default search action
Wenjiang Ji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Wei Chen, Wenjiang Ji, Yichuan Wang, Ju Ren, Guanglei Sheng, Xinhong Hei:
Visually secure image encryption: Exploring deep learning for enhanced robustness and flexibility. Expert Syst. Appl. 266: 126027 (2025) - 2024
- [c23]Xin Song, Haonan Wang, Yichuan Wang, Xinhong Hei, Wenjiang Ji:
Code obfuscation protection strategies for program running states. NaNA 2024: 327-332 - 2023
- [j23]Wenjiang Ji, Yuan Zuo, Rong Fei, Guo Xie, Jiulong Zhang, Xinhong Hei:
An Adaptive Fault Diagnosis Model for Railway Single and Double Action Turnout. IEEE Trans. Intell. Transp. Syst. 24(1): 1314-1324 (2023) - [c22]Tong Zhang, Wei Wei, Yichuan Wang, Xi Deng, Lei Zhu, Wenjiang Ji:
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks. NaNA 2023: 72-77 - [c21]Wenjiang Ji, Yixin Yang, Yaling Zhang, Yichuan Wang, Mengjie Tian, Yuan Qiu:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks. NaNA 2023: 459-464 - 2022
- [j22]Mengyang Li, Xinhong Hei, Wenjiang Ji, Lei Zhu, Yichuan Wang, Yuan Qiu:
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation. Sensors 22(23): 9438 (2022) - [c20]Haining Meng, Jiawei Zhang, Yi Zheng, Wenjiang Ji, Xinyu Tong, Xinhong Hei:
Track Irregularity Prediction Based on DWT-DLSTM Model. NaNA 2022: 1-5 - [c19]Yeqiu Xiao, Yichuan Wang, Wenjiang Ji, Lei Zhu, Xinhong Hei:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay. NaNA 2022: 1-5 - 2021
- [j21]Yichuan Wang, Binbin Bai, Xinhong Hei, Lei Zhu, Wenjiang Ji:
An unknown protocol syntax analysis method based on convolutional neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j20]Wenjiang Ji, Chen Cheng, Guo Xie, Lei Zhu, Yichuan Wang, Long Pan, Xinhong Hei:
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout. J. Intell. Fuzzy Syst. 41(3): 4275-4285 (2021) - [j19]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT. Mob. Inf. Syst. 2021: 5510857:1-5510857:11 (2021) - [j18]Yichuan Wang, Han Yu, Xinhong Hei, Binbin Bai, Wenjiang Ji:
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT. Secur. Commun. Networks 2021: 9179286:1-9179286:13 (2021) - [j17]Yichuan Wang, Yuying Tian, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G. IEEE Trans. Veh. Technol. 70(6): 5197-5210 (2021) - [c18]Xinyu Tong, Haining Meng, Kai Feng, Wenjiang Ji, Yi Zheng, Xinhong Hei:
A STL-GALSTM Model to Predict the Track Irregularity of High-Speed Railway. BigDataSE 2021: 42-48 - [c17]Haining Meng, Wei Li, Wenjiang Ji, Yi Zheng, Xinyu Tong, Xinhong Hei:
Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU Model. EUC 2021: 8-14 - [c16]Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Petri net modeling and vulnerability analysis of the Heartbleed. NaNA 2021: 155-160 - [c15]Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. NaNA 2021: 161-167 - [c14]Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu:
A Method for Fast Outlier Detection in High Dimensional Database Log. NaNA 2021: 236-241 - [c13]Yaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. NaNA 2021: 443-448 - [c12]Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. NaNA 2021: 513-519 - [c11]Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. NaNA 2021: 520-526 - [c10]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Heuristic SAT Problems Solving Method based on LSTM Network. PAAP 2021: 141-145 - 2020
- [j16]Guo Xie, Anqi Shangguan, Rong Fei, Wenjiang Ji, Weigang Ma, Xinhong Hei:
Motion trajectory prediction based on a CNN-LSTM sequential model. Sci. China Inf. Sci. 63(11) (2020) - [j15]Yichuan Wang, Binbin Bai, Xinhong Hei, Ju Ren, Wenjiang Ji:
Classification and Recognition of Unknown Network Protocol Characteristics. J. Inf. Sci. Eng. 36(4): 765-776 (2020) - [j14]Lei Zhu, Ping He, Xinhong Hei, Yanni Yao, Yichuan Wang, Wenjiang Ji, Qin Zhao, Long Pan:
Combined access control model embedding configurable policy for fine-grained data security. Microprocess. Microsystems 75: 103060 (2020) - [j13]Zhihai Yang, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. IEEE Trans. Inf. Forensics Secur. 15: 2766-2781 (2020) - [j12]Xinhong Hei, Wen Gao, Yichuan Wang, Lei Zhu, Wenjiang Ji:
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone. Wirel. Commun. Mob. Comput. 2020: 8816023:1-8816023:13 (2020) - [c9]Xinhong Hei, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Deep Learning as a Service Based on Encrypted Data. NaNA 2020: 53-58 - [c8]Irenee Mungwarakarama, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Xinyu Jiang:
Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN. NaNA 2020: 271-276 - [c7]Yanning Du, Yichuan Wang, Lei Zhu, Wenjiang Ji, Xin Song, Yida Yang, Long Pan:
A Framework for Audit Analysis of Heterogeneous Logs from PaaS. NaNA 2020: 292-297
2010 – 2019
- 2019
- [j11]Yanxiao Liu, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Efficient group authentication in RFID using secret sharing scheme. Clust. Comput. 22(Supplement): 8605-8611 (2019) - [j10]Yichuan Wang, He Zhu, Xinhong Hei, Yue Kong, Wenjiang Ji, Lei Zhu:
An energy saving based on task migration for mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 133 (2019) - [j9]Wenjiang Ji, Lei Zhu, Yichuan Wang, Zheng Liu, Xinhong Hei:
RSU authentication in vehicular ad hoc networks base on verifiable secret sharing. J. Intell. Fuzzy Syst. 37(4): 4531-4536 (2019) - [j8]Lei Zhu, Yanni Yao, Yichuan Wang, Xinhong Hei, Qin Zhao, Wenjiang Ji, Quanzhu Yao:
A novel subgraph querying method based on paths and spectra. Neural Comput. Appl. 31(9): 5671-5678 (2019) - [c6]Xinhong Hei, Wen Gao, Yichuan Wang, Zhongdi Liang, Wenjiang Ji, Xianzhi Hu:
Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol. GLOBECOM Workshops 2019: 1-6 - [c5]Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. TrustCom/BigDataSE 2019: 662-669 - 2018
- [j7]Yichuan Wang, Yefei Zhang, Lei Zhu, Wenjiang Ji, Yanxiao Liu, Xinhong Hei:
A novel energy-aware trustworthy multi-hop routing model for Internet of things. Int. J. Distributed Sens. Networks 14(12) (2018) - [j6]Yanxiao Liu, Ching-Nung Yang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453: 21-29 (2018) - [j5]Yichuan Wang, Yefei Zhang, Wenjiang Ji, Lei Zhu, Yanxiao Liu:
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology. Wirel. Commun. Mob. Comput. 2018: 7805408:1-7805408:10 (2018) - [c4]Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:
Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. NaNA 2018: 117-120 - [c3]He Zhu, Yichuan Wang, Xinhong Hei, Wenjiang Ji, Li Zhang:
A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. NaNA 2018: 324-329 - 2017
- [c2]Lei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei, Quanzhu Yao, Xiaoyan Zhu:
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters. NaNA 2017: 1-4 - 2016
- [j4]Liumei Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement. J. Commun. Inf. Networks 1(4): 116-132 (2016) - [j3]Yichuan Wang, Yefei Zhang, Xinhong Hei, Wenjiang Ji, Weigang Ma:
Game strategies for distributed denial of service defense in the Cloud of Things. J. Commun. Inf. Networks 1(4): 143-155 (2016) - [j2]Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei:
Dynamic game model of botnet DDoS attack and defense. Secur. Commun. Networks 9(16): 3127-3140 (2016) - [c1]Wen Jiang Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan:
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks. NaNA 2016: 135-140 - 2015
- [j1]Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji:
Bayesian mechanism for rational secret sharing scheme. Sci. China Inf. Sci. 58(5): 1-13 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-10 18:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint