Zhijie Fan
Orcid: 0000-0002-7011-8632
According to our database1,
Zhijie Fan
authored at least 21 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
CoRR, July, 2025
Incentivizing Point Cloud-Based Accurate Cooperative Perception for Connected Vehicles.
IEEE Trans. Veh. Technol., April, 2025
Trajectory-Based Anycast Routing Protocol with MDRUs Assistance in Disaster Response Network.
Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), 2025
2024
Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection.
Int. J. Inf. Secur. Priv., 2024
Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals.
Int. J. Inf. Secur. Priv., 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features.
Int. J. Inf. Secur. Priv., 2023
Codebook Configuration for 1-bit RIS-aided Systems Based on Implicit Neural Representations.
CoRR, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism.
Int. J. Inf. Secur. Priv., 2022
2021
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps.
Int. J. Inf. Comput. Secur., 2021
Method of Network Intrusion Discovery Based on Convolutional Long-Short Term Memory Network and Implementation in VSS.
IEEE Access, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
2020
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl., 2019
Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng., 2019
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst., 2019
2018
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors, 2018
Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access, 2018
2011
Proceedings of the Information Computing and Applications, 2011