Xiujuan Wang

Orcid: 0000-0003-1520-9053

According to our database1, Xiujuan Wang authored at least 67 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ERAT-DLoRA: Parameter-efficient tuning with enhanced range adaptation in time and depth aware dynamic LoRA.
Neurocomputing, 2025

2024
FedKG: A Knowledge Distillation-Based Federated Graph Method for Social Bot Detection.
Sensors, June, 2024

Unsupervised twitter social bot detection using deep contrastive graph clustering.
Knowl. Based Syst., 2024

Stochastic modelling of development and biomass allocation: Computation applied to architecture of young mahogany trees (Khaya senegalensis Desr. A. Juss), a native African savannah emblematic agroforestry species.
Comput. Electron. Agric., 2024

Hybrid ASCII Art Extraction Algorithm Based on String Distance.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024

Adaptive Image Adversarial Example Detection Based on Class Activation Mapping.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

Easy Planting with Distributed Cellular Plant Factory<sup>*</sup>.
Proceedings of the Australian & New Zealand Control Conference, 2024

2023
Can Digital Intelligence and Cyber-Physical-Social Systems Achieve Global Food Security and Sustainability?
IEEE CAA J. Autom. Sinica, November, 2023

The Development of AgriVerse: Past, Present, and Future.
IEEE Trans. Syst. Man Cybern. Syst., June, 2023

User authentication method based on keystroke dynamics and mouse dynamics using HDA.
Multim. Syst., April, 2023

Comparative Analysis of ASV Spoofing Countermeasures: Evaluating Res2Net-Based Approaches.
IEEE Signal Process. Lett., 2023

Deep Learning in Chinese Text Information Extraction Model for Coastal Biodiversity.
Int. J. Semantic Web Inf. Syst., 2023

Study on personalised search of English teaching resources database based on semantic association mining.
Int. J. Comput. Appl. Technol., 2023

Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.
Comput. Syst. Sci. Eng., 2023

The Design of a Mobile Application MetaPlant.
Proceedings of the IEEE 3rd International Conference on Digital Twins and Parallel Intelligence, 2023

2022
A Real-Time Water Quality Measurement Instrument for Simultaneously Detecting Turbidity and Particle Size by Using Single-Photon Counting Technique.
IEEE Trans. Instrum. Meas., 2022

User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes.
Sensors, 2022

Fiber Bragg Grating-Based Smart Garment for Monitoring Human Body Temperature.
Sensors, 2022

Cohesive clustering algorithm based on high-dimensional generalized Fermat points.
Inf. Sci., 2022

Parallel crop planning based on price forecast.
Int. J. Intell. Syst., 2022

DeCASA in AgriVerse: Parallel Agriculture for Smart Villages in Metaverses.
IEEE CAA J. Autom. Sinica, 2022

Predicting User Susceptibility to Phishing Based on Multidimensional Features.
Comput. Intell. Neurosci., 2022

Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Optimal control of plant growth in a plant factory using a plant model.
Proceedings of the Australian & New Zealand Control Conference, 2022

2021
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021

Personality Classification of Social Users Based on Feature Fusion.
Sensors, 2021

Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution.
Secur. Commun. Networks, 2021

Adversarial Text Generation for Personality Privacy Protection.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020

User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion.
Secur. Commun. Networks, 2020

Feature Selection Method Based on Differential Correlation Information Entropy.
Neural Process. Lett., 2020

A farmland-microclimate monitoring system based on the internet of things.
Int. J. Embed. Syst., 2020

Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process.
IET Inf. Secur., 2020

Stability criteria about discrete fractional maps.
Appl. Math. Lett., 2020

Feature subset selection combining maximal information entropy and maximal information coefficient.
Appl. Intell., 2020

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020

Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter.
IEEE Access, 2020

An Explainable Machine Learning Framework for Intrusion Detection Systems.
IEEE Access, 2020

A Compression-Based Multi-Objective Evolutionary Algorithm for Community Detection in Social Networks.
IEEE Access, 2020

Greenhouse Environment Control based on Computational Experiments.
Proceedings of the HPCCT & BDAI 2020: 4th High Performance Computing and Cluster Technologies Conference & 3rd International Conference on Big Data and Artificial Intelligence, 2020

2019
Forecasting Horticultural Products Price Using ARIMA Model and Neural Network Based on a Large-Scale Data Set Collected by Web Crawler.
IEEE Trans. Comput. Soc. Syst., 2019

A Non-Destructive Testing Method for Fault Detection of Substation Grounding Grids.
Sensors, 2019

User Identification Using Real Environmental Human Computer Interaction Behavior.
KSII Trans. Internet Inf. Syst., 2019

Detecting Malicious Social Robots with Generative Adversarial Networks.
KSII Trans. Internet Inf. Syst., 2019

User identification by keystroke dynamics using improved binary particle swarm optimisation.
Int. J. Bio Inspired Comput., 2019

A Session and Dialogue-Based Social Engineering Framework.
IEEE Access, 2019

Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks.
IEEE Access, 2019

Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics.
IEEE Access, 2019

SMOTETomek-Based Resampling for Personality Recognition.
IEEE Access, 2019

Detecting Spear-phishing Emails Based on Authentication.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Development and Application of Big Data Platform for "Bohai granary".
Wirel. Pers. Commun., 2018

Managing Traditional Solar Greenhouse With CPSS: A Just-for-Fit Philosophy.
IEEE Trans. Cybern., 2018

Feature selection method with joint maximal information entropy between features and class.
Pattern Recognit., 2018

A knowledge-and-data-driven modeling approach for simulating plant growth and the dynamics of CO<sub>2</sub>/O<sub>2</sub> concentrations in a closed system of plants and humans by integrating mechanistic and empirical models.
Comput. Electron. Agric., 2018

Social Bot Detection Using Tweets Similarity.
Proceedings of the Security and Privacy in Communication Networks, 2018

Blockchain Based Provenance for Agricultural Products: A Distributed Platform with Duplicated and Shared Bookkeeping.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

2017
System architecture of coastal remote sensing data mining and services based on cloud computing.
Int. J. Comput. Sci. Eng., 2017

2013
Target Essentiality and Centrality Characterize Drug Side Effects.
PLoS Comput. Biol., 2013

Utility-based bandwidth allocation algorithm for heterogeneous wireless networks.
Sci. China Inf. Sci., 2013

INstruct: a database of high-quality 3D structurally resolved protein interactome networks.
Bioinform., 2013

Modeling plant plasticity from a biophysical model: biomechanics.
Proceedings of the 12th ACM International Conference on Virtual Reality Continuum and Its Applications in Industry, 2013

2012
Utility-based bandwidth allocation algorithm for heterogeneous wireless network.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

2010
Design and Application of the RFID Technology in ERP.
Comput. Inf. Sci., 2010

2009
Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicine.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

The Research of Platform-Based Product Configuration Model.
Proceedings of the Growth and Development of Computer-Aided Innovation, 2009

2006
Scanning microarrays at multiple intensities enhances discovery of differentially expressed genes.
Bioinform., 2006


  Loading...