data, has received wide attention. In setting, it is essential ensure that a server infers as little possible about content of outsourced queries processes. this article, we propose forward backward secure encryption scheme on bipartite graphs (FBSSE-BG) offers strongest level security. particular, introduce notion counter construct new bi-directional index...

10.1109/tcc.2021.3131176 article EN IEEE Transactions on Cloud Computing 2021-11-30

At present, more and people use the Internet to transact. In order be successful transactions, it is need establish a certain trust relationship between manage relationship, model have been proposed. Based on past model, Dynamic Trust Model based Perceived Risk given in paper. The perceived risk divided into six dimensions under peer environment according this model. And other factors conclude ultimate trust. will basis determine whether transaction carried out. simulation which there are...

10.1109/icee.2010.515 article EN International Conference on E-Business and E-Government 2010-05-01

As P2P system has dynamic open and anonymous characteristics, these seriously restrict of cooperation between the users reliability availability. To solve above problems, a trust model network based on reputation risk is presented. Taking into account influence calculation confidence at different periods trading, time decay function which weight distributed in accordance with trading range been introduced. At same time, taking uncertainty that behavior nodes effects confidence, factors have...

10.1109/wcse.2009.277 article EN WRI World Congress on Software Engineering 2009-01-01

10.7544/issn1000-1239.2019.20190416 article EN Journal of Computer Research and Development 2019-10-16

Symmetric Searchable Encryption (SSE) is an ideal technology to secure searches. SSE dedicated improving data confidentiality without sacrificing the searchability of data. Currently, most schemes work using a semihonest or curious cloud server model in which search results are not absolutely trustworthy. Therefore, verifiable (VSSE) scheme proposed achieve integrity verification. Although there some solutions result verification problem, concentrate on static environment and do consider...

10.1109/msn50589.2020.00105 article EN 2021 17th International Conference on Mobility, Sensing and Networking (MSN) 2020-12-01

Application of data fusion technique in intrusion detection is the trend next-generation system (IDS). In network security, adopting security early warning feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered current characteristics situation analyzed estimated. This paper applies D-S evidence theory distributed propose a model which fuses from centers, makes clear improves capability efficiency IDS.

10.1109/icmlc.2003.1259825 article EN 2004-06-21

when the most trusted models evaluate level of trust about service entities at present, credibility attributes whether two sides trading result is credible rather ambiguous, which makes evaluation model lack persuasion, and not very good depict complexity uncertainty relationship between sides. In view above questions, learning from human society, according to node itself, abstracting representative multiple service, requester comprehensive evaluates provided by provider based on personal...

10.4304/jnw.6.6.842-849 article EN Journal of Networks 2011-06-03
Coming Soon ...