Yizhi Ren
Title
Cited by
Cited by
Year
Flexible service selection with user-specific QoS support in service-oriented architecture
L Zhao, Y Ren, M Li, K Sakurai
Journal of Network and Computer Applications 35 (3), 962-973, 2012
982012
Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems
L Zhao, Y Ren, Y Xiang, K Sakurai
2010 IEEE 12th International Conference on High Performance Computing and …, 2010
662010
Fine-grained database field search using attribute-based encryption for e-healthcare clouds
C Guo, R Zhuang, Y Jie, Y Ren, T Wu, KKR Choo
Journal of medical systems 40 (11), 235, 2016
652016
A similarity metric method of obfuscated malware using function-call graph
M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren, N Zheng
Journal of Computer Virology and Hacking Techniques 9 (1), 35-47, 2013
462013
Reliable workflow scheduling with less resource redundancy
L Zhao, Y Ren, K Sakurai
Parallel Computing 39 (10), 567-585, 2013
412013
Behavior-based reputation management in P2P file-sharing networks
X Fan, M Li, J Ma, Y Ren, H Zhao, Z Su
Journal of Computer and System Sciences 78 (6), 1737-1750, 2012
312012
A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems
L Zhao, Y Ren, K Sakurai
2011 IEEE International Conference on Advanced Information Networking and …, 2011
262011
A recovery approach for SQLite history recorders from YAFFS2
B Wu, M Xu, H Zhang, J Xu, Y Ren, N Zheng
Information and Communication Technology-EurAsia Conference, 295-299, 2013
232013
Deep reinforcement learning for multimedia traffic control in software defined networking
X Huang, T Yuan, G Qiao, Y Ren
IEEE Network 32 (6), 35-41, 2018
202018
User influence analysis for Github developer social networks
Y Hu, S Wang, Y Ren, KKR Choo
Expert Systems with Applications 108, 108-118, 2018
192018
FineTrust: a fine‐grained trust model for peer‐to‐peer networks
Y Ren, M Li, K Sakurai
Security and Communication Networks 4 (1), 61-69, 2011
172011
A File Fragment Classification Method Based on Grayscale Image.
T Xu, M Xu, Y Ren, J Xu, H Zhang, N Zheng
JCP 9 (8), 1863-1870, 2014
152014
Dual-eigenrep: a reputation-based trust model for P2P file-sharing networks
X Fan, M Li, Y Ren, J Ma
2010 7th International Conference on Ubiquitous Intelligence & Computing and …, 2010
132010
Rigorous or tolerant: The effect of different reputation attitudes in complex networks
Y Ren, G Wang, L Yu, B Shi, W Hu, Z Wang
Future Generation Computer Systems 83, 476-484, 2018
122018
A forensic analysis method for Redis database based on RDB and AOF file
M Xu, X Xu, J Xu, Y Ren, H Zhang, N Zheng
Journal of Computers 9 (11), 2538-2544, 2014
122014
Neighbor-considered migration facilitates cooperation in prisoner’s dilemma games
Y Ren, X Chen, Z Wang, B Shi, G Cui, T Wu, KKR Choo
Applied Mathematics and Computation 323, 95-105, 2018
112018
Heterogeneous investment in spatial public goods game with mixed strategy
H Ding, Y Zhang, Y Ren, B Shi, KKR Choo
Soft Computing 22 (4), 1287–1294, 2018
112018
A new modified bridge certification authority PKI trust model
M Li, Y Ren, Z Wang, J Xie, H Yao
2006 First International Symposium on Pervasive Computing and Applications …, 2006
102006
A Location Inferring Model Based on Tweets and Bilateral Follow Friends.
X Wang, M Xu, Y Ren, J Xu, H Zhang, N Zheng
JCP 9 (2), 315-321, 2014
92014
Voluntary vaccination through self-organizing behaviors on locally-mixed social networks
B Shi, H Qiu, W Niu, Y Ren, H Ding, D Chen
Scientific Reports 7 (1), 1-11, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20