Lijuan Xu

Orcid: 0000-0003-3386-4756

Affiliations:
  • Qilu University of Technology, Shandong Academy of Sciences, National Supercomputer Center in Jinan, China
  • Harbin Institute of Technology, School of Computer Science and Technology, China (PhD 2023)


According to our database1, Lijuan Xu authored at least 44 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Outsourced Secure Cross-Modal Retrieval Based on Secret Sharing for Lightweight Clients.
IEEE Internet Things J., July, 2025

SCTP: Achieving Semantic Correlation Trajectory Privacy-Preserving With Differential Privacy.
IEEE Trans. Veh. Technol., April, 2025

PPSKSQ: Towards Efficient and Privacy-Preserving Spatial Keyword Similarity Query in Cloud.
IEEE Trans. Cloud Comput., 2025

Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare.
J. Inf. Secur. Appl., 2025

TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT.
IEEE Internet Things J., 2025

AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices.
Future Gener. Comput. Syst., 2025

An intrusion response approach based on multi-objective optimization and deep Q network for industrial control systems.
Expert Syst. Appl., 2025

DAN: Neural network based on dual attention for anomaly detection in ICS.
Expert Syst. Appl., 2025

AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE.
Comput. Secur., 2025

Dynamic malware detection based on supervised contrastive learning.
Comput. Electr. Eng., 2025

Reset observer-based containment protocol via event-triggered strategy for multi-agent networks against aperiodic DoS attacks.
Appl. Math. Comput., 2025

Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Multi-Relational Variational Contrastive Learning for Next POI Recommendation.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

DCCT-Net: A Network Combined Dynamic CNN and Transformer for Image Compressive Sensing.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

CBAT-ASG: Adversarial Sample Generation Method Based on CBA-Transformer.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter.
IEEE Trans. Comput. Soc. Syst., June, 2024

MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users.
IEEE Trans. Consumer Electron., February, 2024

Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation.
IEEE Trans. Sustain. Comput., 2024

Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud.
IEEE Trans. Serv. Comput., 2024

Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems.
Comput. Secur., 2024

Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

Multi-Interest Granularity Guided Semi-Joint Learning for N-Successive POI Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2024

GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things.
Expert Syst. Appl., December, 2023

ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT.
IEEE Internet Things J., September, 2023

GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System.
Comput. Secur., April, 2023

A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data.
Entropy, February, 2023

A dynamic adaptive iterative clustered federated learning scheme.
Knowl. Based Syst., 2023

A Malicious Code Family Classification Method Based on RGB Images and Lightweight Model.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization.
Entropy, December, 2022

Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph.
IEEE Trans. Netw. Sci. Eng., 2022

WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.
Sensors, 2022

2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
IEEE Trans. Syst. Man Cybern. Syst., 2021

2020
The Feedback Vertex Set Problem of Multiplex Networks.
IEEE Trans. Circuits Syst., 2020

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020

Fixed-Time Synchronization Analysis for Complex-Valued Neural Networks via a New Fixed-Time Stability Theorem.
IEEE Access, 2020

2019
Virtual Machine Memory Forensics Method for XenServer Platform.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2018
Secure Virtualization Environment Based on Advanced Memory Introspection.
Secur. Commun. Networks, 2018

2017
The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Social Media account linkage using user-generated geo-location data.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Finding another yourself in multiplex networks.
Appl. Math. Comput., 2015

2013
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2010
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Network Connections Information Extraction of 64-Bit Windows 7 Memory Images.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010


  Loading...