Huijun Zhu
Orcid: 0000-0002-9809-4708
According to our database1,
Huijun Zhu
authored at least 25 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Compressed sensing based visually secure multi-secret image encryption-sharing scheme.
Multim. Tools Appl., 2024
CoRR, 2024
External Risk Assessment for Substations Based on Single and Superimposed Anomaly Risks.
IEEE Access, 2024
2023
A compressed sensing-based progressive secret image sharing scheme and security analysis.
Digit. Signal Process., November, 2023
2022
Digit. Signal Process., 2022
2021
Optim. Lett., 2021
2020
2019
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019
Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
2018
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems.
KSII Trans. Internet Inf. Syst., 2018
2017
Int. J. Distributed Sens. Networks, 2017
IEEE Access, 2017
2014
Reliability Analysis on Shifted and Random Declustering Block Layouts in Scale-Out Storage Architectures.
Proceedings of the 9th IEEE International Conference on Networking, 2014
2011
IEEE Trans. Computers, 2011
2008
IEEE Trans. Computers, 2008
IEEE Trans. Computers, 2008
Sci. China Ser. F Inf. Sci., 2008
Shifted declustering: a placement-ideal layout scheme for multi-way replication storage architecture.
Proceedings of the 22nd Annual International Conference on Supercomputing, 2008
2006
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.
Proceedings of the Advances in Information and Computer Security, 2006