default search action
Zhijun Wu 0001
Person information
- affiliation: Civil Aviation University of China, School of Electronics Information and Automation, Tianjin, China
- affiliation (PhD 2004): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Zhijun Wu — disambiguation page
- Zhijun Wu 0002 — Tsinghua University, Department of Mechanical Engineering, Beijing, China (and 1 more)
- Zhijun Wu 0003 — Nanyang Technological University, School of Civil and Environmental Engineering, Singapore (and 1 more)
- Zhijun Wu 0004 — Southeast University, Department of Power Electronics, School of Electrical Engineering, Nanjing, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Lizhe Zhang, Wei Luo, Jiahao Li, Zhijun Wu, Ruiqi Li:
Blockchain-Assisted Keyword Search Scheme for SWIM Service Based on Improved CSC-Cuckoo Filter. Int. J. Comput. Intell. Syst. 17(1): 254 (2024) - [j54]Xin Lu, Zhijun Wu, Junbin Cao:
ATMChain: Blockchain-Based Security Architecture for Air Traffic Management in Future. IEEE Trans. Aerosp. Electron. Syst. 60(4): 3872-3896 (2024) - [j53]Meng Yue, Qingxin Yan, Zichao Lu, Zhijun Wu:
CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN. IEEE Trans. Netw. Serv. Manag. 21(3): 3522-3536 (2024) - 2023
- [j52]Lizhe Zhang, Zhuoning Bai, Bohua Cui, Zhijun Wu:
Search mechanism for data contents based on bloom filter and tree hybrid structure in system wide information management. IET Commun. 17(11): 1262-1273 (2023) - [j51]Zhijun Wu, Chenlei Zhang, Junjun Guo:
A method of speech information hiding in inactive frame based on pitch modulation. Int. J. Inf. Comput. Secur. 22(1): 1-27 (2023) - [j50]Lizhe Zhang, Zhuoning Bai, Zhijun Wu, Kenian Wang:
Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP. Int. J. Inf. Comput. Secur. 22(2): 186-209 (2023) - [j49]Meng Yue, Han Zheng, Haoran Cui, Zhijun Wu:
GAN-LSTM-Based ADS-B Attack Detection in the Context of Air Traffic Control. IEEE Internet Things J. 10(14): 12651-12665 (2023) - [j48]Yanrong Lu, Chenzhuo Wang, Meng Yue, Zhijun Wu:
Consumer-source authentication with conditional anonymity in information-centric networking. Inf. Sci. 624: 378-394 (2023) - [j47]Zhijun Wu, Junjun Guo:
MFPD-LSTM: A steganalysis method based on multiple features of pitch delay using RNN-LSTM. J. Inf. Secur. Appl. 74: 103469 (2023) - [j46]Zhijun Wu, Cheng Liang, Yuan Zhang:
Blockchain-Based Authentication of GNSS Civil Navigation Message. IEEE Trans. Aerosp. Electron. Syst. 59(4): 4380-4392 (2023) - [j45]Zhijun Wu, Tong Shang, Meng Yue, Liang Liu:
ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast. IEEE Trans. Aerosp. Electron. Syst. 59(6): 8535-8549 (2023) - [j44]Zhijun Wu, Silin Peng, Liang Liu, Meng Yue:
Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN. IEEE Trans. Netw. Sci. Eng. 10(1): 239-252 (2023) - [c32]Jin Lei, Ruifang Jiang, Zhijun Wu:
Malicious ADS-B data Generation Based on Improved GAN. BigDataSecurity/HPSC/IDS 2023: 72-77 - [c31]Jin Lei, Minghui Sun, Zhijun Wu:
Research on SWIM Cooperative Emergency Response and Resilient Disaster Recovery Based on Survivability. ISADS 2023: 1-5 - 2022
- [j43]Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan, Meng Yue:
LDoS attack detection method based on traffic classification prediction. IET Inf. Secur. 16(2): 86-96 (2022) - [j42]Zhijun Wu, Pan Gao, Lei Cui, Jiusheng Chen:
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 19(1): 671-685 (2022) - [c30]Qing Wang, Xin Lu, Zhijun Wu:
A Secure Sharing Framework Based on Cloud-Chain Fusion for SWIM. DataCom 2022: 127-141 - [c29]Tong Wang, Zihan Lai, Weiqing Yu, Zhijun Wu:
Research on the Mechanism of Cooperative Defense Against DDoS Attacks Based on Game Theory. DataCom 2022: 194-203 - [c28]Yuan Zhang, Qing Wang, Jiahao Li, Zhijun Wu:
The Storage and Sharing of Big Data in Air Traffic Management System. DataCom 2022: 215-229 - [c27]Zhijun Wu, Junjun Guo:
AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation. IH&MMSec 2022: 141-146 - [c26]Zhijun Wu, Zhenghang You, Peng Wang:
Attribute encryption based access control methods under airborne networks. ISPA/BDCloud/SocialCom/SustainCom 2022: 302-306 - [c25]Lizhe Zhang, Tong Wang, Zhijun Wu:
Access control method for air ticket distribution system based on blockchain. ISPA/BDCloud/SocialCom/SustainCom 2022: 815-821 - 2021
- [j41]Zhijun Wu, Haolin Ma, Meng Yue:
Reliability Assessment Model of IMA Partition Software Using Stochastic Petri Nets. IEEE Access 9: 25219-25232 (2021) - [j40]Zhijun Wu, Wenzhi Feng, Jin Lei, Meng Yue:
I-CIFA: An improved collusive interest flooding attack in named data networking. J. Inf. Secur. Appl. 61: 102912 (2021) - [j39]Zhijun Wu, Yue Yin, Guang Li, Meng Yue:
Coherent Detection of Synchronous Low-Rate DoS Attacks. Secur. Commun. Networks 2021: 6694264:1-6694264:14 (2021) - [j38]Zhijun Wu, Junjun Guo, Chenlei Zhang, Changliang Li:
Steganography and Steganalysis in Voice over IP: A Review. Sensors 21(4): 1032 (2021) - [j37]Meng Yue, Minxiao Wang, Zhijun Wu:
Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model. IEEE Trans. Dependable Secur. Comput. 18(5): 2285-2300 (2021) - [j36]Meng Yue, Jing Li, Zhijun Wu, Minxiao Wang:
High-Potency Models of LDoS Attack Against CUBIC + RED. IEEE Trans. Inf. Forensics Secur. 16: 4950-4965 (2021) - [c24]Zhijun Wu, Weihang Cui, Pan Gao:
Filtration method of DDoS attacks based on time-frequency analysis. BigDataSecurity 2021: 75-80 - [c23]Yanhan Wu, Xin Lu, Zhijun Wu:
Blockchain-Based Trust Model for Air Traffic Management Network. ICCCS 2021: 92-98 - [c22]Yan Wang, Haolin Ma, Meng Yue, Zhijun Wu:
Optimization of Airborne AFDX Transmission Delay Based on Revised RSP Method. ICCCS 2021: 1011-1016 - [c21]Pan Gao, Meng Yue, Zhijun Wu:
A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM. ICCCS 2021: 1063-1069 - [c20]Haolin Ma, Weihang Cui, Meng Yue, Zhijun Wu:
Modeling and Simulation on Dynamic Reliability of Multi-partition Software of IMA Based on TimeNET4.4. ICCCS 2021: 1088-1093 - [c19]Zhijun Wu, Jia Nie, Yue Yin, Hui Wang:
Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIM. EUC 2021: 72-78 - [c18]Xin Lu, Zhijun Wu:
ATMCC: Design of the Integration Architecture of Cloud Computing and Blockchain for Air Traffic Management. ISPA/BDCloud/SocialCom/SustainCom 2021: 37-43 - [c17]Zhijun Wu, Cheng Liang, Yuqi Li:
Intrusion Detection Method based on Deep Learning. ISPA/BDCloud/SocialCom/SustainCom 2021: 445-452 - [c16]Zhijun Wu, Junjun Guo, Weihang Cui:
Analysis of BBR's Non-queuing Optimal Model. ISPA/BDCloud/SocialCom/SustainCom 2021: 626-631 - [c15]Yanrong Lu, Meng Yue, Zhijun Wu:
Content Security over ICN based Smart Grid: A Cryptographic Solution. ISPA/BDCloud/SocialCom/SustainCom 2021: 785-791 - [c14]Meng Yue, Han Zheng, Wenzhi Feng, Zhijun Wu:
A Detection Method for I-CIFA Attack in NDN Network. SmartCom 2021: 364-373 - 2020
- [j35]Zhijun Wu, Xu Qing, Jingjie Wang, Meng Yue, Liang Liu:
Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network. IEEE Access 8: 17404-17418 (2020) - [j34]Zhijun Wu, Rong Li, Changliang Li:
Adaptive Speech Information Hiding Method Based on K-Means. IEEE Access 8: 23308-23316 (2020) - [j33]Zhijun Wu, Yun Zhang, Rusen Liu:
BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication. IEEE Access 8: 23759-23775 (2020) - [j32]Zhijun Wu, Wenjing Li, Liang Liu, Meng Yue:
Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey. IEEE Access 8: 43920-43943 (2020) - [j31]Gang Li, Zhijun Wu:
Information-Centric Networking Cache Robustness Strategy for System Wide Information Management. IEEE Access 8: 82432-82441 (2020) - [j30]Meng Yue, Huaiyuan Wang, Liang Liu, Zhijun Wu:
Detecting DoS Attacks Based on Multi-Features in SDN. IEEE Access 8: 104688-104700 (2020) - [j29]Zhijun Wu, Tong Shang, Anxin Guo:
Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey. IEEE Access 8: 122147-122167 (2020) - [j28]Liang Liu, Wenzhi Feng, Zhijun Wu, Meng Yue, Rudan Zhang:
The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN. IEEE Access 8: 128005-128017 (2020) - [j27]Zhijun Wu, Yun Zhang, Yiming Yang, Cheng Liang, Rusen Liu:
Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey. IEEE Access 8: 165444-165496 (2020) - [j26]Zhijun Wu, Wenzhi Feng, Meng Yue, Xinran Xu, Liang Liu:
Mitigation measures of collusive interest flooding attacks in named data networking. Comput. Secur. 97: 101971 (2020) - [j25]Liang Liu, Huaiyuan Wang, Zhijun Wu, Meng Yue:
The detection method of low-rate DoS attack based on multi-feature fusion. Digit. Commun. Networks 6(4): 504-513 (2020) - [j24]Zhijun Wu, Yun Zhang, Enzhong Xu:
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN. Future Internet 12(1): 15 (2020) - [j23]Zhijun Wu, Rong Li, Panpan Yin, Changliang Li:
Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec. Future Internet 12(1): 17 (2020) - [j22]Zhijun Wu, Bohua Cui:
A Hybrid SWIM Data Naming Scheme Based on TLC Structure. Future Internet 12(9): 142 (2020) - [j21]Zhijun Wu, Shan Tian, Lan Ma:
A 4D Trajectory Prediction Model Based on the BP Neural Network. J. Intell. Syst. 29(1): 1545-1557 (2020) - [j20]Zhijun Wu, Anxin Guo, Meng Yue, Liang Liu:
An ADS-B Message Authentication Method Based on Certificateless Short Signature. IEEE Trans. Aerosp. Electron. Syst. 56(3): 1742-1753 (2020)
2010 – 2019
- 2019
- [j19]Zhijun Wu, Changliang Li, Yongpeng Sha:
Speech Information Hiding Algorithm Based on Complete Binary Tree Dynamic Codebook Grouping. IEEE Access 7: 147513-147522 (2019) - [j18]Zhijun Wu, Qingbo Pan, Meng Yue, Liang Liu:
Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks. Comput. Networks 152: 64-77 (2019) - [j17]Zhijun Wu, Shengyan Zhou, Liang Liu, Jin Lei:
Research on SWIM Services Dynamic Migration Method. Future Internet 11(9): 187 (2019) - [j16]Meng Yue, Zhijun Wu, Jingjie Wang:
Detecting LDoS attack bursts based on queue distribution. IET Inf. Secur. 13(3): 285-292 (2019) - [j15]Zhijun Wu, Rusen Liu, Haijuan Cao:
ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System. IEEE Trans. Aerosp. Electron. Syst. 55(4): 1666-1682 (2019) - [c13]Zhijun Wu, Shan Tian, Wen Li, Meng Yue, Jian Wang:
A secret classified label control model based on the identity-based cryptography. IWCMC 2019: 96-101 - [c12]Lan Ma, Shan Tian, Yang Song, Zhijun Wu, Meng Yue:
An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation. SpaCCS Workshops 2019: 245-252 - [c11]Zhijun Wu, Enzhong Xu, Liang Liu, Meng Yue:
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN. TrustCom/BigDataSE 2019: 843-848 - 2018
- [j14]Meng Yue, Liang Liu, Zhijun Wu, Minxiao Wang:
Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network. Int. J. Commun. Syst. 31(2) (2018) - [j13]Xiaoyu Zhang, Zhijun Wu, Junwei Zhang, Jiusheng Chen:
An adaptive network traffic prediction approach for LDoS attacks detection. Int. J. Commun. Syst. 31(5) (2018) - [c10]Zhijun Wu, Shengyan Zhou, Meng Yue:
Research on SWIM Services Dynamic Migration Mechanism. DASC/PiCom/DataCom/CyberSciTech 2018: 1034-1039 - [c9]Zhijun Wu, Qingbo Pan, Meng Yue, Shaopu Ma:
An Approach of Security Protection for VSAT Network. TrustCom/BigDataSE 2018: 1511-1516 - 2017
- [j12]Xiaoyu Zhang, Zhijun Wu, Jiusheng Chen, Meng Yue:
An adaptive KPCA approach for detecting LDoS attack. Int. J. Commun. Syst. 30(4) (2017) - [c8]Zhijun Wu, Liang Liu, Changcan Yan, Jia Xu, Jin Lei:
The approach of SWIM data sharing based on multi-dimensional data encryption. SoftCOM 2017: 1-6 - 2016
- [j11]Meng Yue, Zhijun Wu, Minxiao Wang:
A New Exploration of FB-Shrew Attack. IEEE Commun. Lett. 20(10): 1987-1990 (2016) - [j10]Zhijun Wu, Ran Hu, Meng Yue:
Flow-oriented detection of low-rate denial of service attacks. Int. J. Commun. Syst. 29(1): 130-141 (2016) - [j9]Zhijun Wu, Liyuan Zhang, Meng Yue:
Low-Rate DoS Attacks Detection Based on Network Multifractal. IEEE Trans. Dependable Secur. Comput. 13(5): 559-567 (2016) - [c7]Zhijun Wu, Jun Jiang, Meng Yue:
A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks. CyberC 2016: 86-90 - 2015
- [j8]Zhijun Wu, Meng Yue, Douzhe Li, Ke Xie:
SEDP-based detection of low-rate DoS attacks. Int. J. Commun. Syst. 28(11): 1772-1788 (2015) - [c6]Haitao Zhang, Zhijun Wu:
The Research on Optimizing Deployment Strategy for Aviation SWIM Application Servers. ICIC (3) 2015: 598-606 - 2014
- [j7]Zhijun Wu, Guang Li, Meng Yue, Hualong Zeng:
DDoS: Flood vs. Shrew. J. Comput. 9(6): 1426-1435 (2014) - [j6]Zhijun Wu, Yi Cui, Meng Yue, Lan Ma, Lu Wang:
Cross-correlation Based Synchronization Mechanism of LDDoS Attacks. J. Networks 9(3): 604-611 (2014) - [j5]Lan Ma, Jia Xu, Zhijun Wu, Xiaoyu Zhang, Jiusheng Chen, Sarhan M. Musa:
The Security Evaluation of ATM Information System Based on Bayesian Regularization. J. Softw. 9(6): 1587-1594 (2014) - [j4]Meng Yue, Zhijun Wu, Jin Lei:
Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance. J. Softw. 9(7): 1854-1861 (2014) - 2013
- [j3]Zhijun Wu, Jin Lei, Di Yao, Minghua Wang, Sarhan M. Musa:
Chaos-based detection of LDoS attacks. J. Syst. Softw. 86(1): 211-221 (2013) - 2012
- [j2]Zhijun Wu, Haitao Zhang, Minghua Wang, Bao-song Pei:
MSABMS-based approach of detecting LDoS attack. Comput. Secur. 31(4): 402-417 (2012) - [j1]Zhijun Wu, Minghua Wang, Haitao Zhang, Xingchen Liu:
Correlation-based Detection of LDoS Attack. J. Softw. 7(10): 2341-2348 (2012) - [c5]Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang:
Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation. TrustCom 2012: 25-32
2000 – 2009
- 2007
- [c4]Lan Ma, Zhijun Wu, Yun Hu, Wei Yang:
An Information-Hiding Model for Secure Communication. ICIC (1) 2007: 1305-1314 - [c3]Lan Ma, Zhijun Wu, Wei Yang:
Approach to Hide Secret Speech Information in G.721 Scheme. ICIC (1) 2007: 1315-1324 - [c2]Zhijun Wu, Dong Zhang:
Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks. NPC 2007: 296-305 - 2006
- [c1]Zhijun Wu, Wei Yang:
G.711-Based Adaptive Speech Information Hiding Approach. ICIC (1) 2006: 1139-1144
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint