default search action
Ruzhi Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Ruzhi Xu, Min Li, Xin Yang, Dexin Liu, Dawei Chen:
Research on a method of defense adversarial samples for target detection model of driverless cars. Int. Arab J. Inf. Technol. 20(5): 738-747 (2023) - 2021
- [j10]Ruzhi Xu, Dawei Chen, Qizhuo Zong, Jia Luo:
A cross-space cascading failure hazard assessment method considering betweenness centrality and power loss. Turkish J. Electr. Eng. Comput. Sci. 29(3): 1479-1494 (2021) - [j9]Xianwen Sun, Ruzhi Xu, Longfei Wu, Zhitao Guan:
A differentially private distributed data mining scheme with high efficiency for edge computing. J. Cloud Comput. 10(1): 7 (2021) - 2020
- [j8]Zhitao Guan, Xueyan Liu, Longfei Wu, Jun Wu, Ruzhi Xu, Jinhu Zhang, Yuanzhang Li:
Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Inf. Sci. 514: 523-540 (2020)
2010 – 2019
- 2019
- [c31]Huawei Zhao, Wei Cui, Shouwei Li, Ruzhi Xu:
Token Economy: A New Form Economy with Decentralized Mutual Trust and Collective Governance. ISADS 2019: 1-7 - 2018
- [j7]Huawei Zhao, Peidong Bai, Yun Peng, Ruzhi Xu:
Efficient key management scheme for health blockchain. CAAI Trans. Intell. Technol. 3(2): 114-118 (2018) - 2017
- [j6]Ruzhi Xu, Rui Wang, Zhitao Guan, Longfei Wu, Jun Wu, Xiaojiang Du:
Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid. IEEE Access 5: 13787-13798 (2017) - [c30]Yun Peng, Ruzhi Xu, Huawei Zhao, Zhizheng Zhou, Ni Wu, Ying Yang:
Random Walk Based Trade Reference Computation for Personal Credit Scoring. ISADS 2017: 122-127 - [c29]Ruzhi Xu, Lu Zhang, Huawei Zhao, Yun Peng:
Design of Network Media's Digital Rights Management Scheme Based on Blockchain Technology. ISADS 2017: 128-133 - [c28]Huawei Zhao, Yong Zhang, Yun Peng, Ruzhi Xu:
Lightweight Backup and Efficient Recovery Scheme for Health Blockchain Keys. ISADS 2017: 229-234 - 2016
- [j5]Zhitao Guan, Jing Li, Ying Zhang, Ruzhi Xu, Zhuxiao Wang, Tingting Yang:
An efficient traceable access control scheme with reliable key delegation in mobile cloud computing. EURASIP J. Wirel. Commun. Netw. 2016: 208 (2016) - [j4]Huawei Zhao, Ruzhi Xu, Minglei Shu, Jiankun Hu:
Physiological-signal-based key negotiation protocols for body sensor networks: A survey. Simul. Model. Pract. Theory 65: 32-44 (2016) - [c27]Yun Peng, Byron Choi, Bingsheng He, Shuigeng Zhou, Ruzhi Xu, Xiaohui Yu:
VColor: A practical vertex-cut based approach for coloring large graphs. ICDE 2016: 97-108 - 2015
- [c26]Huawei Zhao, Ruzhi Xu, Minglei Shu, Jiankun Hu:
Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey. ISADS 2015: 63-70 - [c25]Xuwei Zheng, Ruzhi Xu, Yun Peng, Shuaiqiang Wang:
Tourism Service Composition Based on Multi-objective Optimization. ISADS 2015: 117-122 - 2014
- [j3]Ruzhi Xu, Shuaiqiang Wang, Xuwei Zheng, Yinong Chen:
Distributed collaborative filtering with singular ratings for large scale recommendation. J. Syst. Softw. 95: 231-241 (2014) - 2013
- [j2]Ruzhi Xu, Baitao Ji, Bin Zhang, Peiyao Nie:
Research on dynamic business composition based on web service proxies. Simul. Model. Pract. Theory 37: 43-55 (2013) - [c24]Ruzhi Xu, Baitao Ji, Yinong Chen:
Proxy based framework for personalized Web service composition. ISADS 2013: 1-8 - 2011
- [j1]Ruzhi Xu, Quansheng Wu, Peiguang Lin:
Research on Component Composition and Replacement with Formal Semantics. J. Softw. 6(9): 1640-1648 (2011) - 2010
