default search action
Lijuan Xu 0001
Person information
- affiliation: Qilu University of Technology, Shandong Academy of Sciences, National Supercomputer Center in Jinan, China
- affiliation (PhD 2023): Harbin Institute of Technology, School of Computer Science and Technology, China
Other persons with the same name
- Lijuan Xu — disambiguation page
- Lijuan Xu 0002 — Xidian University, School of the Telecommunication Engineering, Xi'an, China
- Lijuan Xu 0003 — Sichuan Tourism University, School of Economics and Management, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Lijuan Xu, Zicheng Zhao, Dawei Zhao, Xin Li, Xiyu Lu, Dingyu Yan:
AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE. Comput. Secur. 150: 104263 (2025) - [j22]Lijuan Xu, Bailing Wang, Dawei Zhao, Xiaoming Wu:
DAN: Neural network based on dual attention for anomaly detection in ICS. Expert Syst. Appl. 263: 125766 (2025) - [j21]Yingqi Zhang, Hui Xia, Shuo Xu, Xiangxiang Wang, Lijuan Xu:
AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices. Future Gener. Comput. Syst. 165: 107610 (2025) - [j20]Lijuan Xu, Baolong An, Xin Li, Dawei Zhao, Haipeng Peng, Weizhao Song, Fenghua Tong, Xiaohui Han:
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT. IEEE Internet Things J. 12(1): 30-44 (2025) - 2024
- [j19]Yaru Liu, Lijuan Xu, Shumian Yang, Dawei Zhao, Xin Li:
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems. Comput. Secur. 140: 103750 (2024) - [j18]Shuo Xu, Hui Xia, Lijuan Xu, Rui Zhang, Chunqiang Hu:
MIGAN: A Privacy Leakage Evaluation Scheme for CIoT-Based Federated Learning Users. IEEE Trans. Consumer Electron. 70(1): 3098-3110 (2024) - [j17]Lijuan Xu, Ziyu Han, Zhen Wang, Dawei Zhao:
Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter. IEEE Trans. Comput. Soc. Syst. 11(3): 4149-4162 (2024) - [j16]Xinzhe Zhang, Lei Wu, Zhien Liu, Hao Wang, Lijuan Xu, Songnian Zhang, Rongxing Lu:
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud. IEEE Trans. Serv. Comput. 17(6): 4397-4410 (2024) - [j15]Lijuan Xu, Ziyu Han, Dawei Zhao, Xin Li, Fuqiang Yu, Chuan Chen:
Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation. IEEE Trans. Sustain. Comput. 9(6): 913-924 (2024) - [c8]Lijuan Xu, Zhiang Yao, Dawei Zhao, Xin Li:
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System. CSCWD 2024: 359-364 - 2023
- [j14]Chaofan Tang, Lijuan Xu, Bo Yang, Yongwei Tang, Dawei Zhao:
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System. Comput. Secur. 127: 103094 (2023) - [j13]Lijuan Xu, Xiao Ding, Dawei Zhao, Alex X. Liu, Zhen Zhang:
A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data. Entropy 25(2): 180 (2023) - [j12]Xue-cai Feng, Hui Xia, Shuo Xu, Lijuan Xu, Rui Zhang:
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things. Expert Syst. Appl. 234: 120965 (2023) - [j11]Lijuan Xu, Xiao Ding, Haipeng Peng, Dawei Zhao, Xin Li:
ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT. IEEE Internet Things J. 10(18): 15931-15942 (2023) - [j10]Run Du, Shuo Xu, Rui Zhang, Lijuan Xu, Hui Xia:
A dynamic adaptive iterative clustered federated learning scheme. Knowl. Based Syst. 276: 110741 (2023) - [c7]Chenyu Sun, Dawei Zhao, Shumian Yang, Lijuan Xu, Xin Li:
A Malicious Code Family Classification Method Based on RGB Images and Lightweight Model. ICONIP (14) 2023: 149-165 - 2022
- [j9]Xin Gao, Yang Zhou, Lijuan Xu, Dawei Zhao:
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization. Entropy 24(12): 1727 (2022) - [j8]Fumin Yi, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, Dawei Zhao:
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks. Sensors 22(19): 7413 (2022) - [j7]Lijuan Xu, Bailing Wang, Xiaoming Wu, Dawei Zhao, Lei Zhang, Zhen Wang:
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph. IEEE Trans. Netw. Sci. Eng. 9(2): 703-715 (2022) - 2021
- [j6]Dawei Zhao, Gaoxi Xiao, Zhen Wang, Lianhai Wang, Lijuan Xu:
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification. IEEE Trans. Syst. Man Cybern. Syst. 51(12): 7823-7837 (2021) - 2020
- [j5]Ling Mi, Chuan Chen, Baolin Qiu, Lijuan Xu, Lei Zhang:
Fixed-Time Synchronization Analysis for Complex-Valued Neural Networks via a New Fixed-Time Stability Theorem. IEEE Access 8: 172799-172807 (2020) - [j4]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang:
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints. Comput. Secur. 92: 101749 (2020) - [j3]Dawei Zhao, Lijuan Xu, Shao-Meng Qin, Guangqi Liu, Zhen Wang:
The Feedback Vertex Set Problem of Multiplex Networks. IEEE Trans. Circuits Syst. 67-II(12): 3492-3496 (2020)
2010 – 2019
- 2019
- [c6]Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. NaNA 2019: 302-308 - 2018
- [j2]Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. Secur. Commun. Networks 2018: 9410278:1-9410278:16 (2018) - 2017
- [c5]Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. ICCCS (1) 2017: 143-152 - 2016
- [c4]Xiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang:
Social Media account linkage using user-generated geo-location data. ISI 2016: 157-162 - 2015
- [j1]Dawei Zhao, Lianhai Wang, Lijuan Xu, Zhen Wang:
Finding another yourself in multiplex networks. Appl. Math. Comput. 266: 599-604 (2015) - 2013
- [c3]Lijuan Xu, Lianhai Wang:
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File. CIS 2013: 716-720 - 2010
- [c2]Lianhai Wang, Lijuan Xu, Shuhui Zhang:
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. e-Forensics 2010: 90-98 - [c1]Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong:
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System. e-Forensics 2010: 122-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint