
Ruidong Li
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j29]Meiyue Wang, Ruidong Li
, Shizhong Xu:
Deshrinking ridge regression for genome-wide association studies. Bioinform. 36(14): 4154-4162 (2020) - [j28]Xiaoyan Hu, Shaoqi Zheng, Guoqiang Zhang, Lixia Zhao, Guang Cheng, Jian Gong, Ruidong Li:
An on-demand off-path cache exploration based multipath forwarding strategy. Comput. Networks 166 (2020) - [j27]Ruidong Li, Houbing Song, Jiannong Cao, Payam M. Barnaghi, Jie Li, Constandinos X. Mavromoustakis:
Big Data Intelligent Networking. IEEE Netw. 34(4): 6-7 (2020) - [j26]Minghui Dai, Zhou Su, Ruidong Li, Yuntao Wang, Jianbing Ni, Dongfeng Fang:
An Edge-Driven Security Framework for Intelligent Internet of Things. IEEE Netw. 34(5): 39-45 (2020) - [j25]Weiwei Li, Zhou Su, Ruidong Li, Kuan Zhang, Yuntao Wang:
Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks. IEEE Netw. 34(6): 31-37 (2020) - [j24]Ruidong Li
, Hitoshi Asaeda
:
MWBS: An Efficient Many-to-Many Wireless Big Data Delivery Scheme. IEEE Trans. Big Data 6(2): 233-247 (2020) - [j23]Zhou Su
, Minghui Dai, Qichao Xu
, Ruidong Li
, Shu Fu
:
Q-Learning-Based Spectrum Access for Content Delivery in Mobile Networks. IEEE Trans. Cogn. Commun. Netw. 6(1): 35-47 (2020) - [j22]Ruidong Li
, Hitoshi Asaeda
, Jie Wu
:
DCAuth: Data-Centric Authentication for Secure In-Network Big-Data Retrieval. IEEE Trans. Netw. Sci. Eng. 7(1): 15-27 (2020) - [j21]Ruidong Li
, Kazuhisa Matsuzono, Hitoshi Asaeda, Xiaoming Fu
:
Achieving High Throughput for Heterogeneous Networks With Consecutive Caching and Adaptive Retrieval. IEEE Trans. Netw. Sci. Eng. 7(4): 2443-2455 (2020) - [j20]Weiwei Li, Zhou Su
, Ruidong Li
, Kuan Zhang
, Qichao Xu
:
Abnormal Crowd Traffic Detection for Crowdsourced Indoor Positioning in Heterogeneous Communications Networks. IEEE Trans. Netw. Sci. Eng. 7(4): 2494-2505 (2020) - [c27]Zhou Su, Minghui Dai, Qichao Xu, Ruidong Li:
A Novel Resource Allocation Scheme With Unmanned Aerial Vehicles in Disaster Relief Networks. ICCC 2020: 102-106 - [c26]Weiwei Chen, Zhou Su, Qichao Xu, Tom H. Luan, Ruidong Li:
VFC-Based Cooperative UAV Computation Task Offloading for Post-disaster Rescue. INFOCOM 2020: 228-236
2010 – 2019
- 2019
- [j19]Ruidong Li, Hitoshi Asaeda
:
A Blockchain-Based Data Life Cycle Protection Framework for Information-Centric Networks. IEEE Commun. Mag. 57(6): 20-25 (2019) - [j18]Hitoshi Asaeda, Atsushi Ooka, Kazuhisa Matsuzono, Ruidong Li:
Cefore: Software Platform Enabling Content-Centric Networking and Beyond. IEICE Trans. Commun. 102-B(9): 1792-1803 (2019) - [j17]Xiang Lu, Ziyang Chen, Lianpo Wang, Ruidong Li, Chao Zhai:
RF-Drone: Multi-Tag System for RF-ID Enables Drone Tracking in GPS-Denied Environments. IEICE Trans. Commun. 102-B(10): 1941-1950 (2019) - [j16]Jun Xu, Dongming Bian, Chuang Wang, Gengxin Zhang, Ruidong Li:
Satellite Constellation Based on High Elevation Angle for Broadband LEO Constellation Satellite Communication System. IEICE Trans. Commun. 102-B(10): 1960-1966 (2019) - [c25]Xiaoyan Hu, Shaoqi Zheng, Jian Gong, Guang Cheng, Guoqiang Zhang, Ruidong Li:
Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking. CFI 2019: 2:1-2:4 - [c24]Ruidong Li, Hitoshi Asaeda
:
DIBN: A Decentralized Information-Centric Blockchain Network. GLOBECOM 2019: 1-6 - [c23]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Ruidong Li, Chengyu Fan:
Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View. NMIC@ICDCS 2019: 7-12 - 2018
- [j15]Ruidong Li
, Han Qu, Shibo Wang, Julong Wei, Le Zhang, Renyuan Ma, Jianming Lu, Jianguo Zhu, Wei-De Zhong, Zhenyu Jia:
GDCRNATools: an R/Bioconductor package for integrative analysis of lncRNA, miRNA and mRNA data in GDC. Bioinform. 34(14): 2515-2517 (2018) - [j14]Xiaoming Fu
, Dirk Kutscher, Satyajayant Misra, Ruidong Li:
Information-Centric Networking Security. IEEE Commun. Mag. 56(11): 60-61 (2018) - [c22]Ruidong Li, Kazuhisa Matsuzono, Hitoshi Asaeda
, Xiaoming Fu
:
Consecutive Caching and Adaptive Retrieval for In-Network Big Data Sharing. ICC 2018: 1-6 - [c21]Ruidong Li, Hitoshi Asaeda
:
Secure in-network big data provision with suspension chain model. INFOCOM Workshops 2018: 825-830 - 2017
- [j13]Ruidong Li
, Hitoshi Asaeda
, Jie Li
:
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT. IEEE Internet Things J. 4(3): 791-803 (2017) - [c20]Ruidong Li, Hitoshi Asaeda
, Jie Li, Xiaoming Fu
:
A Verifiable and Flexible Data Sharing mechanism for Information-Centric IoT. ICC 2017: 1-7 - [e1]Ruidong Li, Maode Ma:
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, ICTCE 2017, Osaka, Japan, October 22 - 24, 2017. ACM 2017, ISBN 978-1-4503-5315-1 [contents] - 2016
- [c19]Ruidong Li, Hitoshi Asaeda
, Klaus Moessner
:
Optimized Root Selection Algorithm for Many-to-Many Communications in ICN. CFI 2016: 43-48 - 2015
- [j12]Ruidong Li, Hiroaki Harai, Hitoshi Asaeda
:
An Aggregatable Name-Based Routing for Energy-Efficient Data Sharing in Big Data Era. IEEE Access 3: 955-966 (2015) - 2014
- [j11]Ruidong Li, Jie Li, Hitoshi Asaeda
:
A Hybrid Trust Management Framework for Wireless Sensor and Actuator Networks in Cyber-Physical Systems. IEICE Trans. Inf. Syst. 97-D(10): 2586-2596 (2014) - [j10]Hao Yue, Linke Guo, Ruidong Li, Hitoshi Asaeda
, Yuguang Fang:
DataClouds: Enabling Community-Based Data-Centric Services Over the Internet of Things. IEEE Internet Things J. 1(5): 472-482 (2014) - [j9]Hitoshi Asaeda
, Ruidong Li, Nakjung Choi:
Container-based unified testbed for information-centric networking. IEEE Netw. 28(6): 60-66 (2014) - [c18]Shuai Fu, Jie Li, Ruidong Li, Yusheng Ji:
A Game Theory Based Vertical Handoff Scheme for Wireless Heterogeneous Networks. MSN 2014: 220-227 - 2013
- [j8]Ved P. Kafle
, Ruidong Li, Daisuke Inoue, Hiroaki Harai:
Design and Implementation of Security for HIMALIS Architecture of Future Networks. IEICE Trans. Inf. Syst. 96-D(2): 226-237 (2013) - [j7]Ruidong Li, Jie Li:
Requirements and design for neutral trust management framework in unstructured networks. J. Supercomput. 64(3): 702-716 (2013) - [c17]Ruidong Li, Kazuyuki Morioka, Yasunori Owada, Masaaki Ohnishi, Hiroaki Harai:
Design and implementation of a proactive distributed authentication framework (PDAF). ICNP 2013: 1-6 - [c16]Ruidong Li, Hitoshi Asaeda
:
A community-oriented route coordination using information centric networking approach. LCN 2013: 793-800 - 2012
- [c15]Ruidong Li, Masaaki Ohnishi, Yasunori Owada, Hiroaki Harai:
PDAF: Proactive Distributed Authentication Framework for Regional Network. AsiaJCIS 2012: 44-50 - [c14]Ved P. Kafle
, Ruidong Li, Hajime Tazaki, Hiroaki Harai:
Network mobility management in HIMALIS architecture of future networks. GLOBECOM Workshops 2012: 998-1003 - [c13]Frieder Ganz
, Ruidong Li, Payam M. Barnaghi
, Hiroaki Harai:
A Resource Mobility Scheme for Service-Continuity in the Internet of Things. GreenCom 2012: 261-264 - [c12]Ved P. Kafle
, Ruidong Li, Daisuke Inoue, Hiroaki Harai:
An integrated security scheme for ID/locator split architecture of future network. ICC 2012: 5866-5871 - [c11]Ruidong Li, Ved P. Kafle
, Hiroaki Harai:
A proactive scheme for securing ID/locator split architecture. ICNP 2012: 1-6 - 2011
- [j6]Masugi Inoue, Masaaki Ohnishi, Chao Peng, Ruidong Li, Yasunori Owada:
NerveNet: A Regional Platform Network for Context-Aware Services with Sensors and Actuators. IEICE Trans. Commun. 94-B(3): 618-629 (2011) - [j5]Ruidong Li, Masugi Inoue:
Secure Sensor Sharing Framework for Mobile and Sensor Access Platform Network. IEICE Trans. Commun. 94-B(6): 1565-1576 (2011)
2000 – 2009
- 2009
- [c10]Ruidong Li, Jie Li, Peng Liu, Jien Kato:
A Novel Hybrid Trust Management Framework for MANETs. ICDCS Workshops 2009: 251-256 - [c9]Ruidong Li, Jie Li:
Towards Neutral Trust Management Framework in Unstructured Networks. MASS 2009: 771-776 - [c8]Ruidong Li, Masaaki Ohnishi, Chao Peng, Ved P. Kafle
, Masugi Inoue:
Capacity determination for deployment of managed mesh networks. PIMRC 2009: 1547-1551 - 2008
- [j4]Jie Li, Ruidong Li, Jien Kato:
Future trust management framework for mobile ad hoc networks. IEEE Commun. Mag. 46(4): 108-114 (2008) - [j3]Ruidong Li, Jie Li, Kui Wu, Yang Xiao, J. Xie:
An Enhanced Fast Handover with Low Latency for Mobile IPv6. IEEE Trans. Wirel. Commun. 7(1): 334-342 (2008) - [c7]Wei Wei, Yong Qi, Xin He, Wei Wang, Ruidong Li, Hui He:
Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology. APSCC 2008: 644-649 - [c6]Wei Wei, Yong Qi, Wei Wang, Ruidong Li, Yi Shi, Yu Gu, Andrew Chen:
Variant rate based cross layer time frame scheduling in wireless sensor networks. WTS 2008: 62-68 - 2007
- [j2]Ruidong Li, Jie Li, Hsiao-Hwa Chen:
DKMS: distributed hierarchical access control for multimedia networks. Int. J. Secur. Networks 2(1/2): 3-10 (2007) - [c5]Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen:
An Objective Trust Management Framework for Mobile Ad Hoc Networks. VTC Spring 2007: 56-60 - 2006
- [j1]Ruidong Li, Jie Li, Peng Liu, Hsiao-Hwa Chen:
On-demand public-key management for mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6: 295-306 (2006) - [c4]Ruidong Li, Jie Li:
An enhanced fast handover scheme for mobile IPv6. IWCMC 2006: 963-968 - 2005
- [c3]Ruidong Li, Jie Li, Hsiao-Hwa Chen:
Analysis and design of distributed hierarchical access control for multimedia networks. GLOBECOM 2005: 5 - [c2]Ruidong Li, Jie Li, Hisao Kameda:
Distributed Hierarchical Access Control for Secure Group Communications. ICCNMC 2005: 539-548 - 2004
- [c1]Ruidong Li, Jie Li, Hisao Kameda, Peng Liu:
Localized public-key management for mobile ad hoc networks. GLOBECOM 2004: 1284-1289
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-11 01:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint