首页 | 最新信息 | 教学课程 | 研究项目 | 著作出版 | 论文发表 | 发明专利 | 个人简介

论文发表

l  专著教材 (Books)

2. 李瑞轩,卢正鼎.多数据库系统原理与技术.北京:电子工业出版社,2005.11

1. 李瑞轩,杨曼红,王俊.Oracle Developer 2000 学习教程.北京:北京大学出版社,2000.7

l  论文集/书的章节 (Edited Books / Book Chapters / Proceedings)

3. Ruixuan Li, Xinhua Dong, Wanwan Zhou, Cong Wang, Zhengyuan Xue, Keqin Li. System Optimization for Big Data Processing. In: Rajkumar Buyya, Rodrigo N. Calheiros, and Amir Vahid Dastjerdi, eds., Big Data: Principles and Paradigms, Morgan Kaufmann/Elsevier, 2016

2. Ruixuan Li, Jiannong Cao, Julien Bourgeois. Advances in Grid and Pervasive Computing - 7th International Conference, GPC 2012 Proceedings, LNCS 7296, Springer, Hong Kong, China, May 11-13, 2012

1. 徐宝文,孟小峰,单志广,杨楠,李瑞轩,许蕾.Web信息系统技术与应用.北京:清华大学出版社,2007.9

l  最新论文 (Recent Papers)

4. Zhengyuan Xue, Ruixuan Li, Heng Zhang, Xiwu Gu, Zhiyong Xu. DC-Top-k: A Novel Top-k Selecting Algorithm and Its Parallelization. The 45th International Conference on Parallel Processing (ICPP 2016), Philadelphia, PA, August 16-19, 2016

3. Ruixuan Li, Chenglin Shen, Heng He, Zhiyong Xu, Cheng-Zhong Xu. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing, 2016

2. Heng He, Ruixuan Li, Xinhua Dong, Zhao Zhang. Secure, Efficient and Fine-grained Data Access Control Mechanism for P2P Storage Cloud. IEEE Transactions on Cloud Computing, 2014, 2(4): 471-484

1. Dongsheng Duan, Yuhua Li, Ruixuan Li, Rui Zhang, Xiwu Gu, Kunmei Wen. LIMTopic: A Framework of Incorporating Link based Importance into Topic Modeling. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(10): 2493-2506

l  英文期刊论文 (Refereed Journal Papers)

    2016

69. Ruixuan Li, Chenglin Shen, Heng He, Zhiyong Xu, Cheng-Zhong Xu. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing, 2016

68. Xinhua Dong, Ruixuan Li, Heng He, Xiwu Gu, Mudar Sarem, Meikang Qiu, Keqin Li. EDS: An Efficient Data Selection Policy for Search Engine Storage Architectures. Future Generation Computer Systems, Elsevier, 2016

67. Wei Ye, Ruixuan Li, Xiwu Gu, Yuhua Li, Kunmei Wen. Role Mining Using Answer Set Programming. Future Generation Computer Systems, Elsevier, 2016, 55: 336-343

66. Mohamed A.G. Hazber, Ruixuan Li, Xiwu Gu, Guandong Xu. Integration Mapping Rules: Transforming Relational Database to Semantic Web Ontology. Applied Mathematics & Information Sciences, 2016, 10(3): 1-21

65. Shuoyi Zhao, Ruixuan Li, Wenlong Tian, Weijun Xiao, Xinhua Dong, Dongjie Liao, Samee U. Khan, Keqin Li. Divide-and-Conquer Approach for Solving Singular Value Decomposition based on MapReduce. Concurrency and Computation: Practice and Experience, Wiley, 2016, 28(2): 331-350

64. Hongmu Han, Ruixuan Li, Xiwu Gu. Identifying Malicious Android Apps Using Permissions and System Events. International Journal of Embedded Systems, Inderscience, 2016, 8(1): 46-58

    2015

63. Ruixuan Li, Huaqing Li, Xiwu Gu, Yuhua Li, Wei Ye, Xiaopu Ma. Role mining based on cardinality constraints. Concurrency and Computation: Practice and Experience, 2015, 27(12): 3126-3144

62. Xiaopu Ma, Ruixuan Li, Hongwei Wang, Huaqing Li, Xiwu Gu. Role Mining Based on Permission Cardinality Constraint and User Cardinality Constraint. Security and Communication Networks, Wiley, 2015, 8(13): 2317-2328

61. Xinhua Dong, Ruixuan Li, Heng He, Wanwan Zhou, Zhengyuan Xue, Hao Wu. Secure Sensitive Data Sharing on a Big Data Platform. Tsinghua Science and Technology, 2015, 20(1): 72-80

    2014

60. Heng He, Ruixuan Li, Xinhua Dong, Zhao Zhang. Secure, Efficient and Fine-grained Data Access Control Mechanism for P2P Storage Cloud. IEEE Transactions on Cloud Computing, 2014, 2(4): 471-484

59. Dongsheng Duan, Yuhua Li, Ruixuan Li, Rui Zhang, Xiwu Gu, Kunmei Wen. LIMTopic: A Framework of Incorporating Link based Importance into Topic Modeling. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(10): 2493-2506

58. Xiaopu Ma, Ning Cheng, Li Zhao, Ruixuan Li. An Efficient Role-Based Access Control Approach in IRBAC 2000. ICIC Express Letters, 2014, 8(6): 1593-1598

57. Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao. An Efficient ECC-Based Mechanism for Securing Network Coding-Based P2P Content Distribution. Peer-to-Peer Networking and Applications, Springer, 2014, 7(4): 572-589

56. Liang Huang, Ruixuan Li, Hong Chen, Xiwu Gu, KunmeiWen, Yuhua Li. Detecting Network Communities Using Regularized Spectral Clustering Algorithm. Artificial Intelligence Review, Springer, 2014, 41(4): 579-594

55. Yuhua Li, Aiming Wen, Quan Lin, Ruixuan Li, Zhengding Lu. Name disambiguation in scientific cooperation network by exploiting user feedback. Artificial Intelligence Review, Springer, 2014, 41(4): 563-578

54. Guoqiang Gao, Ruixuan Li, Heng He, Zhiyong Xu. Distributed Caching in Unstructured Peer-to-Peer File Sharing Networks. Computers and Electrical Engineering, Elsevier, 2014, 40(2): 688-703

53. Kunmei Wen, Ruixuan Li, Jing Xia, Xiwu Gu. Optimizing ranking method using social annotations based on language model. Artificial Intelligence Review, Springer, 2014, 41(1): 81-96

52. Ruixuan Li, Zhiyong Xu, Wanshang Kang, Kin Choong Yow, Cheng-Zhong Xu. Efficient Multi-keyword Ranked Query over Encrypted Data in Cloud Computing. Future Generation Computer Systems, Elsevier, 2014, 30(1): 179-190

    2013

51. Guoqiang Gao, Ruixuan Li, Weijun Xiao, Zhiyong Xu. Measurement study on P2P streaming systems. The Journal of Supercomputing, Springer, 2013, 66(3): 1656-1686

50. Zhuo Tang, Junqing Zhou, Kenli Li, Ruixuan Li. A MapReduce Task Scheduling Algorithm for Deadline Constraints. Cluster Computing, Springer, 2013, 16(4): 651-662

49. Biao Zhang, Shuai Zhong, Kunmei Wen, Ruixuan Li, Xiwu Gu. Finding high-influence microblog users with an improved PSO algorithm. International Journal of Modelling, Identification and Control, Inderscience Publishers, 2013, 18(4): 349-356

48. Xiaopu Ma, Yan Tian, Li Zhao, Ruixuan Li. Mining role based on ranks. ICIC Express Letters, Part B: Applications, 2013, 4(2): 319-326

47. Xinhua Dong, Ruixuan Li, Wanwan Zhou, Dongjie Liao, Shuoyi Zhao. Data Security and Privacy in Cloud Storage. ZTE Communications, 2013, 11(2): 18-23

46. Dongsheng Duan, Yuhua Li, Ruixuan Li, Zhengding Lu, Aiming Wen. MEI: Mutual Enhanced Infinite Community–Topic Model for Analyzing Text-Augmented Social Networks. The Computer Journal, Oxford Journals, 2013, 56(3): 336-354

45. Kunmei Wen, Suo Tan, Jie Wang, Ruixuan Li, Yuan Gao. A model based transformation paradigm for cross-language collaborations. Advanced Engineering Informatics, Elsevier, 2013, 27(1): 27-37

    2012

44. Heng He, Ruixuan Li, Xinhua Dong, Zhi Zhang, Hongmu Han. An Efficient and Secure Cloud-Based Distributed Simulation System. Applied mathematics & Information Sciences, 2012, 6(3): 729-736

43. Ruixuan Li, Wei Wang, Xiaopu Ma, Xiwu Gu, Kunmei Wen. Mining Roles using Attributes of Permissions. International Journal of Innovative Computing, Information and Control, 2012, 8(11): 7909-7924

42. Guoqiang Gao, Ruixuan Li, Zhengding Lu. TSPN: Term-based semantic peer-to-peer networks. Wuhan University Journal of Natural Sciences, Springer, 2012, 17(1): 31-35

41. Dongsheng Duan, Yuhua Li, Ruixuan Li, Zhengding Lu. Incremental K-clique clustering in dynamic social networks. Artificial Intelligence Review, Springer, 2012, 38(2): 129-147

40. Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu. Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models. IEICE Transactions on Communications, 2012, E95-B(5): 1508-1518

39. Kunmei Wen, Yong Zeng, Ruixuan Li, Jianqiang Lin. Modeling semantic information in engineering applications: a review. Artificial Intelligence Review, Springer, 2012, 37(2): 97-117

38. Xiaopu Ma, Ruixuan Li, Zhengding Lu, Wei Wang. Mining Constraints in Role-Based Access Control. Mathematical and Computer Modelling, Elsevier, 2012, 55(1-2): 87-96

37. Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu. Proactive Replication for Rare Objects in Unstructured Peer-to-Peer Networks. Journal of Network and Computer Applications, Elsevier, 2012, 35(1): 85-96

    2011

36. Xiaopu Ma, Ruixuan Li, Zhengding Lu, Jianfeng Lu, Meng Dong. Specifying and Enforcing the Principle of Least Privilege in Role-Based Access Control. Concurrency and Computation: Practice and Experience, Wiley, 2011, 23(12): 1313–1331

35. Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu. Inconsistency Resolving of Safety and Utility in Access Control. EURASIP Journal on Wireless Communications and Networking, Hindawi Publishing Corporation, 2011: 101

34. Bing Li, Buqing Cao, Kunmei Wen, Ruixuan Li. Trustworthy Assurance of Service Interoperation in Cloud Environment. International Journal of Automation and Computing, 2011, 8(3): 297-308

33. Yan’an Jin, Ruixuan Li, Kunmei Wen, Xiwu Gu, Fei Xiao. Topic-based ranking in Folksonomy via probabilistic model. Artificial Intelligence Review, Springer, 2011, 36(2): 139-151

32. Jinwei Hu, Ruixuan Li, Zhengding Lu, Jianfeng Lu, Xiaopu Ma. RAR: A Role-and-Risk Based Flexible Framework for Secure Collaboration. Future Generation Computer Systems, Elsevier, 2011, 27(5): 574-586

31. Ruixuan Li, Wei Song, Haiying Shen, Weijun Xiao, Zhengding Lu. A Flabellate Overlay Network for Multi-attribute Search. Journal of Parallel and Distributed Computing, Elsevier, 2011, 71(3): 407-423

30. Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin Sun, Bing Li. Type-2 Fuzzy Description Logic. Frontiers of Computer Science in China, Springer, 2011, 5(2): 205-215

    2010

29. Ruixuan Li, Jianfeng Lu, Zhengding Lu, Xiaopu Ma. Consistency Checking of Safety and Availability in Access Control. IEICE Transactions on Information and Systems, 2010, E93-D(3): 491-502

28. Ruixuan Li, Cuihua Zuo, Haiying Shen, Kunmei Wen, Xiwu Gu. PercolationNET: a Multi-tree P2P Overlay Network Supporting High Coverage Search. International Journal of Parallel, Emergent and Distributed Systems, 2010, 25(1): 73-89

    2009

27. Cuihua Zuo, Ruixuan Li, Zhengding Lu. A Novel Approach to Improve the Security of P2P File-Sharing Systems. International Journal of Communications, Network and System Sciences, 2009, 2(3): 229-236

26. Zuo Cui-hua, Li Rui-xuan, Lu Zheng-ding. A Caching Scheme Based on Power-law Characteristic in Unstructured P2P Networks. Journal of Southwest Jiaotong University (English Edition), 2009, 17(3): 1-8

    2008

25. Ruixuan Li, Zhuo Tang, Zhengding Lu, Jinwei Hu. Request-Driven Role Mapping Framework for Secure Interoperation in Multi-Domain Environments. Computer Systems Science and Engineering, CRL Publishing, 2008, 23(3): 193-207

24. Huang Baohua, He Lin, Bao Yang, Li Zhuoya, Li Ruixuan. PeerMD: A P2P Molecular Dynamics Simulation Framework Based on Web Services. Wuhan University Journal of Natural Sciences, Springer, 2008, 13(4): 471-474

23. Gu Xiwu, Li Ruixuan, Lu Zhengding. Typed Formal Model for WS-CDL Specification of Web Services Composition. Journal of Southeast University (English Edition), 2008, 24(3): 300-307

22. Yu Guangcan, Li Ruixuan, Lu Zhengding, Mudar Sarem, Song Wei, Su Yonghong. Multi-Level Access Control Model for Tree-Like Hierarchical Organizations. Journal of Southeast University (English Edition), 2008, 24(3): 393-396

    2007

21. LU Zhengding, WEN Zhumu, TANG Zhuo, LI Ruixuan. Resolution for Conflicts of Inter-Operation in Multi-Domain Environment. Wuhan University Journal of Natural Sciences, Springer, 2007, 12(5): 955-960

20. Wen Kunmei, Lu Zhengding, Li Ruixuan, Sun Xiaolin. Design and Implementation of Semantic Search Engine - Smartch. Journal of Southeast University (English Edition), 2007, 23(3): 317-321

19. Sun Xiaolin, Lu Zhengding, Li Ruixuan, Wang Zhigang, Wen Kunmei. Novel Scheme to Specify and Integrate RBAC Policy Based on Ontology. Journal of Southeast University (English Edition), 2007, 23(3): 394-398

18. Li Kai, Lu Zhengding, Li Ruixuan, Tang Zhuo. Agent Based Automated Trust Negotiation Model. Journal of Southeast University (English Edition), 2007, 23(3): 469-473

    2006

17. YAO Hanbing, HU Heping, LU Zhengding, LI Ruixuan. Dynamically Authorized Role-Based Access Control for Grid Applications. Geo-spatial Information Science, 2006, 9(3): 223-228, 233

16. YU Guangcan, LU Zhengding, LI Ruixuan, MUDAR Sarem. Centralized Role-Based Access Control for Federated Multi-Domain Environments. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(6): 1688-1692

15. WANG Guoren, XU Lizhen, XU Baowen, YU Ge, MENG Xiaofeng, HE Yanxiang, LI Ruixuan. A Survey of Web Information Systems and Applications. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(5): 1059-1064

14. TANG Zhuo, LU Zhengding, LI Ruixuan. A Routing Algorithm for Risk-Scanning Agents Using Ant Colony Algorithm in P2P Network. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(5): 1097-1103

13. CHEN Yunkai, LU Zhengding, LI Ruixuan, LI Yuhua, SUN Xiaolin. The Research of an Incremental Conceptive Clustering Algorithm and Its Application in Detecting Money Laundering. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(5): 1076-1080

12. YI Gaoxiang, HU Heping, LU Zhengding, LI Ruixuan. A Novel Web Query Automatic Expansion Based on Rough Set. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(5): 1167-1171

11. HUANG Baohua, HU Heping, LU Zhengding, YAO Hanbing, LI Ruixuan. Trust Degree of Web Services and Its Evaluation with Neural Network. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(5): 1302-1305

10. Sun Xiao-lin, Lu Zheng-ding, Li Yu-hua, Wen Kun-mei, Li Rui-xuan. Construction and Resource Locating of Semantic P2P Grid Based on Description Logics. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(1): 78-82

9. Fu Cai, Hong Fan, Li Rui-xuan, Hong Liang, Chen Jing. Self-Orangized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(1): 188-192

8. Li Yu-hua, Lu Zheng-ding, Sun Xiao-lin, Wen Kun-mei, Li Rui-xuan. Data Mining Ontology Development for High User Usability. Wuhan University Journal of Natural Sciences, Springer, 2006, 11(1): 51-55

    2005

7. Li Ruixuan, Lu Zhengding, Xiao Weijun, Wu Wei. XML-based Integration Data Model and Schema Mapping in Multidatabase Systems. Journal of Systems Engineering and Electronics, 2005, 16(2): 437-444

    2004

6. Li Rui-xuan, Lu Zheng-ding, Wu Wei, Xiao Wei-jun. Integrating XML with CORBA-based Multidatabase Systems. Wuhan University Journal of Natural Sciences, Springer, 2004, 9(5): 676-680

5. Wu Wei, Lu Zheng-ding, Li Rui-xuan, Wang Zhi-gang. A Dynamic XML-NS View Based Approach for the Extensible Integration of Web Data Sources. Wuhan University Journal of Natural Sciences, Springer, 2004, 9(5): 647-651

4. Wang Zhi-gang, Lu Zheng-ding, Li Rui-xuan, Wu Wei, Wang Xiao-gang. TrustedRBAC – a Distributed Authorization Infrastructure Span Multiple Autonomous Domains. Wuhan University Journal of Natural Sciences, Springer, 2004, 9(5): 694-698

    2003

3. Lou Qinjian, Mudar Sarem, Li Ruixuan, Xiao Weijun, Lu Zhengding, Chen Chuanbo.  A CORBA-based Multidatabase System - Panorama Project, Wuhan University Journal of Natural Sciences, Springer, 2003, 8(1A): 21-27

    2002

2. Mudar Sarem, Li Ruixuan, Xiao Weijun, Lu Zhengding, Chen Chuanbo.  The Interoperability of Different DBMSs Through a CORBA-based Multidatabase System, Wuhan University Journal of Natural Sciences, Springer, 2002, 7(4):408-414

    2001

1. Mudar Sarem, Li Ruixuan, Xiao Weijun and Lu Zhengding Registering Different DBMSs to Panorama with CORBA. In: Proceedings of the 2001 International Software Engineering Symposium (ISES 2001), Wuhan, China, appears in Wuhan University Journal of Natural Sciences, Springer, 2001, 6(1-2):423-431

l   国际会议论文 (Refereed Conference / Symposium / Workshop Papers)

    2016

74. Zhengyuan Xue, Ruixuan Li, Heng Zhang, Xiwu Gu, Zhiyong Xu. DC-Top-k: A Novel Top-k Selecting Algorithm and Its Parallelization. The 45th International Conference on Parallel Processing (ICPP 2016), Philadelphia, PA, August 16-19, 2016

    2015

73. Wanwan Zhou, Ruixuan Li, Xinhua Dong, Zhiyong Xu, Weijun Xiao. An Intersection Cache Based on Frequent Itemset Mining in Large Scale Search Engines. The 3rd IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb 2015), Washington, D.C., USA, November 12-13, 2015, pp. 19-24

72. Daudi Mashauri, Ruixuan Li, Hongmu Han, Xiwu Gu, Zhiyong Xu, Cheng-zhong Xu. Adaptive Multi-Keyword Ranked Search over Encrypted Cloud Data. The 11th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2015), Wuhan, China, November 10-11, 2015, pp. 3-13

71. Hongmu Han, Ruixuan Li, Jinwei Hu, Meikang Qiu. Context Awareness through Reasoning on Privacy Analysis for Android Application. The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, USA, Nov. 3-5, 2015, pp. 148-156

70. Kunmei Wen, Zhijiang Liu, Shuai Xu, Ruixuan Li, Yuhua Li, Xiwu Gu, Jie Zan. Subtopic-Level Sentiment Analysis of Emergencies. The 8th International Conference on Knowledge Science, Engineering and Management (KSEM 2015), Chongqing, China, October 28-30, 2015, pp. 312-317

69. Mohamed A.G. Hazber, Ruixuan Li, Yuxi Zhang, Guandong Xu. An Approach for Mapping Relational Database into Ontology. The 12th Web Information System and Application Conference (WISA 2015), Jinan, Shandong, China, Sep 11-13, 2015, pp. 120-125

68. Xinhua Dong, Ruixuan Li, Heng He, Xiwu Gu, Mudar Sarem, Meikang Qiu, Keqin Li. An Efficient Data Selection Policy for Search Engine Cache Management. The 17th IEEE International Conference on High Performance Computing and Communications (HPCC 2015), New York, USA, August 24-26, 2015, pp.122-127

67. Mohamed A.G. Hazber, Ruixuan Li, Xiwu Gu, Guandong Xu, Yuhua Li. Semantic SPARQL query in a relational database based on ontology construction. The 11th International Conference on Semantics, Knowledge and Grids (SKG 2015), Beijing, China, Aug 19-21, 2015

    2014

66.  Yanchun Lu, Ruixuan Li, Kunmei Wen, Zhengding Lu. Automatic Keyword Extraction for Scientific Literatures Using References. 2014 International Conference on Innovative Design and Manufacturing (ICIDM 2014), Montreal, QC, Canada, August 13-15, 2014, pp. 78-81

    2013

65.  Wei Ye, Ruixuan Li, Huaqing Li. Role Mining Using Boolean Matrix Decomposition With Hierarchy. The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), Melbourne, Australia, 16-18 July, 2013, pp. 805-812

64. Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, Xiwu Gu. RMiner: A Tool Set for Role Mining. The 18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013) (Demo), Amsterdam, The Netherlands,  Jun 12-14, 2013, pp. 193-196

63. Ding Liu, Ruixuan Li, David J. Lilja, Weijun Xiao. A Divide-and-Conquer Approach for Solving Singular Value Decomposition on a Heterogeneous System. ACM International Conference on Computing Frontiers (CF 2013), Ischia, Italy, May 14-16, 2013, pp.36

62. Khaled M. Banafaa, Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li. Keyword-matched Data Skyline in Peer-to-Peer Systems. The 18th International Conference on Database Systems for Advanced Applications (DASFAA 2013), Wuhan, China, April 22-25, 2013, pp. 71-85

    2012

61. Zhiyong Xu, Wanshen Kang, Ruixuan Li, Yow Kin Choong, Cheng-Zhong Xu. Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud. The 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2012), Singapore, Dec 17-19, 2012, pp. 244-251

60. Dongsheng Duan, Yuhua Li, Ruixuan Li, Rui Zhang, Aiming Wen. RankTopic: Ranking Based Topic Modeling. IEEE International Conference on Data Mining (ICDM 2012), Brussels, Belgium, December 10-13, 2012, pp. 211-220 (Acceptance rate: 10.7%, 81/756)

59. Zhiyong Xu, Ruixuan Li, Cheng-Zhong Xu. CAST: A Page-Level FTL with Compact Address Mapping and Parallel Data Blocks. The 31st IEEE International Performance Computing and Communications Conference (IPCCC 2012), Austin, Texas, USA, December 1-3, 2012, pp. 142-151

58. Ruixuan Li, Chengzhou Li, Weijun Xiao, Hai Jin, Heng He, Xiwu Gu, Kunmei Wen, Zhiyong Xu. An Efficient SSD-based Hybrid Storage Architecture for Large-scale Search Engines. The 41st International Conference on Parallel Processing (ICPP 2012), Pittsburgh, PA, USA, September 10-13, 2012, pp. 450-459

57. Khaled M. Banafaa, Ruixuan Li. Efficient Algorithms for Constrained Subspace Skyline Query in Structured Peer-to-Peer Systems. The 13th International Conference on Web-Age Information Management (WAIM 2012), Harbin, China, August 18-20, 2012, pp. 334-345

56. Weijun Xiao, Xiaoqiang Lei, Ruixuan Li, Nohhyun Park, David J. Lilja. PASS: A Hybrid Storage System for Performance-Sychronization Tradeoffs Using SSDs. The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2012), Leganés, Madrid, Spain, July 10-13, 2012, pp. 403-410

55. Ruixuan Li, Xuefan Chen, Chengzhou Li, Xiwu Gu, Kunmei Wen. Efficient Online Index Maintenance for SSD-based Information Retrieval Systems. The 14th IEEE International Conference on High Performance Computing and Communications (HPCC 2012), Liverpool, UK, June 25-27, 2012, pp. 262-269

54. Zhuo Tang, Junqing Zhou, Kenli Li, Ruixuan Li. MTSD: A Task Scheduling Algorithm for MapReduce Based on Deadline Constraints. 2012 International Workshop on High Performance Data Intensive Computing (HPDIC2012) in conjunction with IEEE IPDPS 2012, Shanghai, China, May 25, 2012, pp. 2012-2018

53. Zhuo Tang, Juan Wei, Ahmed Sallam, Kenli Li, Ruixuan Li. A New RBAC Based Access Control Model for Cloud Computing. The 7th International Conference on Grid and Pervasive Computing (GPC 2012), Hong Kong, 11-13 May 2012, pp: 279-288

52. Liang Huang, Ruixuan Li, Yuhua Li, Xiwu Gu, Kunmei Wen, Zhiyong Xu. L1-Graph Based Community Detection in Online Social Networks. The 14th Asia-Pacific Web Conference (APWeb 2012), Kunming, China, April 11-13, 2012, pp. 644-651

51. Xiwu Gu, Ruixuan Li, Kunmei Wen, Bei Peng, Weijun Xiao. A GPU-based Accelerator for Chinese Word Segmentation. The 14th Asia-Pacific Web Conference (APWeb 2012), Kunming, China, April 11-13, 2012, pp. 231-242

    2011

50. Ding Liu, Ruixuan Li, Xiwu Gu, Kunmei Wen, Heng He, Guoqiang Gao. Fast Snippet Generation Based On CPU-GPU Hybrid System. The 17th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2011), Tainan, Taiwan, Dec 7-9, 2011, pp. 252-259

49. Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang. SMEF: An Entropy-based Security Framework for Cloud-oriented Service Mashup. The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), Changsha, China, November 16-18, 2011, pp. 304-311

48. Dongsheng Duan, Yuhua Li, Ruixuan Li, Zhengding Lu, Aiming Wen. MEI: Mutual Enhanced Infinite Generative Model for Simultaneous Community and Topic Detection. The 14th International Conference on Discovery Science (DS 2011), Espoo, Finland, October 5-7, 2011, pp. 91-106

47. Yuhua Li, Aiming Wen, Quan Lin, Ruixuan Li, Zhengding Lu. Incorporating User Feedback into Name Disambiguation of Scientific Cooperation Network. The 12th International Conference on Web-Age Information Management (WAIM 2011), Wuhan, China, September 14-16, 2011, pp. 454-466

46. Xiwu Gu, Xianbing Wang, Ruixuan Li, Kunmei Wen, Yufei Yang, Weijun Xiao. A New Vector Space Model Exploiting Semantic Correlations of Social Annotations for Web Page Clustering. The 12th International Conference on Web-Age Information Management (WAIM 2011), Wuhan, China, September 14-16, 2011, pp. 106-117

45. Xiwu Gu, Xianbing Wang, Ruixuan Li, Kunmei Wen, Yufei Yang, Weijun Xiao. Measuring Social Tag Confidence: Is It A Good or Bad Tag? The 12th International Conference on Web-Age Information Management (WAIM 2011), Wuhan, China, September 14-16, 2011, pp. 94-105

44. Guoqiang Gao, Ruixuan Li, Weijun Xiao, Zhiyong Xu. Distributed Caching Strategies in Peer-to-Peer Systems. The 13th IEEE International Conference on High Performance Computing and Communications (HPCC 2011), Banff, Canada, September 2-4, 2011, pp. 1-8

43. Heng He, Ruixuan Li, Guoqiang Gao, Zhiyong Xu, Weijun Xiao. An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding. The 6th IEEE International Conference on Networking, Architecture, and Storage (NAS 2011), Dalian, China, July 28-30, 2011, pp. 191-196

42. Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu. Measurement Study on PPLive Based on Channel Popularity. The 9th Annual Conference on Communications Networks and Services Research (CNSR 2011), Ottawa, Canada, May 2-5, 2011, pp. 18-25

    2010

41. Jin Xia, Kunmei Wen, Ruixuan Li, Xiwu Gu. Optimizing Academic Conference Classification using Social Tags. The 13th International Conference on Computational Science and Engineering (CSE 2010), Hong Kong, China, December 11-13, 2010, pp. 289-294

40. Yuhua Li, Quan Lin, Ruixuan Li, Dongsheng Duan. TGP: Mining Top-K Frequent Closed Graph Pattern without Minimum Support. The International Conference on Advanced Data Mining and Applications (ADMA 2010), November 19-21, 2010, pp. 537-548

39. Jinwei Hu, Yan Zhang, Ruixuan Li. Towards Automatic Update of Access Control Policy. The 24th USENIX Large Installation System Administration Conference (LISA 2010), San Jose, CA, USA, November 7-12, 2010, pp. 59-74

38. Kunmei Wen, Ruixuan Li, Bing Li. Searching Concepts and Association Relationships Based on Domain Ontology. The 9th International Conference on Grid and Cloud Computing (GCC 2010), Nanjing, China, November 1-5, 2010, pp. 432-437

37. Guoqiang Gao, Ruixuan Li, Xiwu Gu, Kunmei Wen, Zhengding Lu, Kun Yan. Mimir: Term-Distributed Indexing and Search for Secret Documents. The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, USA, October 9-12, 2010

36. Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaopu Ma, Kai Li. SecTag: A Multi-Policy Supported Secure Web Tag Framework. The 17th ACM Conference on Computer and Communications Security (CCS 2010) (Demo), Chicago, IL, USA, October 4-8, 2010, pp. 633-635

35. Yan'an Jin, Ruixuan Li, Zhengding Lu, Kunmei Wen, Xiwu Gu. Topic-sensitive Tag Ranking. The 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, August 23-26, 2010, pp. 629-632

34. Yan'an Jin, Ruixuan Li, Yi Cai, Qing Li, Ali Daud, Yuhua Li. Semantic Grounding of Hybridization for Tag Recommendation. The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley, Sichuan, China, July 15-17, 2010, pp. 139-150

33. Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu, Zhengding Lu. Proactive Replication and Search for Rare Objects in Unstructured Peer-to-Peer Networks. The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley, Sichuan, China, July 15-17, 2010, pp. 74-85

32. Xiaopu Ma, Ruixuan Li, Zhengding Lu. Role Mining Based on Weights. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 9-11, 2010, pp. 65-74

31. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. Role Updating for Assignments. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 9-11, 2010, pp. 89-98

30. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. A Logic for Authorization Provenance. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010, pp. 238-249 (Acceptance rate: 15%, 25/166)

    2009

29. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Yanan Jin. Dynamic Enforcement of Separation-of-Duty Policies. The 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), Wuhan, China, November 18-20, 2009, pp. 394-397

28. Xiaopu Ma, Ruixuan Li, Zhengding Lu, Jianfeng Lu. Global Static Separation of Duty in Multi-domains. The 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), Wuhan, China, November 18-20, 2009, pp. 506-509

27. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. Managing Authorization Provenance: A Modal Logic based Approach. The 21st International Conference on Tools with Artificial Intelligence (ICTAI 2009), Newark, New Jersey, USA, November 2-5, 2009, pp. 621-624

26. Jinwei Hu, Ruixuan Li, Zhengding Lu. On Role Mappings for RBAC-based Secure Interoperation. The 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Australia, October 19-21, 2009, pp. 270-277 (Acceptance rate: 25.5%, 38/149)

25. Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma. Secure Interoperation in Multidomain Environments Employing UCON Policies. The 12th Information Security Conference (ISC 2009), Pisa, Italy, September 7-9, 2009, pp. 395-402 (Acceptance rate: 27.6%, 29/105)

24. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma. Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. The 12th Information Security Conference (ISC 2009), Pisa, Italy, September 7-9, 2009, pp. 403-410 (Acceptance rate: 27.6%, 29/105)

23. Jinwei Hu, Ruixuan Li, Zhengding Lu. RBAC-based Secure Interoperation using Constraint Logic Programming. The 2009 IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2009), Vancouver, Canada, August 29-31, 2009, pp. 867-872 (Acceptance rate: 34.7%, 34/98)

22. Cuihua Zuo, Ruixuan Li, Haiying Shen, Zhengding Lu. High Coverage Search in Multi-Tree Based P2P Overlay Network. IEEE Workshop on Grid and P2P Systems and Applications (GridPeer 2009) in conjunction with ICCCN 2009, San Francisco, USA, August 2-6, 2009

21. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu Ma. A Role-based Access Control Architecture for P2P File-Sharing Systems Using Primary/Backup Strategy. In: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), IEEE Computer Society, Wuhan, Hubei, China, April 25-26, 2009, pp. 700-703

    2008

20. Ruixuan Li, Cuihua Zuo, Yuntian He, Zhengding Lu. A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. In: Proceedings of the 2008 International Symposium on Trusted Computing (TrustCom 2008), IEEE Computer Society, Zhangjiajie, Hunan, China, November 18-20, 2008, pp. 2044-2049 (Acceptance rate: 37.7%, 81/215)

19. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Bing Li. Integrating Trust and Role for Secure Interoperation in Multi-Domain Environment. Proceedings of the 2nd International Conference on Information Security and Assurance (ISA 2008), IEEE Computer Society, Busan, Korea, April 24-26, 2008, pp. 77-82

18. Wei Song, Ruixuan Li, Zhengding Lu, Mudar Sarem. SemSearch: A Scalable Semantic Resource Search Algorithm for Unstructured P2P Network. In: Proceedings of the 10th Asia-Pacific Web Conference (APWeb 2008), LNCS 4976, Shenyang, China, April 26-28, 2008, pp. 631-636  (Acceptance rate: 28.4%, 48/169)

17. Wei Song, Ruixuan Li, Zhengding Lu, Guangcan Yu. FAN: A Flabellate Overlay Network Supporting Scalable Multi-Dimensional Attributes. Proceedings of the IEEE 22st International Conference on Advanced Information Networking and Applications (AINA 2008), IEEE Computer Society, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 1005-1012 (Acceptance rate: 31.3%, 147/469)

    2007

16. Jinwei Hu, Ruixuan Li, Zhengding Lu. Establishing RBAC-based Secure Interoperability in Decentralized Multi-domain Environments. Proceedings of the 10th International Conference on Information Security and Cryptology (ICISC 2007), LNCS 4817, Seoul, South Korea, November 29-30, 2007, pp. 49-63 (Acceptance rate: 20.5%, 26/127)

15. Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu. Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment. Proceedings of the 3rd International Conference on Computational Intelligence and Security (CIS 2007), IEEE Computer Society, Harbin, China, December 15-19, 2007, pp.735-739 (Acceptance rate: 17.5%, 224/1278)

14. Ruixuan Li, Cuihua Zuo, Tony C. Shan, Zhengding Lu. ICache: A Size-Aware Cooperative Caching Architecture for Web Images.  Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), Hagenberg, Austria, July 5-8, 2007, pp.95-100

13. Ruixuan Li, Xiaolin Sun, Zhengding Lu, Kunmei Wen, Yuhua Li. Towards a Type-2 Fuzzy Description Logic for Semantic Search Engine.  Proceedings of the joint conference of the 9th Asia-Pacific Web Conference and the 8th International Conference on Web-Age Information Management (APWeb/WAIM 2007),  LNCS 4505, Huangshan, China, June 16-18, 2007, pp. 805-812 (Acceptance rate: 16.1%, 89/554)

12. Ruixuan Li, Guangcan Yu, Zhengding Lu, Wei Song. P2P-based Locking in Real-Time Collaborative Editing Systems. Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2007), IEEE Computer Society, Melbourne, Australia, April 26-28, 2007, pp. 24-29

11. Zhuo Tang, Ruixuan Li, Zhengding Lu, Zhumu Wen. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. Proceedings of the 8th International Workshop on Information Security Applications (WISA 2007), LNCS 4867, Jeju Island, Korea, August 27-29, 2007, pp. 277-290

10. Zhuo Tang, Ruixuan Li, Zhengding Lu. A Request-Driven Role Mapping for Secure Interoperation in Multi-Domain Environment. Proceedings of the IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007) -The 1st IFIP International Workshop on Network and System Security (NSS 2007), IEEE Computer Society, Dalian, China, September 18-21, 2007, pp. 83-90

    2006

9. Maoyuan Zhang, Ruixuan Li, Zhengding Lu, Chunyan Zou. An ECG Parallel Scheduling Algorithm for the Distributed Systems. Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), IEEE Computer Society, Taipei, Taiwan, December 4-7, 2006, pp. 484-487

8. Ruixuan Li, Kunmei Wen, Zhengding Lu, Xiaolin Sun, Zhigang Wang. An Improved Semantic Search Model Based on Hybrid Fuzzy Description Logic. Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2006), IEEE Computer Society, Fukushima, Japan, November 17-18, 2006, pp. 139-146

7. Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun, Zhigang Wang. A Semantic Search Conceptual Model and Application in Security Access Control. Proceedings of the 1st Asian Semantic Web Conference (ASWC 2006), LNCS 4185, Beijing, China, September 3-7, 2006, pp. 366-376

    2005

6. Hanbing Yao, Heping Hu, Zhengding Lu, Ruixuan Li. Dynamic Role and Context-Based Access Control for Grid Applications. Proceedings of the 6th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), IEEE Computer Society, Dalian, China, December 5-8, 2005, pp. 404-406

5. Ruixuan Li, Zhi Zhang, Zhigang Wang, Wei Song, Zhengding Lu. WebPeer: A P2P-based System for Publishing and Discovering Web Services. Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005) Vol-2, IEEE Computer Society, Orlando, Florida, USA, July 12-15, 2005, pp. 149-156 (Acceptance rate: 18.6%)

4. Ruixuan Li, Zhi Zhang, Wei Song, Feng Ke, Zhengding Lu. Service Publishing and Discovering Model in a Web Services Oriented Peer-to-Peer System. Proceedings of the 5th International Conference on Web Engineering (ICWE 2005), LNCS 3579, Sydney, Australia, July 27-29, 2005, pp. 597-599

    2003

3. Ruixuan Li, Zhengding Lu, Weijun Xiao, Bing Li, Wei Wu.  Schema Mapping for Interoperability in XML-based Multidatabase SystemsProceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA 2003), IEEE Computer Society, Prague, Czech Republic, September 1-5, 2003, pp. 235-240

    2001

2. Bing Li, Zhengding Lu, Weijun Xiao, Ruixuan Li, Wei Zhang, Mudar Sarem.  An Architecture for Multidatabase Systems Based on CORBA and XMLProceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), IEEE Computer Society, Munich, Germany, September 3-5, 2001, pp. 32-37

1. Terefe Muleta, Li Ruixuan. Transaction Model for Federated Databases Based on DOK, Proceedings of 2002 Conference of Open Distributed and Parallel Computing Symposium (DPCS'2002), HUST Press, Wuhan, China, 2002, pp. 480-485

l   中文期刊论文 (Refereed Chinese Journal Papers)

    2015

100. 董仕,李瑞轩,李晓林. 基于软件定义数据中心网络的节能路由算法. 计算机研究与发展,2015, 52(4): 806-812

99. 马晓普,赵莉,李瑞轩. 基于角色访问控制中的约束研究. 小型微型计算机系统,2015, 36(9): 1982-1987

    2014

98. 李瑞轩,廖东杰,辜希武,文坤梅,赵铄乂,董新华. YARN平台上的并行主题标引算法. 计算机科学与探索,2014, 8(12): 1409-1421

97. 宋伟,彭智勇,王骞,李瑞轩,程芳权,崔一辉. Mimir:一种基于密文的全文检索服务系统. 计算机学报,2014, 37(5): 1170-1183

    2013

96. 董新华,李瑞轩,周湾湾,王聪,薛正元,廖东杰. Hadoop系统性能优化与功能增强综述. 计算机研究与发展,2013, 50(Suppl.): 1-15

95. 李瑞轩,董新华,辜希武,周湾湾,王聪. 移动云服务的数据安全与隐私保护综述. 通信学报,2013, 34(12): 158-166

94. 马晓普,李瑞轩,胡劲纬. 访问控制中的角色工程. 小型微型计算机系统,2013, 34(6): 1301-1306

93. 李瑞轩,鲁剑锋,李添翼,辜希武,唐卓.一种访问控制策略非一致性冲突消解方法.计算机学报,2013, 36(6): 1210-1223

    2012

92. 文坤梅,徐帅,李瑞轩,辜希武,李玉华. 微博及中文微博信息处理研究综述. 中文信息学报,2012, 26(6): 27-37

91. 彭霖,李瑞轩,宋赛,辜希武,文坤梅,卢正鼎. 一种密文全文检索系统的安全索引结构. 微电子学与计算机,2012, 29(9): 27-30

90. 李瑞轩,文坤梅,辜希武,李玉华,万宇涛. 对等网环境下基于概率翻译方法的语义检索模型. 小型微型计算机系统,2012, 33(6): 1166-1170

89. 李玉华,贺人贵,钟开,李瑞轩. 动态加权网络中节点重要度评估. 计算机科学与探索,2012, 6(2): 134-143

    2011

88. 李玉华,肖海岭,李栋才,李瑞轩. 基于链接重要性的动态链接预测方法研究. 计算机研究与发展,2011, 48(S3): 40-46

87. 李玉华,李栋才,毕威,李瑞轩. 混合马尔科夫预测模型及其在反洗钱中的应用研究. 计算机科学,2011, 38(7): 170-174

    2010

86. 李开,李瑞轩,鲁剑锋,卢正鼎. 一种不依赖于协商策略的信任协商协议. 计算机科学,2010, 37(11): 34-37

85. 李开,李瑞轩,章华娟,卢正鼎. P2P网络中基于信任的风险计算方法. 计算机科学,2010, 37(10): 102-104, 122

84. 鲍洋,卢正鼎,黄保华,李瑞轩,胡和平,路松峰. 适合P2P环境的动态多秘密共享方案. 计算机科学 2010, 37(9): 40-43, 62

83. 李开,卢正鼎,李瑞轩,刘百灵. 自动信任协商中的攻击与防范. 计算机科学,2010, 37(8): 67-71, 98

82. 靳延安,李瑞轩,文坤梅,辜希武,卢正鼎,段东圣. 社会标注及其在信息检索中的应用研究综述. 中文信息学报,2010, 24(4): 52-62

81. 鲍洋,卢正鼎,黄保华,李瑞轩,胡和平,路松峰. 结构化P2P系统中副本一致性管理的一种新算法. 小型微型计算机系统,2010, 31(3): 385-390

80. 吴炜,苏永红,李瑞轩,卢正鼎. 基于DHT的分布式索引技术研究与实现. 计算机科学,2010, 37(2): 65-70

    2009

79. 李瑞轩,高昶,辜希武,卢正鼎. C2C电子商务交易的信用及风险评估方法研究. 通信学报,2009, 30(7): 78-85

78. 文珠穆,李瑞轩,卢正鼎,冯本明,唐卓. 多域环境中基于蚁群算法的抗攻击时态信任模型. 计算机科学,2009, 36(7): 46-51

77. 唐卓,赵林,李肯立,李瑞轩. 一种基于风险的多域互操作动态访问控制模型. 计算机研究与发展,2009, 46(6): 948-955

76. 刘扬军,姚寒冰,李瑞轩. 一种P2P分布式环境下的信任模型. 武汉理工大学学报,2009, 31(3): 77-80

75. 於光灿,李瑞轩,卢正鼎,宋伟,唐卓.协作环境中基于场所的访问控制模型.计算机科学,2009, 36(1): 81-85

    2008

74. 左翠华,李瑞轩,卢正鼎.P2P文件共享系统中基于访问控制的信任模型.计算机科学,2008, 35(12): 39-42

73. 辜希武,李瑞轩,卢正鼎.面向应用的Web服务组合设计和验证框架.计算机工程与应用,2008, 44(34): 132-136

72. 於光灿,李瑞轩,卢正鼎,宋伟,唐卓.工作流系统中基于场所的分布式授权模型研究.计算机科学,2008, 35(11): 232-236

71. 於光灿,李瑞轩,卢正鼎,宋伟,唐卓.基于特征的空间数据访问控制模型研究.计算机科学,2008, 35(10): 122-126

70. 李瑞轩,胡劲纬,唐卓,卢正鼎.R2BAC:基于风险的多自治域安全互操作模型.通信学报,2008, 29(10): 58-69

69. 吴炜,梁昆,李瑞轩,辜希武,卢正鼎.一种基于主题相关度的网页排序算法.微电子学与计算机,2008, 25(9): 221-224

68. 文坤梅,卢正鼎,孙小林,李瑞轩.语义搜索研究综述.计算机科学,2008, 35(5): 1-4

67. 文坤梅,卢正鼎,吴杰文,李瑞轩,孙小林.基于描述逻辑的推理系统设计与实现.小型微型计算机系统,2008, 29(1): 57-60

66. 胡和平,刘海坤,李瑞轩.基于模糊理论的P2P 网络主观信任模型-FSTM.小型微型计算机系统,2008, 29(1): 17-21

65. 胡和平,刘海坤,黄保华,李瑞轩.一种基于名誉的P2P 网络信任管理模型.计算机工程与科学,2008, 30(1): 41-44

    2007

64. 卢正鼎,孙小林,李瑞轩,文坤梅.基于描述逻辑的语义网络构架及资源定位.计算机科学,2007, 34(10): 33-35, 39

63. 吉勇,李瑞轩.基于模糊评判的多自治域风险关联评估算法.计算机工程与科学,2007, 29(12): 107-110

62. 左翠华,卢正鼎,李瑞轩.MS SQL SERVER2000的角色存取控制策略.计算机工程与科学,2007, 29(11): 78-80

61. 宋伟,李瑞轩,卢正鼎,於光灿.一种支持多维资源描述的高效P2P路由算法.软件学报,2007, 18 (11): 2851-2862

60. 左翠华,卢正鼎,李瑞轩. 针对负载均衡的P2P动态副本策略. 小型微型计算机系统,2007, 28(11): 2020-2023

59. 甘早斌,吴平,路松峰,李瑞轩. 基于扩展攻击树的信息系统安全风险评估. 计算机应用研究,2007, 24(11): 153-156,160

58. 李瑞轩,赵战西,文坤梅,孙小林,王治纲. 基于本体的多域访问控制策略集成研究. 小型微型计算机系统,2007, 28(9): 1710-1714

57. 孙小林,卢正鼎,李瑞轩,王治刚,陈新华.角色访问控制中基于描述逻辑的角色互斥实现.计算机工程与科学,2007, 29(9): 37-40, 44

56. 柯锋,李瑞轩,宋伟,於光灿.一种P2P环境中基于语义的Web服务组合方法.计算机工程与科学,2007, 29(8): 15-18, 29

55. 孙小林,卢正鼎,李瑞轩,文坤梅,李玉华,王治刚. 基于2型模糊描述逻辑的知识描述与推理及其在信任管理系统中的应用. 计算机科学,2007, 34(7): 203-207, 240

54. 於光灿,卢正鼎,李瑞轩,唐卓,宋伟.基于P2P的协同设计系统访问控制研究.计算机工程与科学,2007, 29(7): 34-36, 61

53. 姚寒冰,胡和平,李瑞轩. 上下文感知的动态访问控制模型. 计算机工程与科学,2007, 29(5): 1-3, 7

52. 张智,李瑞轩. 基于JXTA架构的对等网络关键技术研究. 计算机应用研究,2007, 24(3): 253-255, 259

51. 王治纲,王晓刚,卢正鼎,李瑞轩. OntoRBAC:基于本体的RBAC策略描述与集成. 计算机科学,2007, 34(2): 82-85

50. 於光灿,卢正鼎,李瑞轩,王治纲,唐卓,宋伟.在Java2环境中实现可插入的认证及访问控制.计算机工程与科学,2007, 29(2): 26-28

    2006

49. 宋伟,卢正鼎,李瑞轩,於光灿,柯锋.一种Peer-to-Peer环境下的分布式访问控制模型.计算机应用与软件,2006, 23(12): 31-33

48. 张智,李瑞轩. 一种非结构化对等网络短路效应解决方法. 计算机工程 ,2006, 32(22): 114-115, 118

47. 刘文俊,王天江,李瑞轩. 用于动态双边协商的竞争式选择决策模型. 计算机研究与发展,2006, 43(Suppl.I): 89-95

46. HUANG Baohua, HU Heping, LU Zhengding, YAO Hanbing, LI Ruixuan. A Multilevel Trust Model in Peer-to-Peer Systems. Computer Science, 2006, 33(10A): 369

45. LIU Fang, HU Su, LI Ruixuan, LU Zhengding. T-OntoRBAC: A RSWP-Based Semantic Web Application System. Computer Science, 2006, 33(10A): 51-53

44. YANG Li, LU Zhengding, LI Ruixuan. A Propositional Method for a Tableau Reasoning with SWRL. Computer Science, 2006, 33(10A): 57-59

43. ZUO Cuihua, LU Zhengding, LI Ruixuan. A Reputation-Based Trust Management for E-commerce in P2P systems. Computer Science, 2006, 33(10A): 171-172, 181

42. WEN Kunmei, LU Zhengding, SUN Xiaolin, LI Ruixuan, WANG Zhigang. An Extended Semantic Search Model Based on Fuzzy Description Logic. Computer Science, 2006, 33(10A): 15-17

41. WANG Zhigang, SUN Xiaolin, WEN Kunmei, LU Zhengding, LI Ruixuan. An Ontology Framework for Reasoning about RBAC. Computer Science, 2006, 33(10A): 60-61, 66

40. 彭俊杰,卢正鼎,李瑞轩. 一种改进的非结构化P2P网络搜索方法. 微电子学与计算机,2006, 23(9): 16-19

39. 唐卓,卢正鼎,李瑞轩.基于专家综合评定法的多自治域安全互操作的风险评估方法.小型微型计算机系统,2006, 27(8): 1486-1489

38. 胡和平,黄保华,姚寒冰,卢正鼎,李瑞轩.P2P 环境下局部可信度的神经网络识别方法.小型微型计算机系统,2006, 27(8): 1503-1505

37. 霍晓丽,陈媛玲,李瑞轩.给予流程的复合数据权限控制研究.计算机科学,2006, 33(7): 266-270

36. 李瑞轩,赵战西,王治纲,卢正鼎.一种基于访问历史的BLP模型.计算机科学,2006, 33(7): 286-288

35. 唐卓,卢正鼎,李瑞轩,李红平. 基于移动代理的P2P 网络安全风险评估. 华中科技大学学报(自然科学版), 2006, 34(7): 27-29

34. 黄毅群,卢正鼎,胡和平,李瑞轩. 分布式环境下保持隐私的关联规则挖掘算法. 计算机工程, 2006, 32(13): 12-14

33. 邹复好,卢正鼎,凌贺飞,李瑞轩. 基于Watson 视觉模型的自适应视频水印. 计算机工程, 2006, 32(12): 22-23, 26

32. 黄毅群,卢正鼎,胡和平,李瑞轩. 分布式异常检测中隐私保持问题研究. 电子学报, 2006, 34(5): 796-799

31. 宋伟,卢正鼎,李瑞轩,於光灿. 一种Peer- to-Peer 环境下的综合信任模型. 小型微型计算机系统, 2006, 27(5): 774-778

30. 凌贺飞,卢正鼎,邹复好,李瑞轩.基于Watson视觉感知模型的能量调制水印算法研究.软件学报, 2006, 17(5): 1124-1132

29. 胡和平,黄保华,卢正鼎,李瑞轩. P-Promise: 一个基于承诺的P2P公平资源共享协议. 计算机科学, 2006, 33(3): 47-49, 61

28. 姚寒冰,胡和平,卢正鼎,李瑞轩.基于角色和上下文的动态网格访问控制研究.计算机科学,2006, 33(1): 41-44

    2005

27. 李玉华,卢正鼎,孙小林,李瑞轩.基于隐私保护的语义数据集成.华中科技大学学报(自然科学版),2005, 33(S1): 128-130, 134

26. 张智,杨俊,李瑞轩.面向Web服务的P2P模型研究.计算机应用研究,2005, 9: 63-64, 80

25. Huang Bao-Hua, Hu He-Ping, Lu Zheng-Ding, Li Rui-Xuan. P2P Data Disaster Tolerance of E-Governance. Computer Science, 2005, 32(9A): 222-224

24. 李红平,卢正鼎,李瑞轩.多自治域系统中安全互操作风险的灰色关联评估研究.计算机科学,2005, 32(9A): 241-245

23. 张智,李瑞轩.基于JXTA P2P的Web服务发现模型研究.计算机工程与应用,2005, 41(19): 137-139

22. 李瑞轩,霍晓丽,文珠穆,卢正鼎,李兵.多数据库系统中的全局查询转换方法研究.计算机工程,2005, 31(16): 4-6

21. 张智,李瑞轩.P2P平台上的Web服务模型研究.计算机工程与科学,2005, 27(6): 30-31,92

    2004

20. 李兵,何克清,刘进,李瑞轩Web 信息融合系统基础设施的研究北京航空航天大学学报,2004, 30(11): 1048-1051

19. 李瑞轩,卢正鼎,吴炜,肖卫军.一种异构数据集成中的动态查询优化方法.计算机工程与科学,2004, 26(12): 71-74,81

18. 李瑞轩,卢正鼎,吴炜,文珠穆.一种多自治域层次互操作模型的实现框架.计算机工程与应用,2004, 40(27): 157-159,199

17. 李瑞轩,卢正鼎,肖卫军,李兵.多数据库系统中基于XML的模式映射方法研究.计算机研究与发展,2004, 41(3): 485-491 (EI)

16. 李瑞轩,卢正鼎,肖卫军,李兵.多数据库系统中的模式映射方法.计算机工程与科学,2004, 26(3): 65-68

    2003

15. 肖卫军,卢正鼎,李兵,李瑞轩一种多数据库事务模型.小型微型计算机系统,2003, 24(12): 2224-2227 (EI)

14. 李瑞轩,卢正鼎,肖卫军,王治纲.多数据库系统中基于模式映射树的查询分解和优化.华中科技大学学报(自然科学版),2003, 31(11): 22~24, 30 (EI)

13. 李瑞轩,卢正鼎,吴炜,王治纲,肖卫军.一种扩展型实时多数据库系统的实现框架. 大连理工大学学报,2003, 43(S1): S175-S179 (EI)

12. 李兵,何克清,肖卫军,李瑞轩.CAX-一种有效的数据集成方法.小型微型计算机系统,2003, 24(8): 1488-1490 (EI)

    2002

11. 卢正鼎,李兵,肖卫军,李瑞轩,胡和平.基于XML的文件系统与多数据库系统的集成.小型微型计算机系统,2002, 23(5): 588-591 (EI)

10. 卢正鼎,李兵,肖卫军,李瑞轩基于CORBA/XML的多数据库系统研究与实现.计算机研究与发展,2002, 39(4): 443-449 (EI)

9. 娄勤俭,李瑞轩,卢正鼎.一种适合多数据库系统的查询表示方法.计算机科学,2002, 29(3): 80-82,136

    2001

8. Mudar Sarem李瑞轩,卢正鼎,陈传波.基于CORBA的多数据库系统中互操作性的研究.华中科技大学学报(自然科学版),2001, 29(12): 79-81 (EI)

7. Mudar Sarem李瑞轩,卢正鼎,陈传波.Panorama多数据库原型系统.华中科技大学学报(自然科学版),2001, 29(12): 76-78 (EI)

6. 李瑞轩,卢正鼎,吴炜,肖卫军.多数据库系统中查询分解算法的研究.小型微型计算机系统,2001, 22(4): 488-491 (EI)

    2000

5. 娄勤俭,李瑞轩,肖卫军,卢正鼎.MDBS模式集成中完整性约束的处理.华中理工大学学报,2000, 28(9): 24-27 (EI)

    1999

4. 卢正鼎,李瑞轩,肖卫军,杨玉萍.一种多数据库中的查询处理方法99年全国开放式分布与并行计算学术会议(DPCS'99),河北保定,计算机工程与应用,1999, 35(A1): 21-26

    1998

3. 卢正鼎,李瑞轩,肖卫军.多数据库事务处理模型中局部代理的设计与实现.计算机研究与发展,1998, 35(12): 1130-1134  (EI)

2. 卢正鼎,肖卫军,易童,李瑞轩集成数据库和文件系统的多数据库事务模型.华中理工大学学报,1998, 26(6): 66-68,75  (EI)

    1997

1. 卢正鼎,肖卫军,李瑞轩,易童.多数据库事务处理原型系统的设计与实现.计算机工程与科学,1997, 19(4): 1-4