Skip to main content

and
  1. No Access

    Book and Conference Proceedings

  2. No Access

    Chapter and Conference Paper

    Searching for Textual Adversarial Examples with Learned Strategy

    Adversarial attacks can help to reveal the vulnerability of neural networks. In the text classification domain, synonym replacement is an effective way to generate adversarial examples. However, the number of ...

    **angzhe Guo, Ruidan Su, Shikui Tu, Lei Xu in Neural Information Processing (2023)

  3. No Access

    Book and Conference Proceedings

    Medical Imaging and Computer-Aided Diagnosis

    Proceedings of 2022 International Conference on Medical Imaging and Computer-Aided Diagnosis (MICAD 2022)

    Ruidan Su, Yudong Zhang, Han Liu in Lecture Notes in Electrical Engineering (2023)

  4. No Access

    Article

    Blockchain-based trust management for verifiable time synchronization service in IoT

    With the rapid development of IoT, to manage the explosive growth of devices, time synchronization in IoT systems has become crucial. A traditional solution is to designate a trusted time relay to provide time...

    Kai Fan, Zeyu Shi, Ruidan Su, Yuhan Bai in Peer-to-Peer Networking and Applications (2022)

  5. No Access

    Book and Conference Proceedings

  6. Article

    Data-Driven Granular Computing Systems and Applications

    Ruidan Su, George Panoutsos, **aodong Yue in Granular Computing (2021)

  7. No Access

    Article

    Automated accurate registration method between UAV image and Google satellite map

    Because Unmanned Aerial Vehicle (UAV) image exhibits low positioning accuracy, the accurate registration of the image is required. Since the viewpoint direction, capturing time and shoot height are considerabl...

    Yijie Yuan, Wei Huang, **angxin Wang, Huaiyu Xu in Multimedia Tools and Applications (2020)

  8. No Access

    Book and Conference Proceedings

    Medical Imaging and Computer-Aided Diagnosis

    Proceeding of 2020 International Conference on Medical Imaging and Computer-Aided Diagnosis (MICAD 2020)

    Ruidan Su, Han Liu in Lecture Notes in Electrical Engineering (2020)

  9. No Access

    Article

    Secure and private key management scheme in big data networking

    Due to the penetration of various digital devices in our daily life, the data increases in an explosive way. It is highly agreed that the big data era is coming. Big data has a significant and promising future...

    Kai Fan, Shuyang Lou, Ruidan Su, Hui Li in Peer-to-Peer Networking and Applications (2018)

  10. No Access

    Article

    An ultra-lightweight RFID authentication scheme for mobile commerce

    With the popularity of mobile social network, more and more people are willing to use a mobile device to accomplish some social activities, such as payment when shop**, product information inquiries, where R...

    Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li in Peer-to-Peer Networking and Applications (2017)

  11. No Access

    Chapter and Conference Paper

    ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device

    RFID is widely used on mobile devices and makes it possible to take advantage of RFID system to complete mobile payment or merchandise information reading. However, the widespread use of RFID tags brings the p...

    Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li in Wireless Algorithms, Systems, and Applicat… (2015)

  12. No Access

    Article

    Fair non-repudiation for web services transactions

    To safeguard the interests of transacting parties, non-repudiation mechanisms need to assure fairness and timeliness. The non-repudiation service currently implemented usually does not consider the requirement...

    Ruidan Su, Shaofeng Fu, Lihua Zhou in Wuhan University Journal of Natural Sciences (2010)

  13. No Access

    Chapter and Conference Paper

    Design and Implementation of a Parallel Crypto Server

    As demands for secure communication bandwidth grow, efficient processing of cryptographic server at the host has become a constraint that prevents the achievement of acceptable secure services at large e-comme...

    **aofeng Rong, **aojuan Gao, Ruidan Su in Computational Intelligence and Security (2005)