Zhijun Wu

Orcid: 0000-0002-0691-1767

Affiliations:
  • Civil Aviation University of China, School of Electronics Information and Automation, Tianjin, China
  • Beijing University of Posts and Telecommunications, China (PhD 2004)


According to our database1, Zhijun Wu authored at least 87 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Assisted Keyword Search Scheme for SWIM Service Based on Improved CSC-Cuckoo Filter.
Int. J. Comput. Intell. Syst., December, 2024

ATMChain: Blockchain-Based Security Architecture for Air Traffic Management in Future.
IEEE Trans. Aerosp. Electron. Syst., August, 2024

CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN.
IEEE Trans. Netw. Serv. Manag., June, 2024

2023
ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

Blockchain-Based Authentication of GNSS Civil Navigation Message.
IEEE Trans. Aerosp. Electron. Syst., August, 2023

GAN-LSTM-Based ADS-B Attack Detection in the Context of Air Traffic Control.
IEEE Internet Things J., July, 2023

Search mechanism for data contents based on bloom filter and tree hybrid structure in system wide information management.
IET Commun., July, 2023

MFPD-LSTM: A steganalysis method based on multiple features of pitch delay using RNN-LSTM.
J. Inf. Secur. Appl., May, 2023

Consumer-source authentication with conditional anonymity in information-centric networking.
Inf. Sci., May, 2023

Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN.
IEEE Trans. Netw. Sci. Eng., 2023

Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP.
Int. J. Inf. Comput. Secur., 2023

A method of speech information hiding in inactive frame based on pitch modulation.
Int. J. Inf. Comput. Secur., 2023

Research on SWIM Cooperative Emergency Response and Resilient Disaster Recovery Based on Survivability.
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023

Malicious ADS-B data Generation Based on Improved GAN.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection.
IEEE Trans. Netw. Serv. Manag., 2022

LDoS attack detection method based on traffic classification prediction.
IET Inf. Secur., 2022

Access control method for air ticket distribution system based on blockchain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Attribute encryption based access control methods under airborne networks.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

The Storage and Sharing of Big Data in Air Traffic Management System.
Proceedings of the Big Data Intelligence and Computing, 2022

Research on the Mechanism of Cooperative Defense Against DDoS Attacks Based on Game Theory.
Proceedings of the Big Data Intelligence and Computing, 2022

A Secure Sharing Framework Based on Cloud-Chain Fusion for SWIM.
Proceedings of the Big Data Intelligence and Computing, 2022

2021
High-Potency Models of LDoS Attack Against CUBIC + RED.
IEEE Trans. Inf. Forensics Secur., 2021

Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model.
IEEE Trans. Dependable Secur. Comput., 2021

Steganography and Steganalysis in Voice over IP: A Review.
Sensors, 2021

Coherent Detection of Synchronous Low-Rate DoS Attacks.
Secur. Commun. Networks, 2021

I-CIFA: An improved collusive interest flooding attack in named data networking.
J. Inf. Secur. Appl., 2021

Reliability Assessment Model of IMA Partition Software Using Stochastic Petri Nets.
IEEE Access, 2021

A Detection Method for I-CIFA Attack in NDN Network.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

Analysis of BBR's Non-queuing Optimal Model.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Content Security over ICN based Smart Grid: A Cryptographic Solution.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

ATMCC: Design of the Integration Architecture of Cloud Computing and Blockchain for Air Traffic Management.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Intrusion Detection Method based on Deep Learning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIM.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

Blockchain-Based Trust Model for Air Traffic Management Network.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Optimization of Airborne AFDX Transmission Delay Based on Revised RSP Method.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Modeling and Simulation on Dynamic Reliability of Multi-partition Software of IMA Based on TimeNET4.4.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Filtration method of DDoS attacks based on time-frequency analysis.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

2020
An ADS-B Message Authentication Method Based on Certificateless Short Signature.
IEEE Trans. Aerosp. Electron. Syst., 2020

A 4D Trajectory Prediction Model Based on the BP Neural Network.
J. Intell. Syst., 2020

Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN.
Future Internet, 2020

Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec.
Future Internet, 2020

A Hybrid SWIM Data Naming Scheme Based on TLC Structure.
Future Internet, 2020

The detection method of low-rate DoS attack based on multi-feature fusion.
Digit. Commun. Networks, 2020

Mitigation measures of collusive interest flooding attacks in named data networking.
Comput. Secur., 2020

Detecting DoS Attacks Based on Multi-Features in SDN.
IEEE Access, 2020

Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey.
IEEE Access, 2020

BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication.
IEEE Access, 2020

Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey.
IEEE Access, 2020

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network.
IEEE Access, 2020

Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey.
IEEE Access, 2020

Adaptive Speech Information Hiding Method Based on K-Means.
IEEE Access, 2020

The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN.
IEEE Access, 2020

Information-Centric Networking Cache Robustness Strategy for System Wide Information Management.
IEEE Access, 2020

2019
ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System.
IEEE Trans. Aerosp. Electron. Syst., 2019

Detecting LDoS attack bursts based on queue distribution.
IET Inf. Secur., 2019

Research on SWIM Services Dynamic Migration Method.
Future Internet, 2019

Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks.
Comput. Networks, 2019

Speech Information Hiding Algorithm Based on Complete Binary Tree Dynamic Codebook Grouping.
IEEE Access, 2019

CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A secret classified label control model based on the identity-based cryptography.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
An adaptive network traffic prediction approach for LDoS attacks detection.
Int. J. Commun. Syst., 2018

Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network.
Int. J. Commun. Syst., 2018

An Approach of Security Protection for VSAT Network.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Research on SWIM Services Dynamic Migration Mechanism.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
An adaptive KPCA approach for detecting LDoS attack.
Int. J. Commun. Syst., 2017

The approach of SWIM data sharing based on multi-dimensional data encryption.
Proceedings of the 25th International Conference on Software, 2017

2016
Low-Rate DoS Attacks Detection Based on Network Multifractal.
IEEE Trans. Dependable Secur. Comput., 2016

Flow-oriented detection of low-rate denial of service attacks.
Int. J. Commun. Syst., 2016

A New Exploration of FB-Shrew Attack.
IEEE Commun. Lett., 2016

A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
SEDP-based detection of low-rate DoS attacks.
Int. J. Commun. Syst., 2015

The Research on Optimizing Deployment Strategy for Aviation SWIM Application Servers.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2015

2014
Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance.
J. Softw., 2014

The Security Evaluation of ATM Information System Based on Bayesian Regularization.
J. Softw., 2014

Cross-correlation Based Synchronization Mechanism of LDDoS Attacks.
J. Networks, 2014

DDoS: Flood vs. Shrew.
J. Comput., 2014

2013
Chaos-based detection of LDoS attacks.
J. Syst. Softw., 2013

2012
Correlation-based Detection of LDoS Attack.
J. Softw., 2012

MSABMS-based approach of detecting LDoS attack.
Comput. Secur., 2012

Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2007
Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Approach to Hide Secret Speech Information in G.721 Scheme.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

An Information-Hiding Model for Secure Communication.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2006
G.711-Based Adaptive Speech Information Hiding Approach.
Proceedings of the Intelligent Computing, 2006


  Loading...