default search action
Ru Huo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Zhibo Qi, Lei Du, Ru Huo, Tao Huang:
Predictive Maintenance Based on Identity Resolution and Transformers in IIoT. Future Internet 16(9): 310 (2024) - [j13]Lei Du, Ru Huo, Chuang Sun, Shuo Wang, Tao Huang:
Adaptive joint placement of edge intelligence services in mobile edge computing. Wirel. Networks 30(2): 799-817 (2024) - [c10]Wei Chen, Ru Huo, Shuo Wang, Tao Huang:
A Secure and Efficient State Channels-Based Network Service Business Settlement Scheme. WCNC 2024: 1-6 - 2023
- [j12]Lei Chen, Zhihao Wang, Ru Huo, Tao Huang:
An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN Environments. Algorithms 16(4): 197 (2023) - [j11]Zongxuan Sha, Ru Huo, Chuang Sun, Shuo Wang, Tao Huang:
A Task-Oriented Hybrid Routing Approach based on Deep Deterministic Policy Gradient. Comput. Commun. 210: 183-193 (2023) - [j10]Wei Chen, Ru Huo, Chuang Sun, Shiqin Zeng, Shuo Wang, Tao Huang:
SCRT: A Secure and Efficient State-Channel-Based Resource Trading Scheme for Internet of Things. IEEE Internet Things J. 10(11): 10038-10051 (2023) - [c9]Ru Huo, Dong Ni, Zihao Shao:
Trusted Access Control Mechanism for Intelligent Manufacturing Based on Decentralized Identifier. Blockchain 2023: 192-197 - [c8]Ningjie Gao, Ru Huo, Shuo Wang, Tao Huang:
FIBFT: An Improved Byzantine Consensus Mechanism for Edge Computing. WCNC 2023: 1-6 - 2022
- [j9]Ru Huo, Shiqin Zeng, Yuhong Di, Xiangfeng Cheng, Tao Huang, F. Richard Yu, Yunjie Liu:
A Blockchain-Enabled Trusted Identifier Co-Governance Architecture for the Industrial Internet of Things. IEEE Commun. Mag. 60(6): 66-72 (2022) - [j8]Ru Huo, Shiqin Zeng, Zhihao Wang, Jiajia Shang, Wei Chen, Tao Huang, Shuo Wang, F. Richard Yu, Yunjie Liu:
A Comprehensive Survey on Blockchain in Industrial Internet of Things: Motivations, Research Progresses, and Future Challenges. IEEE Commun. Surv. Tutorials 24(1): 88-122 (2022) - [j7]Zhihao Wang, Ru Huo, Shuo Wang:
A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid. Future Internet 14(4): 119 (2022) - [j6]Ningjie Gao, Ru Huo, Shuo Wang, Tao Huang, Yun-jie Liu:
Sharding-Hashgraph: A High-Performance Blockchain-Based Framework for Industrial Internet of Things With Hashgraph Mechanism. IEEE Internet Things J. 9(18): 17070-17079 (2022) - [j5]Siyang Zhang, Siyu Yu, Xinhua E, Ru Huo, Ziheng Sui:
Label Propagation Algorithm Joint Multilayer Neighborhood Overlap and Historic Label Similarity for Community Detection. IEEE Syst. J. 16(2): 2626-2634 (2022) - 2021
- [j4]Zhi-Peng Yang, Lu Hua, Ningjie Gao, Ru Huo, Jiang Liu, Tao Huang:
An Accelerating Approach for Blockchain Information Transmission Based on NDN. Future Internet 13(2): 47 (2021) - [j3]Chuang Sun, Shun-Qing Ren, Ming Zeng, Changhong Wang, Ru Huo:
Sequential Calibration Method of Nonlinear Errors of PIGA on Counter-Rotating Platform Centrifuge. IEEE Trans. Instrum. Meas. 70: 1-11 (2021) - [c7]Guoyu Peng, Shuo Wang, Yudong Huang, Ru Huo, Tao Huang, Yunjie Liu:
Traffic Shaping at the Edge: Enabling Bounded Latency for Large-scale Deterministic Networks. ICC Workshops 2021: 1-6 - [c6]Shuwen Yin, Shuo Wang, Yudong Huang, Ru Huo, Tao Huang, Yunjie Liu:
Critical Event-Triggered Flows Tolerance in Time-Sensitive Networks. ICC Workshops 2021: 1-6 - [c5]Lei Du, Ru Huo:
Real-time Video Transmission Optimization Based on Edge Computing in IIoT. ICNP 2021: 1-6 - 2020
- [c4]Su Wang, Shuo Wang, Ru Huo, Tao Huang, Jiang Liu, Yunjie Liu:
DeepAalo: Auto-adjusting Demotion Thresholds for Information-agnostic Coflow Scheduling. INFOCOM Workshops 2020: 1123-1128 - [c3]Su Wang, Shuo Wang, Dong Zhou, Yiran Yang, Wenjie Zhang, Tao Huang, Ru Huo, Yunjie Liu:
Large-Scale and Rapid Flow Size Estimation for Improving Flow Scheduling. INFOCOM Workshops 2020: 1141-1146
2010 – 2019
- 2019
- [j2]Tianjiao Chen, Jiang Liu, Qinqin Tang, Tao Huang, Ru Huo:
Virtual Network Embedding Algorithm for Location-Based Identifier Allocation. IEEE Access 7: 31159-31169 (2019) - [c2]Hao Meng, Daichong Chao, Ru Huo, Qianying Guo, Xiaowei Li, Tao Huang:
Deep Reinforcement Learning Based Delay-Sensitive Task Scheduling and Resource Management Algorithm for Multi-User Mobile-Edge Computing Systems. ICMAI 2019: 66-70 - 2017
- [c1]Chengcheng Li, Renchao Xie, Tao Huang, Ru Huo, Jiang Liu, Yunjie Liu:
Joint Forwarding Strategy and Resource Allocation in Information-Centric HWNs. GLOBECOM 2017: 1-6 - 2016
- [j1]Ru Huo, Fei Richard Yu, Tao Huang, Renchao Xie, Jiang Liu, Victor C. M. Leung, Yunjie Liu:
Software Defined Networking, Caching, and Computing for Green Wireless Networks. IEEE Commun. Mag. 54(11): 185-193 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint