Wenjiang Ji

Orcid: 0000-0001-5502-1579

According to our database1, Wenjiang Ji authored at least 46 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Code obfuscation protection strategies for program running states.
Proceedings of the International Conference on Networking and Network Applications, 2024

2023
An Adaptive Fault Diagnosis Model for Railway Single and Double Action Turnout.
IEEE Trans. Intell. Transp. Syst., January, 2023

Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023

DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation.
Sensors, 2022

Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay.
Proceedings of the International Conference on Networking and Network Applications, 2022

Track Irregularity Prediction Based on DWT-DLSTM Model.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G.
IEEE Trans. Veh. Technol., 2021

From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT.
Secur. Commun. Networks, 2021

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT.
Mob. Inf. Syst., 2021

An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021

An unknown protocol syntax analysis method based on convolutional neural network.
Trans. Emerg. Telecommun. Technol., 2021

A Heuristic SAT Problems Solving Method based on LSTM Network.
Proceedings of the 12th International Symposium on Parallel Architectures, 2021

A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Signature Scheme Based on The SM2 Algorithm in Fabric.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Petri net modeling and vulnerability analysis of the Heartbleed.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Method for Fast Outlier Detection in High Dimensional Database Log.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU Model.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

A STL-GALSTM Model to Predict the Track Irregularity of High-Speed Railway.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020

Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020

Classification and Recognition of Unknown Network Protocol Characteristics.
J. Inf. Sci. Eng., 2020

Motion trajectory prediction based on a CNN-LSTM sequential model.
Sci. China Inf. Sci., 2020

Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Framework for Audit Analysis of Heterogeneous Logs from PaaS.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep Learning as a Service Based on Encrypted Data.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
A novel subgraph querying method based on paths and spectra.
Neural Comput. Appl., 2019

RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.
J. Intell. Fuzzy Syst., 2019

An energy saving based on task migration for mobile edge computing.
EURASIP J. Wirel. Commun. Netw., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology.
Wirel. Commun. Mob. Comput., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

A novel energy-aware trustworthy multi-hop routing model for Internet of things.
Int. J. Distributed Sens. Networks, 2018

A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2018

Analysis and Protection of DDOS Attack Based on RSSP-II Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016

Game strategies for distributed denial of service defense in the Cloud of Things.
J. Commun. Inf. Networks, 2016

A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015


  Loading...