- [c23]Ruzhi Xu, Quansheng Wu, Hongquan Gong, Leqiu Qian:
Research on Component Composition with Formal Semantics. IITSI 2010: 118-124 - [c22]Ruzhi Xu, Liwu Deng, Jian Guo:
A learning-based anomaly detection model of SQL attacks. WCNIS 2010: 639-642
2000 – 2009
- 2009
- [c21]Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng:
Information Security Monitoring System Based on Data Mining. IAS 2009: 472-475 - [c20]Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv:
A Database Protection System Aiming at SQL Attack. IAS 2009: 655-657 - 2008
- [c19]Feng Yang, Xiaoliang Dai, Ruzhi Xu:
The Common Problems on the Peer-to-Peer Multicast Overlay Networks. CSSE (3) 2008: 98-101 - [c18]Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu:
Cloud model-based data attributes reduction for clustering. e-Forensics 2008: 60 - [c17]Kangkang Zhang, Ruzhi Xu, Yan Zhang, Ying Sai, Xiaobin Wang:
An Ontology Supported Semantic Web Service Composition Method in Enterprise Application Integration. IMSCCS 2008: 222-227 - [c16]Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu:
Cloud Model-based Data Attributes Reduction for Clustering. ISECS 2008: 33-36 - [c15]Peiguang Lin, Ruzhi Xu, Peiyao Nie, Dongsheng Chu:
GROP: New Algorithm of Optimal Path for GIS-Based Logistics. ISIP 2008: 51-54 - 2007
- [c14]Kangkang Zhang, Ruzhi Xu, Qingzhong Li:
Matching and coordination of Semantic Web Services in distributed collaborative environment. CTS 2007: 414-419 - [c13]Desheng Li, Ruzhi Xu, Haiyang Wang:
A Semantic Web Based Peer to Peer Service Discovery Mechanism for Intelligent Business Process. ICEBE 2007: 730-737 - 2006
- [c12]Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui Tang:
A Service Retrieval Model with Enhanced Dominance-Based Rough Sets. CIT 2006: 249 - [c11]Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui Tang:
Research on a Mechanism for Assisting Service Retrieval. CIT 2006: 252 - [c10]Yunjiao Xue, Leqiu Qian, Xin Peng, Yijian Wu, Ruzhi Xu:
Using Abstract State Machine in Architecture Design of Distributed Software Component Repository. APWeb Workshops 2006: 861-868 - [c9]Peiguang Lin, Xiaozhong Fan, Ruzhi Xu, Haiyan Kang:
A Distributed IR Model Based on Semantic Web. ASWC 2006: 725-731 - [c8]Ying Sai, Peiyao Nie, Ruzhi Xu, Jincai Huang:
A rough set approach to mining concise rules from inconsistent data. GrC 2006: 333-336 - [c7]Ruzhi Xu, Yunjiao Xue, Peiyao Nie, Yuan Zhang, Desheng Li:
Research on CMMI-based Software Process Metrics. IMSCCS (2) 2006: 391-397 - [c6]Yunjiao Xue, Leqiu Qian, Ruzhi Xu, Bin Tang, Xin Peng:
An Adaptive Agent-Based Network for Distributed Component Repositories. IMSCCS (1) 2006: 458-465 - [c5]Xiaohong Yang, Jing Lu, Ruzhi Xu, Guangfeng Pan, Jin Liu:
A Reuse-Oriented Process Component Representation Framework. Software Engineering Research and Practice 2006: 156-162 - 2005
- [c4]Ruzhi Xu, Peiyao Nie, Ying Sai, Le-Hong Qu, Yun-Ting Lee:
Optimizing Software Process Based On Risk Assessment and Control. CIT 2005: 896-900 - [c3]Ruzhi Xu, Tao He, Dongsheng Chu, Yunjiao Xue, Leqiu Qian:
Reuse-Oriented Process Component Representation and Retrieval. CIT 2005: 911-915 - [c2]Ruzhi Xu, Peiyao Nie, Ying Sai, Yun-Ting Lee:
Reuse-based Software Process Improvement and Contro. SEKE 2005: 121-126 - 2003
- [c1]Ruzhi Xu, Leqiu Qian, Xinhai Jing:
CMM-based software risk control optimization. IRI 2003: 499-503
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint