default search action
Zhaojun Gu
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Chunbo Liu, Liyin Wang, Zhikai Zhang, Chunmiao Xiang, Zhaojun Gu, Zhi Wang, Shuang Wang:
Unsupervised Intrusion Detection Based on Asymmetric Auto-Encoder Feature Extraction. IEICE Trans. Inf. Syst. 107(9): 1161-1173 (2024) - [c15]Jialiang Wang, Liuyang Nie, Zhaojun Gu, Huan Zhao:
Real-Time Detection for GPS Spoofing of Quad-Rotor Helicopter Based on Data Fusion. ICIC (9) 2024: 294-305 - [c14]Wenli Shang, Zifeng Huang, Zhaojun Gu, Zhong Cao, Lei Ding, Shuang Wang:
CWMAGAN-GP-Based Oversampling Technique for Intrusion Detection. ICIC (8) 2024: 318-330 - [c13]Zhaojun Gu, Huan Zhao, Jialiang Wang, Rui Tan, Liuyang Nie:
A Defense Strategy for UAV Swarm Against GNSS Spoofing Attacks Based on Game Model. ICIC (1) 2024: 383-395 - 2023
- [j7]Yan Xing, Yuexuan Zhu, Wei Fan, Yuxiang Zhang, Rui Huang, Zhaojun Gu, W. H. Ip, Kai-Leung Yung:
SpanMTL: a span-based multi-table labeling for aspect-oriented fine-grained opinion extraction. Soft Comput. 27(8): 4627-4637 (2023) - 2021
- [j6]Chao Liu, Zhaojun Gu, Jialiang Wang:
A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning. IEEE Access 9: 75729-75740 (2021) - [j5]Jingxian Zhou, Guangming Zheng, Baobao Zhang, Chunbo Liu, Zhaojun Gu:
An information real-time synchronisation system across different media based on position encoding for mobile computing. Int. J. Comput. Appl. Technol. 65(1): 45-54 (2021) - [j4]Shuang Wang, Lei Ding, He Sui, Zhaojun Gu:
Cybersecurity risk assessment method of ICS based on attack-defense tree model. J. Intell. Fuzzy Syst. 40(6): 10475-10488 (2021) - [j3]Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li:
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor. Mob. Networks Appl. 26(4): 1668-1685 (2021) - 2020
- [j2]Chunbo Liu, Lanlan Pan, Zhaojun Gu, Jialiang Wang, Yitong Ren, Zhi Wang:
Valid Probabilistic Anomaly Detection Models for System Logs. Wirel. Commun. Mob. Comput. 2020: 8827185:1-8827185:12 (2020) - [j1]Chunbo Liu, Yitong Ren, Mengmeng Liang, Zhaojun Gu, Jialiang Wang, Lanlan Pan, Zhi Wang:
Detecting Overlapping Data in System Logs Based on Ensemble Learning Method. Wirel. Commun. Mob. Comput. 2020: 8853971:1-8853971:8 (2020) - [c12]Lanlan Pan, Zhaojun Gu, Yitong Ren, Chunbo Liu, Zhi Wang:
An Anomaly Detection Method for System Logs Using Venn-Abers Predictors. DSC 2020: 362-368 - [c11]Yitong Ren, Zhaojun Gu, Lanlan Pan, Chunbo Liu:
The Class Overlap Model for System Log Anomaly Detection Based on Ensemble Learning. DSC 2020: 369-374
2010 – 2019
- 2019
- [c10]Jian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu:
Overview of IoT Security Architecture. DSC 2019: 338-345 - [c9]Jian Zhang, Huaijian Chen, Liangyi Gong, Jing Cao, Zhaojun Gu:
The Current Research of IoT Security. DSC 2019: 346-353 - [c8]Hang Xu, Jing Cao, Jian Zhang, Liangyi Gong, Zhaojun Gu:
A Survey: Cloud Data Security Based on Blockchain Technology. DSC 2019: 618-624 - [c7]Jian Zhang, Wenzhen Li, Liangyi Gong, Zhaojun Gu, Jeffrey Wu:
Targeted Malicious Email Detection Using Hypervisor-Based Dynamic Analysis and Ensemble Learning. GLOBECOM 2019: 1-6 - [c6]Jing Ya, Tingwen Liu, Panpan Zhang, Jinqiao Shi, Li Guo, Zhaojun Gu:
NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples. IJCNN 2019: 1-7 - [c5]Panpan Zhang, Jing Ya, Tingwen Liu, Quangang Li, Jinqiao Shi, Zhaojun Gu:
iMCircle: Automatic Mining of Indicators of Compromise from the Web. ISCC 2019: 1-6 - 2018
- [c4]Jian Zhang, Luxin Zheng, Liangyi Gong, Zhaojun Gu:
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation. DSC 2018: 910-916 - [c3]Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Xiaojiang Du:
Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor. GLOBECOM 2018: 1-6 - [c2]Pin Lv, Jing Ya, Tingwen Liu, Jinqiao Shi, Binxing Fang, Zhaojun Gu:
You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse. ICCS (1) 2018: 221-233 - [c1]Jian Zhang, Wenxu Wang, Liangyi Gong, Zhaojun Gu:
CloudI: Cloud Security based on Cloud Introspection. ICMLC 2018: 341-346
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint