default search action
Ou Ruan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Jia Yang, Ou Ruan, JiXin Zhang:
Tensor-based gated graph neural network for automatic vulnerability detection in source code. Softw. Test. Verification Reliab. 34(2) (2024) - 2022
- [c18]Ou Ruan, Jianqiang Zeng:
A Delegated Offline Private Set Intersection Protocol for Cloud Computing Environments. ICCIR 2022: 735-739 - [c17]Zhongqiu Xu, Mingzhi Wang, Bingchen Zhang, Yirong Wu, Suihua Liu, Ou Ruan:
Nonconvex-NLTV Regularization-Based SAR Image Feature Enhancement with Water Body Information Extraction Using QILU-1 SAR Data. IGARSS 2022: 2947-2950 - [c16]Ou Ruan, Shanshan Qin:
Secure and efficient publicly verifiable ridge regression outsourcing scheme. TrustCom 2022: 703-709 - 2021
- [j10]Ou Ruan, Lixiao Zhang, Yuanyuan Zhang:
Location-sharing protocol for privacy protection in mobile online social networks. EURASIP J. Wirel. Commun. Netw. 2021(1): 127 (2021) - 2020
- [j9]Ou Ruan, Hao Mao:
Efficient Private Set Intersection Using Point-Value Polynomial Representation. Secur. Commun. Networks 2020: 8890677:1-8890677:12 (2020) - [c15]Ou Ruan, Xiongbo Huang, Hao Mao:
An Efficient Private Set Intersection Protocol for the Cloud Computing Environments. BigDataSecurity/HPSC/IDS 2020: 254-259
2010 – 2019
- 2019
- [j8]Ou Ruan, Zihao Wang, Jing Mi, Mingwu Zhang:
New Approach to Set Representation and Practical Private Set-Intersection Protocols. IEEE Access 7: 64897-64906 (2019) - [j7]Ou Ruan, Zihao Wang, Qingping Wang, Mingwu Zhang:
Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange. Int. J. Netw. Secur. 21(5): 861-871 (2019) - [j6]Ou Ruan, Qingping Wang, Zihao Wang:
Provably leakage-resilient three-party password-based authenticated key exchange. J. Ambient Intell. Humaniz. Comput. 10(1): 163-173 (2019) - [c14]Ou Ruan, Yang Yang, Mingwu Zhang:
An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol. NSS 2019: 665-674 - 2018
- [j5]Ou Ruan, Yuanyuan Zhang, Mingwu Zhang, Jing Zhou, Lein Harn:
After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange. IEEE Syst. J. 12(2): 2017-2026 (2018) - [c13]Yaqing Liao, Jing Zhou, Yang Yang, Ou Ruan:
An Efficient Oblivious Transfer Protocol with Access Control. AsiaJCIS 2018: 29-34 - 2017
- [j4]Ou Ruan, Jing Chen, Mingwu Zhang:
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model. IEEE Access 5: 26832-26841 (2017) - [c12]Fang Wan, HaiNing Li, Huazhong Jin, GuangBo Lei, Ou Ruan:
A Method for Estimating the Camera Parameters Based on Vanishing Points. CISIS 2017: 499-507 - [c11]Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian:
PaEffExtr: A Method to Extract Effect Statements Automatically from Patents. CISIS 2017: 667-676 - [c10]Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian:
The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering. EIDWT 2017: 119-125 - [c9]Fang Wan, Huazhong Jin, GuangBo Lei, Ou Ruan:
Fast Iterative Reconstruction Based on Condensed Hierarchy Tree. EIDWT 2017: 390-399 - [c8]Huazhong Jin, Fang Wan, Ou Ruan:
Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image. EIDWT 2017: 475-488 - [c7]Qingping Wang, Ou Ruan, Zihao Wang:
Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol. EIDWT 2017: 497-508 - [c6]Ou Ruan, Mingwu Zhang, Jing Chen:
Leakage-Resilient Password-Based Authenticated Key Exchange. ICA3PP 2017: 285-296 - [c5]Hanqiu Xu, Qingping Wang, Jing Zhou, Ou Ruan:
An Efficient Provably Secure Password-Based Authenticated Key Agreement. IMIS 2017: 423-434 - [c4]Huazhong Jin, Feng Guan, Fang Wan, Ou Ruan, Qing Li:
An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering. IMIS 2017: 686-695 - 2016
- [j3]Ou Ruan, Jing Zhou, Mingwu Zhang:
An efficient resource-fair commit-prove-fair-open protocol. Int. J. Electron. Secur. Digit. Forensics 8(1): 17-34 (2016) - 2015
- [j2]Ou Ruan, Neeraj Kumar, Debiao He, Jong-Hyouk Lee:
Efficient provably secure password-based explicit authenticated key agreement. Pervasive Mob. Comput. 24: 50-60 (2015) - 2014
- [j1]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui, Mingwu Zhang:
An efficient fair UC-secure protocol for two-party computation. Secur. Commun. Networks 7(8): 1253-1263 (2014) - [c3]Shengbo Peng, Ou Ruan, Jing Zhou, Zaixing Chen:
A New Identity-Based Authentication Scheme for SIP. AsiaJCIS 2014: 90-95 - 2013
- [c2]Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu:
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs. TrustCom/ISPA/IUCC 2013: 544-551 - 2012
- [c1]Ou Ruan, Jing Zhou, Minghui Zheng, Guohua Cui:
Efficient Fair Secure Two-Party Computation. APSCC 2012: 243-248 - 2011
- [i1]Ou Ruan, Cai Fu, Guohua Cui:
An Efficient Protocol for the Commit-Prove-Fair-Open functionality. IACR Cryptol. ePrint Arch. 2011: 577 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint