Lijuan Xu
Orcid: 0000-0003-3386-4756Affiliations:
- Qilu University of Technology, Shandong Academy of Sciences, National Supercomputer Center in Jinan, China
- Harbin Institute of Technology, School of Computer Science and Technology, China (PhD 2023)
According to our database1,
Lijuan Xu
authored at least 44 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Outsourced Secure Cross-Modal Retrieval Based on Secret Sharing for Lightweight Clients.
IEEE Internet Things J., July, 2025
SCTP: Achieving Semantic Correlation Trajectory Privacy-Preserving With Differential Privacy.
IEEE Trans. Veh. Technol., April, 2025
PPSKSQ: Towards Efficient and Privacy-Preserving Spatial Keyword Similarity Query in Cloud.
IEEE Trans. Cloud Comput., 2025
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare.
J. Inf. Secur. Appl., 2025
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT.
IEEE Internet Things J., 2025
Future Gener. Comput. Syst., 2025
An intrusion response approach based on multi-objective optimization and deep Q network for industrial control systems.
Expert Syst. Appl., 2025
Expert Syst. Appl., 2025
AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE.
Comput. Secur., 2025
Comput. Electr. Eng., 2025
Reset observer-based containment protocol via event-triggered strategy for multi-agent networks against aperiodic DoS attacks.
Appl. Math. Comput., 2025
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
DCCT-Net: A Network Combined Dynamic CNN and Transformer for Image Compressive Sensing.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
2024
Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter.
IEEE Trans. Comput. Soc. Syst., June, 2024
IEEE Trans. Consumer Electron., February, 2024
Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation.
IEEE Trans. Sustain. Comput., 2024
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud.
IEEE Trans. Serv. Comput., 2024
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems.
Comput. Secur., 2024
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Multi-Interest Granularity Guided Semi-Joint Learning for N-Successive POI Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2024
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things.
Expert Syst. Appl., December, 2023
IEEE Internet Things J., September, 2023
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System.
Comput. Secur., April, 2023
A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data.
Entropy, February, 2023
Knowl. Based Syst., 2023
A Malicious Code Family Classification Method Based on RGB Images and Lightweight Model.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
2022
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization.
Entropy, December, 2022
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph.
IEEE Trans. Netw. Sci. Eng., 2022
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.
Sensors, 2022
2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
IEEE Trans. Syst. Man Cybern. Syst., 2021
2020
IEEE Trans. Circuits Syst., 2020
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020
Fixed-Time Synchronization Analysis for Complex-Valued Neural Networks via a New Fixed-Time Stability Theorem.
IEEE Access, 2020
2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
2018
Secur. Commun. Networks, 2018
2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
2015
2013
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2010
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010