Zhijie Fan

Orcid: 0000-0003-3578-7889

According to our database1, Zhijie Fan authored at least 14 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Codebook Configuration for 1-bit RIS-aided Systems Based on Implicit Neural Representations.
CoRR, 2023

2022
A Bayesian Graph Embedding Model for Link-Based Classification Problems.
IEEE Trans. Netw. Sci. Eng., 2022

Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism.
Int. J. Inf. Secur. Priv., 2022

2021
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps.
Int. J. Inf. Comput. Secur., 2021

Method of Network Intrusion Discovery Based on Convolutional Long-Short Term Memory Network and Implementation in VSS.
IEEE Access, 2021

Temporal Networks Based Industry Identification for Bitcoin Users.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl., 2019

Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng., 2019

Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst., 2019

Sense-Based Topic Word Embedding Model for Item Recommendation.
IEEE Access, 2019

2018
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors, 2018

Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access, 2018

2011
Study of Flow Control System Model Based on Bypass Protocol Analysis.
Proceedings of the Information Computing and Applications, 2011


  Loading...