default search action
Ruwei Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Mingkai Shen, Ruwei Huang:
Backdoor Attacks with Wavelet Embedding: Revealing and enhancing the insights of vulnerabilities in visual object detection models on transformers within digital twin systems. Adv. Eng. Informatics 60: 102355 (2024) - [j6]Chen Song, Ruwei Huang, Sai Hu:
Private-preserving language model inference based on secure multi-party computation. Neurocomputing 592: 127794 (2024) - [j5]Fengting Luo, Ruwei Huang, Yuqi Xie:
Hybrid blockchain-based many-to-many cross-domain authentication scheme for smart agriculture IoT networks. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101946 (2024) - 2023
- [j4]Yulin Shen, Ruwei Huang, Bei Hua, Yuanguan Pan, Yong Mei, Minghao Dong:
Automatic Tree Height Measurement Based on Three-Dimensional Reconstruction Using Smartphone. Sensors 23(16): 7248 (2023) - 2021
- [j3]Jianan Zhao, Ruwei Huang, Bo Yang:
Efficient GSW-Style Fully Homomorphic Encryption over the Integers. Secur. Commun. Networks 2021: 8823787:1-8823787:13 (2021) - [c9]Taoshen Li, Qing Liu, Ruwei Huang:
Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing. WISA 2021: 274-286 - [c8]Guang Wu, Ruwei Huang:
An Efficient Identity-based Forward Secure Signature Scheme from Lattices. IWCMC 2021: 626-631
2010 – 2019
- 2019
- [c7]Can Liu, Ningjiang Chen, Ruwei Huang, Yongsheng Xie:
A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks. ChineseCSCW 2019: 50-64 - [c6]Ruwei Huang, Zhikun Li, Guang Wu:
A Verifiable Encryption Scheme Supporting Fuzzy Search. SpaCCS 2019: 397-411 - [c5]Ruwei Huang, Zhikun Li, Jianan Zhao:
A Verifiable Fully Homomorphic Encryption Scheme. SpaCCS 2019: 412-426 - 2018
- [c4]Youchang Xu, Ningjiang Chen, Ruwei Huang, Hanlin Zhang:
KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment. Intelligent Information Processing 2018: 311-320 - [c3]Shuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang:
A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication. SpaCCS 2018: 240-250 - 2017
- [j2]Peicong He, Ruwei Huang, Ningjiang Chen, Bowen Zhao, Yang Liu:
云环境中基于cache负载实时定噪的同驻分析方法 (Co-residency Detection Scheme Based on Cache Load and Real Time Noise Ascertainment in Cloud). 计算机科学 44(5): 105-110 (2017) - 2012
- [c2]Wei Zhuang, Xiaolin Gui, Ruwei Huang, Si Yu:
TCP DDOS Attack Detection on the Host in the KVM Virtual Machine Environment. ACIS-ICIS 2012: 62-67 - 2011
- [j1]Ruwei Huang, Xiaolin Gui, Si Yu, Wei Zhuang:
Study of privacy-preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3): 801-819 (2011) - 2010
- [c1]Ruwei Huang, Si Yu, Wei Zhuang, Xiaolin Gui:
Design of Privacy-Preserving Cloud Storage Framework. GCC 2010: 128-132
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint