近年来发表的部分论文 [1] Zhang X, Li R*, Hou W. Attention-Based LSTM Model for IFA Detection in Named Data Networking[J]. Security & Communication Networks, 2022. [2] Xiaodong Zhang, Ru Li*, Wenhan Hou, Jinshan Shi, "Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network", Security and Communication Networks, vol. 2021, Article ID 9967829, 13 pages, 2021. [3] Hou W, Cui B, Li R. A Survey on Blockchain Data Analysis[C]//2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2021: 357-365. [4] Shi J, Li R*. Permission Token Segmentation Scheme based on Blockchain Access Control[C]//2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 1956-1964. [5] Shi J , Li R* , Hou W . A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-based Access Control[J]. IEEE Access, 2020, PP(99):1-1. [6] Yu M , Li R* , Chen Y W . A Cache Replacement Policy Based on Multi-factors for Named Data Networking[J]. Computers, Materials and Continua, 2020, 65(1):321-336. [7] Song T , Cui B , Li R , et al. Smart Contract-Based Trusted Content Retrieval Mechanism for NDN[J]. IEEE Access, 2020, PP(99):1-1. [8] Mei-Ju Yu , Ru Li*. A caching decision and replacement strategy based on dynamic content popularity for NDN[J]. Computer Engineering & ence, 2019. [9] Yue P , Li R* , Pang B . Register before Publishing with Smart Forwarding, Mitigate Content Poisoning Attack in ICN[C]// IEEE, 2019. [10] 史锦山, 李茹*. 物联网下的区块链访问控制综述[J]. 软件学报, 2019, 30(6): 1632-1648. |