Lejun Zhang

According to our database1, Lejun Zhang authored at least 74 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024

ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024

2023
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining.
IEEE Trans. Reliab., December, 2023

A Quantum-Behaved Heterogeneous Topology Optimization Model For Optical Wireless Communication Networks.
IEEE Wirel. Commun., October, 2023

Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023

Diverse classifiers with label dependencies for long-tail relation extraction in big data.
Comput. Electr. Eng., September, 2023

Dispersed differential hunger games search for high dimensional gene data feature selection.
Comput. Biol. Medicine, September, 2023

A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023

Dual-scale similarity-guided cycle generative adversarial network for unsupervised low-dose CT denoising.
Comput. Biol. Medicine, July, 2023

Sparse-to-dense coarse-to-fine depth estimation for colonoscopy.
Comput. Biol. Medicine, June, 2023

A Blockchain-Based Federated Learning Scheme for Data Sharing in Industrial Internet of Things.
IEEE Internet Things J., 2023

Extraction of Relationship Between Esophageal Cancer and Biomolecules Based on BioBERT.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

An Evolutionary Reinforcement Learning Scheme for IoT Robustness.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Research on Named Entity Recognition Based on ERNIE-BiLSTM-CRF.
Proceedings of the International Conference on Computers, 2023

2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022

Illumination compensation for microscope images based on illumination difference estimation.
Vis. Comput., 2022

A Resource Allocation Scheme for Joint Optimizing Energy Consumption and Delay in Collaborative Edge Computing-Based Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Collaborative Edge Computing for Social Internet of Vehicles to Alleviate Traffic Congestion.
IEEE Trans. Comput. Soc. Syst., 2022

A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022

Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment.
IEEE Syst. J., 2022

A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning.
Sensors, 2022

SPCBIG-EC: A Robust Serial Hybrid Model for Smart Contract Vulnerability Detection.
Sensors, 2022

CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model.
Sensors, 2022

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment.
KSII Trans. Internet Inf. Syst., 2022

Optimizing Energy-Latency Tradeoff for Computation Offloading in SDIN-Enabled MEC-based IIoT.
KSII Trans. Internet Inf. Syst., 2022

Chaotic diffusion-limited aggregation enhanced grey wolf optimizer: Insights, analysis, binarization, and feature selection.
Int. J. Intell. Syst., 2022

Approximate continuous optimal transport with copulas.
Int. J. Intell. Syst., 2022

Smart contract vulnerability detection combined with multi-objective detection.
Comput. Networks, 2022

An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Smart Contract Vulnerability Detection Model Based on Siamese Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Modeling Dynamic Entities in Temporal Knowledge Graphs.
Proceedings of the 8th IEEE International Conference on Cloud Computing and Intelligent Systems, 2022

Attentional Meta-path Contrastive Graph Convolutional Networks for Knowledge Concept Recommendation.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
Research on Escaping the Big-Data Traps in O2O Service Recommendation Strategy.
IEEE Trans. Big Data, 2021

Secure and efficient mutual authentication protocol for smart grid under blockchain.
Peer-to-Peer Netw. Appl., 2021

A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems.
KSII Trans. Internet Inf. Syst., 2021

Graph classification based on structural features of significant nodes and spatial convolutional neural networks.
Neurocomputing, 2021

An approach of covert communication based on the Ethereum whisper protocol in blockchain.
Int. J. Intell. Syst., 2021

Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing.
Trans. Emerg. Telecommun. Technol., 2021

Boosting quantum rotation gate embedded slime mould algorithm.
Expert Syst. Appl., 2021

Highway Cost Prediction Based on LSSVM Optimized by Intial Parameters.
Comput. Syst. Sci. Eng., 2021

Resource allocation and trust computing for blockchain-enabled edge computing system.
Comput. Secur., 2021

Alleviating the Matthew Effect in O2O Service Matching Process.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

2020
The Impact of Weighting Schemes and Stemming Process on Topic Modeling of Arabic Long and Short Texts.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2020

An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment.
Secur. Commun. Networks, 2020

Performability analysis of multi-state sliding window systems.
Reliab. Eng. Syst. Saf., 2020

Trajectory-prediction based relay scheme for time-sensitive data communication in VANETs.
KSII Trans. Internet Inf. Syst., 2020

Reversible data hiding in encrypted images for coding channel based on adaptive steganography.
IET Image Process., 2020

Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies.
Expert Syst. Appl., 2020

Value driven Analysis Framework of Service Ecosystem Evolution Mechanism.
CoRR, 2020

BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid.
Proceedings of the 19th IEEE International Conference on Trust, 2020

The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Social Learning Evolution (SLE): Computational Experiment-Based Modeling Framework of Social Manufacturing.
IEEE Trans. Ind. Informatics, 2019

Complexity analysis of manufacturing service ecosystem: a mapping-based computational experiment approach.
Int. J. Prod. Res., 2019

Evaluating of dynamic service matching strategy for social manufacturing in cloud environment.
Future Gener. Comput. Syst., 2019

An Enlarging-the-Capacity Packet Sorting Covert Channel.
IEEE Access, 2019

An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography.
IEEE Access, 2019

Channel Status Learning for Cooperative Spectrum Sensing in Energy-Restricted Cognitive Radio Networks.
IEEE Access, 2019

SWNF: Sign Prediction of Weak Ties Based on the Network Features.
IEEE Access, 2019

2018
EESS: An Energy-Efficient Spectrum Sensing Method by Optimizing Spectrum Sensing Node in Cognitive Radio Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Lithological and Hydrothermal Alteration Mapping of Epithermal, Porphyry and Tourmaline Breccia Districts in the Argentine Andes Using ASTER Imagery.
Remote. Sens., 2018

Indoor Interference Classification Based on WiFi Channel State Information.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Data Validation Method Based on IP Covert Channel Packet Ordering.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Research on Information Propagation Method Based on Individual User Characteristics.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2012
An Improved Community Detection Algorithm Based on Local Information in Social Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2010
A remote data disaster recovery system model based on Undo.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Novel Security Network Storage System Based on Internet.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Research on Disaster Tolerance System Based on Network Dataflow.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A Method to Enhance Service Survivability Based on Autonomous Configuration.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

A Temporal Logic Based Grid Workflow Model and Scheduling Scheme.
Proceedings of the Grid and Cooperative Computing, 2007

An Efficient Survivability Hierarchy Analysis Model for Networked Information System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A Quantitative Evaluation Model for Network Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...