Longjuan Wang

According to our database1, Longjuan Wang authored at least 14 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification.
Comput. Secur., February, 2024

2022
IMCLNet: A lightweight deep neural network for Image-based Malware Classification.
J. Inf. Secur. Appl., 2022

Secure Data Storage Scheme of Judicial System Based on Blockchain.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

DCAL: A New Method for Defending Against Adversarial Examples.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

An Overview of Sybil Attack Detection Mechanisms in VFC.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

GWDGA: An Effective Adversarial DGA.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Multi-modal Universal Embedding Representations for Language Understanding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
A New Fuzzy Logic Classifier Based on Multiscale Permutation Entropy and Its Application in Bearing Fault Diagnosis.
Entropy, 2020

Encryption Algorithm for TCP Session Hijacking.
CoRR, 2020

Smart Sleep Mattress Based on Internet of Things Technology.
Proceedings of the 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 2020

Research on UAV Control Improvement.
Proceedings of the 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 2020

2019
Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2011
Statistical Modeling for LSB-Based Image Steganalysis: A Systematic Perspective.
Proceedings of the Applied Informatics and Communication - International Conference, 2011


  Loading...