default search action
Ru Li 0004
Person information
- affiliation: Inner Mongolia University, Hohhot, China
Other persons with the same name
- Ru Li — disambiguation page
- Ru Li 0001 — Shanxi University, Taiyuan, China
- Ru Li 0002 — Harbin Institute of Technology, Weihai, China (and 1 more)
- Ru Li 0003 — The Fourth Affiliated Hospital of Guangxi Medical University, Guangxi, Liuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Xuefei Li, Ru Li:
A Trustworthiness Evaluation Mechanism Based on Principles-Assumptions Model. IEEE Internet Things J. 11(10): 17510-17524 (2024) - [j9]Xuefei Li, Qi Wang, Ru Li:
A Trustworthiness Sequence Prediction Scheme Based on Neural Networks and Mathematical Calculations. IEEE Internet Things J. 11(12): 22643-22655 (2024) - [c39]Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li, Wanshui Song:
Curriculum Learning for Ethereum Phishing Scam Detection. CSCWD 2024: 1528-1533 - [c38]Yongxin Chen, Wenhan Hou, Xin Zhang, Ru Li:
Ethereum Phishing Scams Detection Based on Graph Contrastive Learning with Augmentations. CSCWD 2024: 2053-2058 - [c37]Hui Zhao, Xiaodong Zhang, Jinshan Shi, Ru Li:
Data Lineage Construction Method for Multi-Chain-Based Data Assets Marketplaces. CSCWD 2024: 2110-2115 - [c36]Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li:
CLPSD: Detecting Ethereum Phishing Scams based on Curriculum Learning. ICASSP 2024: 4710-4714 - [c35]Hui Zhao, Xiaodong Zhang, Jinshan Shi, Ru Li:
DART: A Low-Cost and Secure Cross-Chain Scheme for Popular Digital Assets. WCNC 2024: 1-7 - [i2]YaoDan Zhang, Zidong Wang, Ru Jia, Ru Li:
A Distance Metric Learning Model Based On Variational Information Bottleneck. CoRR abs/2403.02794 (2024) - 2023
- [j8]Xiaodong Zhang, Ru Li, Hui Zhao:
A Parallel Consensus Mechanism Using PBFT Based on DAG-Lattice Structure in the Internet of Vehicles. IEEE Internet Things J. 10(6, March 15): 5418-5433 (2023) - [j7]Xuefei Li, Ru Li:
A Comprehensive Review for 4-D Trust Management in Distributed IoT. IEEE Internet Things J. 10(24): 21738-21762 (2023) - [c34]Min Li, Bo Cui, Wenhan Hou, Ru Li:
Research on Malicious Account Detection Mechanism of Ethereum Based on Community Discovery. COMPSAC 2023: 705-710 - [c33]Yubo Shen, Wenduo Jiang, Yu Zheng, Ru Jia, Ru Li:
Research on False Comment Recognition Algorithm Integrating crazy fan base Subculture Phenomenon. CSCWD 2023: 533-538 - [c32]Zhen Liu, Meiju Yu, Ru Li:
A Fake Message and Malicious Node Detection Method Using Machine Learning in V-NDN. CSCWD 2023: 772-777 - [c31]Wenxu Han, Qi Li, Meiju Yu, Ru Li:
Research on Medical Data Storage and Secure Sharing Scheme Based on Blockchain. CSCWD 2023: 879-884 - [c30]Min Feng, Meiju Yu, Ru Li:
Multi-feature content popularity prediction algorithm based on GRU-Attention in V-NDN. CSCWD 2023: 1136-1141 - [c29]Zhen Liu, Meiju Yu, Ru Li:
Blockchain-based Trust Management Mechanism in V-NDN. CSCWD 2023: 1433-1438 - [c28]Qi Li, Wenxu Han, Lin Zhao, Meiju Yu, Ru Li, Ru Jia:
Information Dissemination Model Based on Blockchain Social Network. CSCWD 2023: 1789-1795 - [c27]Xuefei Li, Lei Xu, Ru Li:
Information Entropy Composition Algorithms for Multipath Trust Relationships in Trust Propagation. ICPADS 2023: 84-91 - [c26]Hui Zhao, Xiaodong Zhang, Jinshan Shi, Ru Li:
Referable NFT-based Revenue Allocation Mechanism in Data Marketplace. TrustCom 2023: 1318-1323 - 2022
- [c25]Yubo Shen, Yangming Huang, Ru Jia, Ru Li:
Research on User's Mental Health Based on Comment Text. ChineseCSCW (2) 2022: 298-310 - [c24]Yu Hao, Bo Cui, Ru Li, Tingting Song, Wenhan Hou:
Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract. CollaborateCom (1) 2022: 494-513 - [c23]Ru Jia, Ru Li:
User Preference Modeling on Heterogeneous Implicit Feedback with Transfer Learning1. CSCWD 2022: 214-220 - [c22]Yu Zheng, Jun Shen, Ru Jia, Ru Li:
Research on Automatic Generation of Comment Labels Oriented to Users' Individualized Needs. CSCWD 2022: 371-376 - [c21]Wenhan Hou, Bo Cui, Ru Li:
Detecting Phishing Scams on Ethereum Using Graph Convolutional Networks with Conditional Random Field. HPCC/DSS/SmartCity/DependSys 2022: 1495-1500 - [c20]Hui Zhao, Xiaodong Zhang, Ru Li:
NFT-basedAccess Control in Named Data Networks. ISPA/BDCloud/SocialCom/SustainCom 2022: 139-146 - [i1]Xuefei Li, Ru Li:
Access Service Records Based Trust Management Scheme for Internet of Things. CoRR abs/2210.14566 (2022) - 2021
- [j6]Xiaodong Zhang, Ru Li, Wenhan Hou, Hui Zhao:
V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 9942632:1-9942632:17 (2021) - [j5]Xiaodong Zhang, Ru Li, Wenhan Hou, Jinshan Shi:
Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network. Secur. Commun. Networks 2021: 9967829:1-9967829:13 (2021) - [c19]Wenhan Hou, Bo Cui, Ru Li:
A Survey on Blockchain Data Analysis. COMPSAC 2021: 357-365 - [c18]Pengfei Yue, Ru Li, Bin Pang:
The Random Content Poisoning Attack in NDN. ISPA/BDCloud/SocialCom/SustainCom 2021: 853-860 - 2020
- [j4]Tingting Song, Bo Cui, Ru Li, Jing Liu, Jinshan Shi:
Smart Contract-Based Trusted Content Retrieval Mechanism for NDN. IEEE Access 8: 85813-85825 (2020) - [j3]Jinshan Shi, Ru Li, Wenhan Hou:
A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control. IEEE Access 8: 156027-156042 (2020) - [j2]Meiju Yu, Ru Li:
A caching strategy based on dynamic popularity for named data networking. Int. J. Inf. Technol. Manag. 19(4): 305-317 (2020) - [c17]Pengfei Yue, Ru Li, Bin Pang:
A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDN. APNOMS 2020: 132-137 - [c16]Jinshan Shi, Ru Li:
Permission Token Segmentation Scheme based on Blockchain Access Control. TrustCom 2020: 1956-1964
2010 – 2019
- 2019
- [j1]Ru Jia, Ru Li, Meng Gao:
Study on data sparsity in social network-based recommender system. Int. J. Comput. Sci. Eng. 20(1): 15-20 (2019) - [c15]Xin Zhang, Ru Li:
An ARI-HMM based Interest Flooding Attack countermeasure in NDN. CSCWD 2019: 10-15 - [c14]Xin Zhang, Ru Li:
A Charging/Rewarding mechanism-based Interest Flooding Attack mitigation strategy in NDN. IM 2019: 402-407 - [c13]Pengfei Yue, Ru Li, Bin Pang:
Register before Publishing with Smart Forwarding, Mitigate Content Poisoning Attack in ICN. ISPA/BDCloud/SocialCom/SustainCom 2019: 210-217 - [c12]YingQi Li, Ru Li, Meiju Yu:
A Distributed Content Placement Strategy Based on Popularity for ICN. ISPA/BDCloud/SocialCom/SustainCom 2019: 685-689 - 2018
- [c11]Rina Wu, Bo Cui, Ru Li:
Research on Access Control of Smart Home in NDN (Short Paper). CollaborateCom 2018: 560-570 - [c10]Meiju Yu, Ru Li:
Dynamic Popularity-Based Caching Permission Strategy for Named Data Networking. CSCWD 2018: 576-581 - [c9]Ru Jia, Ru Li:
Modeling User Purchase Preference Based on Implicit Feedback. CSCWD 2018: 832-836 - [c8]Manxin Huang, Ru Li, Jun Fan, Xin Zhang:
User-Driven Smart Home Control System Based on Named Data Networking. ICUFN 2018: 148-153 - [c7]YingQi Li, Meiju Yu, Ru Li:
A Cache Replacement Strategy Based on Hierarchical Popularity in NDN. ICUFN 2018: 159-161 - [c6]Xinyu Wu, Meiju Yu, Ru Li:
A Probabilistic Model of File Transfer Time Based on Markov Chain in Vehicular Ad Hoc Networks. ICUFN 2018: 537-542 - 2017
- [c5]Ru Jia, Ru Li, Meiju Yu, Shanshan Wang:
E-commerce purchase prediction approach by user behavior data. CITS 2017: 1-5 - [c4]Li Wang, Ru Li, Bo Cui:
ROI-Based forwarding strategy for named data delay tolerant networking. ICUFN 2017: 81-86 - [c3]Bo Cui, Ru Li:
A greedy and neighbor aware data forwarding protocol in named data MANETs. ICUFN 2017: 934-939 - [c2]Bin Pang, Ru Li, Pengfei Yue:
Research of the interest packet popple broadcast diffusion attack in NDN VANET. SAC 2017: 617-620 - 2016
- [c1]Bo Cui, Ru Li, Jing Liu, Yujun Zhang, Zhongcheng Li:
Limited space oriented optimized storage protocol in autonomous mobile cloud. SAC 2016: 734-737
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint