Jun Hou
Orcid: 0000-0002-6986-4961Affiliations:
- Nanjing University of Science and Technology, School of Cyber Science and Engineering, China
- Nanjing Institute of Industry Technology, School of Social Science, China
- Nanjing Vocational University of Industry Technology, School of Social Science, China
- Wuyi University, Department of Intelligent Manufacturing, Jiangmen, China
According to our database1,
Jun Hou
authored at least 51 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Temporal-aware influence maximization solution in artificial intelligent edge application.
Wirel. Networks, July, 2024
2023
Bandit-based data poisoning attack against federated learning for autonomous driving models.
Expert Syst. Appl., October, 2023
Biomed. Signal Process. Control., August, 2023
J. Inf. Secur. Appl., May, 2023
A privacy-preserving recommendation method with clustering and locality-sensitive hashing.
Comput. Intell., February, 2023
Reflecting the trends in the academic landscape of special education using probabilistic dynamic topic modeling.
Libr. Hi Tech, 2023
Expert Syst. Appl., 2023
Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models.
Aslib J. Inf. Manag., 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
2022
World Wide Web, 2022
Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data.
J. Organ. End User Comput., 2022
Locality-Sensitive Hashing-Based Link Prediction Process on Smart Campus Education or Online Social Platform.
J. Circuits Syst. Comput., 2022
J. Cloud Comput., 2022
A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things.
Cryptogr., 2022
Attention-Based Knowledge-aware Multi-Interest Intelligent Model for Sequential Recommendation.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022
Evolving convolutional neural networks for intrusion detection system using hybrid multi-strategy aquila optimizer.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
CPGCN: Collaborative Property-aware Graph Convolutional Networks for Service Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2022
2021
J. Organ. End User Comput., 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021
2020
J. Supercomput., 2020
Secur. Commun. Networks, 2020
Mob. Networks Appl., 2020
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks.
Complex., 2020
Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 2020 IEEE International Conference on Embedded Software and Systems, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
2019
Entropy, 2019
CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network.
IEEE Access, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
2018
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
IEEE Access, 2018
2015
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012