Jun Hou

Orcid: 0000-0002-6986-4961

Affiliations:
  • Nanjing University of Science and Technology, School of Cyber Science and Engineering, China
  • Nanjing Institute of Industry Technology, School of Social Science, China
  • Nanjing Vocational University of Industry Technology, School of Social Science, China
  • Wuyi University, Department of Intelligent Manufacturing, Jiangmen, China


According to our database1, Jun Hou authored at least 48 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Bandit-based data poisoning attack against federated learning for autonomous driving models.
Expert Syst. Appl., October, 2023

New characteristics in ECG induced by ultra-high altitude hypoxia.
Biomed. Signal Process. Control., August, 2023

Secure multi-factor access control mechanism for pairing blockchains.
J. Inf. Secur. Appl., May, 2023

A privacy-preserving recommendation method with clustering and locality-sensitive hashing.
Comput. Intell., February, 2023

Learning from biased crowdsourced labeling with deep clustering.
Expert Syst. Appl., 2023

Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models.
Aslib J. Inf. Manag., 2023

MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Hybrid Multi-Strategy Improvements for The Aquila Optimizer.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
A threat recognition solution of edge data security in industrial internet.
World Wide Web, 2022

Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data.
J. Organ. End User Comput., 2022

Locality-Sensitive Hashing-Based Link Prediction Process on Smart Campus Education or Online Social Platform.
J. Circuits Syst. Comput., 2022

Defect knowledge graph construction and application in multi-cloud IoT.
J. Cloud Comput., 2022

A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things.
Cryptogr., 2022

Analyzing the Research Trends of IoT Using Topic Modeling.
Comput. J., 2022

Attention-Based Knowledge-aware Multi-Interest Intelligent Model for Sequential Recommendation.
Proceedings of the IEEE Smartworld, 2022

Label Aggregation with Clustering for Biased Crowdsourced Labeling.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

Evolving convolutional neural networks for intrusion detection system using hybrid multi-strategy aquila optimizer.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

A Joint Knowledge Graph Reasoning Method.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

CPGCN: Collaborative Property-aware Graph Convolutional Networks for Service Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
An Enhanced Cascading Model for E-Commerce Consumer Credit Default Prediction.
J. Organ. End User Comput., 2021

Multi-label active learning from crowds for secure IIoT.
Ad Hoc Networks, 2021

Transformer-Based Rating-Aware Sequential Recommendation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Heuristic Network Security Risk Assessment Based on Attack Graph.
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021

KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems.
Proceedings of the Cloud Computing - 11th EAI International Conference, 2021

2020
Low-cohesion differential privacy protection for industrial Internet.
J. Supercomput., 2020

MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices.
Secur. Commun. Networks, 2020

Active Defense by Mimic Association Transmission in Edge Computing.
Mob. Networks Appl., 2020

GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks.
Complex., 2020

Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought.
Proceedings of the Security and Privacy in Digital Economy, 2020

A High Capacity Text Steganography Utilizing Unicode Zero-Width Characters.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Research Review on Imbalanced Learning Models in Embedded Intelligent Computing.
Proceedings of the 2020 IEEE International Conference on Embedded Software and Systems, 2020

Security Control Components for Epidemic Prevention Donation Management Blockchain.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.
Entropy, 2019

Complex Attack Linkage Decision-Making in Edge Computing Networks.
IEEE Access, 2019

CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network.
IEEE Access, 2019

An Intrusion Tracking Watermarking Scheme.
IEEE Access, 2019

DPRF: A Differential Privacy Protection Random Forest.
IEEE Access, 2019

Differentially Private Recommender System with Autoencoders.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

Fusion Learning Model for Embedded Face Safe Detection and Facial Gesture Analysis.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

The Research Reviewed of Edge Network Active Safety Defense Technology.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Self-Similarity Analysis and Application of Water Network Traffic.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

Safety Risk Monitoring of Hydraulic Power Generation Industrial Control Network.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

2018
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media.
IEEE Access, 2018

2015
File Relation Graph Based Malware Detection Using Label Propagation.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

2012
A Mobile-Certificate Security Method of Satellite-Earth Integration Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012


  Loading...