![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Junjiang He
Person information
Refine list
![note](https://dblp.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. Comput. J. 67(3): 851-863 (2024) - [j15]Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li:
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Comput. Secur. 137: 103604 (2024) - [j14]Meng Huang, Wenshan Li, Junjiang He, Xiaolong Lan, Tao Li, Nian Zhang:
IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems. Int. J. Comput. Intell. Syst. 17(1): 108 (2024) - [j13]Xiaolong Lan
, Ziheng Xu, Junjiang He
, Liang Liu
, Qingchun Chen
, Tao Li
:
Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication. IEEE Internet Things J. 11(9): 15940-15956 (2024) - [j12]Junjiang He
, Cong Tang
, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan
:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. IEEE Trans. Inf. Forensics Secur. 19: 485-499 (2024) - 2023
- [j11]Jie Yang, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
MPF-FS: A multi-population framework based on multi-objective optimization algorithms for feature selection. Appl. Intell. 53(19): 22179-22199 (2023) - [j10]Linfeng Du, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yunhua Huang:
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range. Comput. Secur. 129: 103202 (2023) - [j9]Yuting Guan, Junjiang He, Tao Li, Hui Zhao, Baoqiang Ma:
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning. Future Internet 15(4): 133 (2023) - [j8]Geying Yang
, Lina Wang
, Rongwei Yu
, Junjiang He
, Bo Zeng
, Tian Wu
:
A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection. Int. J. Intell. Syst. 2023: 1-23 (2023) - [j7]Ge Zhang
, Junjiang He, Wenshan Li, Tao Li, Xiaolong Lan, Yunpeng Wang:
DGA-PSO: An improved detector generation algorithm based on particle swarm optimization in negative selection. Knowl. Based Syst. 278: 110892 (2023) - [j6]Geying Yang, Junjiang He, Lina Wang, Bo Zeng, Tian Wu
:
A novel multi-objective immunization algorithm based on dynamic variation distance. Swarm Evol. Comput. 83: 101391 (2023) - [j5]Wenbo Fang
, Junjiang He, Wenshan Li, Xiaolong Lan
, Yang Chen, Tao Li
, Jiwu Huang
, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023) - 2022
- [j4]Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - 2021
- [j3]Junjiang He, Wen Chen, Tao Li, Beibei Li
, Yongbin Zhu, Meng Huang:
HD-NSA: A real-valued negative selection algorithm based on hierarchy division. Appl. Soft Comput. 112: 107726 (2021) - [j2]Junjiang He, Tao Li, Beibei Li
, Xiaolong Lan, Zhiyong Li, Yunpeng Wang:
An immune-based risk assessment method for digital virtual assets. Comput. Secur. 102: 102134 (2021) - [j1]Zhiyong Li, Tao Li, Junjiang He
, Yongbin Zhu
, Yunpeng Wang:
A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm. Knowl. Based Syst. 232: 107477 (2021)
Conference and Workshop Papers
- 2023
- [c4]Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. CloudNet 2023: 352-359 - [c3]Tao Jiang, Junjiang He, Tao Li, Wenbo Fang, Wenshan Li, Cong Tang:
An Attack Entity Deducing Model for Attack Forensics. ICONIP (15) 2023: 340-354 - 2022
- [c2]Zhan Gao, Yang Chen, Zhiyong Li, Tao Li, Junjiang He, Yuehao Li:
An Improved Crowd Aggregation Prediction Algorithm Based on ARMA. ICIAI 2022: 8-12 - 2019
- [c1]Junjiang He, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao, Yunpeng Wang:
An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets. EECS 2019: 76-81
Coauthor Index
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint