Jiazhong Lu

Orcid: 0000-0002-8982-8255

According to our database1, Jiazhong Lu authored at least 22 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Adversarial attacks based on time-series features for traffic detection.
Comput. Secur., 2025

2024
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024

An Adversarial Example Defense Algorithm for Intelligent Driving.
IEEE Netw., November, 2024

HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization.
Neural Networks, 2024

Methods for Detecting XSS Attacks Based on BERT and BiLSTM.
Proceedings of the 8th International Conference on Management Engineering, 2024

2023
Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics.
J. Grid Comput., December, 2023

2021
A Hybrid Association Rule-Based Method to Detect and Classify Botnets.
Secur. Commun. Networks, 2021

Confidential information protection method of commercial information physical system based on edge computing.
Neural Comput. Appl., 2021

Research on information steganography based on network data stream.
Neural Comput. Appl., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

2020
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.
Secur. Commun. Networks, 2020

An equalisation control method for network big data transmission based on parallel computing.
Int. J. Internet Protoc. Technol., 2020

Moving target defense controller of mobile system based on Openflow sensor security scheme.
Comput. Commun., 2020

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Integrating Traffics with Network Device Logs for Anomaly Detection.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
Int. J. Pattern Recognit. Artif. Intell., 2019

A temporal correlation and traffic analysis approach for APT attacks detection.
Clust. Comput., 2019

2018
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018

Botnet Detection based on Fuzzy Association Rules.
Proceedings of the 24th International Conference on Pattern Recognition, 2018


  Loading...