Junjun Zheng

Orcid: 0000-0002-5529-1429

According to our database1, Junjun Zheng authored at least 45 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impact of temporal interaction on the evolution of cooperation.
CoRR, 2024

2023
Evolution of cooperation in public goods games with dynamic resource allocation: A fairness preference perspective.
Appl. Math. Comput., May, 2023

Social media overload, gender differences and knowledge withholding.
Kybernetes, 2023

The First High-quality Reference Genome of Sika Deer Provides Insights into High-tannin Adaptation.
Genom. Proteom. Bioinform., 2023

Hierarchical Dependability Modeling with Multi-State Systems.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

Meta-Heuristic Algorithm for Constructing Higher-Index Covering Arrays for Combinatorial Interaction Testing.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

Action Sensitivity Learning for Temporal Action Localization.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Senti-EGCN: An Aspect-Based Sentiment Analysis System Using Edge-Enhanced Graph Convolutional Networks.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

A Study of Hand Function in Stroke Patients Using Kinematic Metrics.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2023

2022
Variance-Based Sensitivity Analysis for Markov Models using Moment Approximation.
Int. J. Perform. Eng., 2022

Hierarchical Bayesian Parameter Estimation of Queueing Systems using Utilization Data.
Int. J. Perform. Eng., 2022

Firewall Traversal Method by Pseudo-TCP Encapsulation.
IEICE Trans. Inf. Syst., 2022

Parameter Estimation of Markovian Arrivals with Utilization Data.
IEICE Trans. Commun., 2022

Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code.
IEEE Access, 2022

An Efficient Transformer Encoder-Based Classification of Malware Using API Calls.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Quantitative Security Evaluation of Intrusion Tolerant Systems With Markovian Arrivals.
IEEE Trans. Reliab., 2021

Availability importance measures of components in smart electric power grid systems.
Reliab. Eng. Syst. Saf., 2021

Age replacement with Markovian opportunity process.
Reliab. Eng. Syst. Saf., 2021

Strategy research of used cars in online sequential auction based on fuzzy theory.
J. Intell. Fuzzy Syst., 2021

Performance Comparison of Training Datasets for System Call-Based Malware Detection with Thread Information.
IEICE Trans. Inf. Syst., 2021

The emergence and implementation of pool exclusion in spatial public goods game with heterogeneous ability-to-pay.
Appl. Math. Comput., 2021

Robust optimization strategies for seller based on uncertainty sets in context of sequential auction.
Appl. Math. Comput., 2021

Performance Evaluation of Heterogeneous Cellular Networks Using Stochastic Petri Nets.
Proceedings of the International Conference on Software, 2021

Sensitivity Analysis of Software Rejuvenation Model with Markov Regenerative Process.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
A transient interval reliability analysis for software rejuvenation models with phase expansion.
Softw. Qual. J., 2020

Optimal Rejuvenation Policies for Non-Markovian Availability Models with Aperiodic Checkpointing.
IEICE Trans. Inf. Syst., 2020

How Robust is the Optimal Software Rejuvenation Timing?
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

2019
Moment-Based Approximation for Uncertainty Propagation in Fault Trees.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

A Framework for Localizing Aging-Related Bugs in a Random and Dynamic Way.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Optimal periodic software rejuvenation policies based on interval reliability criteria.
Reliab. Eng. Syst. Saf., 2018

Component Importance Analysis of Mobile Cloud Computing System in the Presence of Common-Cause Failures.
IEEE Access, 2018

A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Comprehensive Evaluation of Software Rejuvenation Policies for Transaction Systems With Markovian Arrivals.
IEEE Trans. Reliab., 2017

Low carbon supplier selection under multi-source and multi-attribute procurement.
J. Intell. Fuzzy Syst., 2017

Erratum: "Decision Mechanism for Supplier Selection Under Sustainability".
Int. J. Inf. Technol. Decis. Mak., 2017

Decision Mechanism for Supplier Selection Under Sustainability.
Int. J. Inf. Technol. Decis. Mak., 2017

Compound mechanism design of supplier selection based on multi-attribute auction and risk management of supply chain.
Comput. Ind. Eng., 2017

Bidding Behavior and Equilibrium Excursion of Uniform Price Auction Mechanism.
Asia Pac. J. Oper. Res., 2017

A Statistical Framework on Software Aging Modeling with Continuous-Time Hidden Markov Model.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

2016
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

2015
Survivability Analysis of VM-Based Intrusion Tolerant Systems.
IEICE Trans. Inf. Syst., 2015

Component Importance Measures for Real-Time Computing Systems in the Presence of Common-Cause Failures.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2012
Component Importance Analysis of Virtualized System.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012


  Loading...