Jiazhong Lu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things.
IET Inf. Secur., 2025

The applications of machine learning mechanisms in the compositions of internet of things services: A systematic study, current progress, and future research agenda.
Eng. Appl. Artif. Intell., 2025

Adversarial attacks based on time-series features for traffic detection.
Comput. Secur., 2025

2024
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024

An Adversarial Example Defense Algorithm for Intelligent Driving.
IEEE Netw., November, 2024

HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization.
Neural Networks, 2024

Methods for Detecting XSS Attacks Based on BERT and BiLSTM.
Proceedings of the 8th International Conference on Management Engineering, 2024

Fake News Detection Across Multiple Domains Using Fuzzy Association Rules.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

2023
Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics.
J. Grid Comput., December, 2023

2021
A Hybrid Association Rule-Based Method to Detect and Classify Botnets.
Secur. Commun. Networks, 2021

Confidential information protection method of commercial information physical system based on edge computing.
Neural Comput. Appl., 2021

Research on information steganography based on network data stream.
Neural Comput. Appl., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

2020
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.
Secur. Commun. Networks, 2020

An equalisation control method for network big data transmission based on parallel computing.
Int. J. Internet Protoc. Technol., 2020

Moving target defense controller of mobile system based on Openflow sensor security scheme.
Comput. Commun., 2020

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Integrating Traffics with Network Device Logs for Anomaly Detection.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
Int. J. Pattern Recognit. Artif. Intell., 2019

A temporal correlation and traffic analysis approach for APT attacks detection.
Clust. Comput., 2019

2018
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018

Botnet Detection based on Fuzzy Association Rules.
Proceedings of the 24th International Conference on Pattern Recognition, 2018


  Loading...