Zhijuan Jia

Orcid: 0000-0003-4730-2906

According to our database1, Zhijuan Jia authored at least 19 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

2023
The Hybrid Trip Destination Prediction Model of Vehicles Based on Autoencoder and High-Order Interaction Features.
IEEE Trans. Intell. Transp. Syst., August, 2023

Data Poisoning Attacks With Hybrid Particle Swarm Optimization Algorithms Against Federated Learning in Connected and Autonomous Vehicles.
IEEE Access, 2023

2022
The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., 2022

Distributed adaptive platooning control for platoons under DoS attacks.
Proceedings of the Australian & New Zealand Control Conference, 2022

2020
An Electromagnetic Variable Stiffness Device for Semiactive Seat Suspension Vibration Control.
IEEE Trans. Ind. Electron., 2020

A Cloud Data Access Authorization Update Scheme Based on Blockchain.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

2019
An Authentication Scheme in VANETs Based on Group Signature.
Proceedings of the Intelligent Computing Theories and Application, 2019

Experimental Investigation of Light Distribution and Fluctuation Characteristics under Different Weather Conditions in Xi'an Area.
Proceedings of the 11th IEEE International Conference on Advanced Infocomm Technology, 2019

A New Signcryption Scheme without Hash or Redundant functions.
Proceedings of the 6th International Conference on Behavioral, 2019

2016
A new data hiding method for H.264 based on secret sharing.
Neurocomputing, 2016

A reversible data hiding method for H.264 with Shamir's (t, n)-threshold secret sharing.
Neurocomputing, 2016

2015
An Epidemic Propagation Model with Saturated Infection Rate on a Small World Network.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2015

2014
A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

Community Detection Method of Complex Network Based on ACO Pheromone of TSP.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

Cascading Failures in Power Grid under Three Node Attack Strategies.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

2009
Web Text Categorization for Enterprise Decision Support Based on SVMs - An Application of GBODSS.
Proceedings of the Advances in Neural Networks, 2009


  Loading...