Yizhi REN


FOREWORD
Guojun WANG Yizhi REN 
Publication:   
Publication Date: 2022/02/01
Vol. E105-D  No. 2  pp. 193-194
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF

Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems
Yizhi REN Zelong LI Lifeng YUAN Zhen ZHANG Chunhua SU Yujuan WANG Guohua WU 
Publication:   
Publication Date: 2022/02/01
Vol. E105-D  No. 2  pp. 289-299
Type of Manuscript:  Special Section PAPER (Special Section on Blockchain Systems and Applications)
Category: 
Keyword: 
shilling attackheterogeneous information networkrecommend systemsemantic information
 Summary | Full Text:PDF

A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
Qiuhua WANG Mingyang KANG Guohua WU Yizhi REN Chunhua SU 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 230-238
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
secret key generationphysical-layer securitychannel reciprocityinformation reconciliationprivacy amplification
 Summary | Full Text:PDF

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
Jingyu HUA Mingchu LI Yizhi REN Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 255-264
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Network Security
Keyword: 
intrusion detectionstate transition tablestatic analysisstack walks
 Summary | Full Text:PDF

Modeling Security Bridge Certificate Authority Architecture
Yizhi REN Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6  pp. 1544-1547
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
PKIbridge certificate authoritysecurity
 Summary | Full Text:PDF

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
Yongrui CUI Mingchu LI Yizhi REN Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5  pp. 1339-1346
Type of Manuscript:  PAPER
Category: Graphs and Networks
Keyword: 
reputationvirtual organization formationgridcollusion attacks
 Summary | Full Text:PDF