​
Login / Signup
Zhijie Fan
ORCID
Publication Activity (10 Years)
Years Active: 2011-2023
Publications (10 Years): 14
Top Topics
Situation Assessment
Cyber Security
Data Access
Graph Embedding
Top Venues
IEEE Access
Int. J. Inf. Secur. Priv.
CoRR
Future Gener. Comput. Syst.
</>
Publications
</>
Zhijie Fan
,
Zhiwei Cao
,
Xin Li
,
Chunmei Wang
,
Bo Jin
,
Qianjin Tang
Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Yao Xiao
,
Zhijie Fan
,
Zenan Ling
,
Rujing Xiong
,
Tiebin Mi
,
Robert Caiming Qiu
Codebook Configuration for 1-bit RIS-aided Systems Based on Implicit Neural Representations.
CoRR
(2023)
Ping Zhao
,
Zhijie Fan
,
Zhiwei Cao
,
Xin Li
Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Yichao Zhang
,
Huangxin Zhuang
,
Tiantian Liu
,
Bowei Chen
,
Zhiwei Cao
,
Yun Fu
,
Zhijie Fan
,
Guanrong Chen
A Bayesian Graph Embedding Model for Link-Based Classification Problems.
IEEE Trans. Netw. Sci. Eng.
9 (2) (2022)
Zhijie Fan
,
Chengxiang Tan
,
Xin Li
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps.
Int. J. Inf. Comput. Secur.
14 (3/4) (2021)
Weili Han
,
Dingjie Chen
,
Jun Pang
,
Kai Wang
,
Chen Chen
,
Dapeng Huang
,
Zhijie Fan
Temporal Networks Based Industry Identification for Bitcoin Users.
WASA (1)
(2021)
Zhijie Fan
,
Zhiwei Cao
Method of Network Intrusion Discovery Based on Convolutional Long-Short Term Memory Network and Implementation in VSS.
IEEE Access
9 (2021)
Ya Xiao
,
Chengxiang Tan
,
Zhijie Fan
,
Qian Xu
,
Wenye Zhu
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
AAAI
(2020)
Ya Xiao
,
Zhijie Fan
,
Amiya Nayak
,
Chengxiang Tan
Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng.
20 (9) (2019)
Qian Xu
,
Chengxiang Tan
,
Wenye Zhu
,
Ya Xiao
,
Zhijie Fan
,
Fujia Cheng
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst.
97 (2019)
Zhijie Fan
,
Ya Xiao
,
Amiya Nayak
,
Chengxiang Tan
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl.
12 (2) (2019)
Ya Xiao
,
Zhijie Fan
,
Chengxiang Tan
,
Qian Xu
,
Wenye Zhu
,
Fujia Cheng
Sense-Based Topic Word Embedding Model for Item Recommendation.
IEEE Access
7 (2019)
Qian Xu
,
Chengxiang Tan
,
Zhijie Fan
,
Wenye Zhu
,
Ya Xiao
,
Fujia Cheng
Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access
6 (2018)
Qian Xu
,
Chengxiang Tan
,
Zhijie Fan
,
Wenye Zhu
,
Ya Xiao
,
Fujia Cheng
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors
18 (5) (2018)
Sujuan Zhang
,
Yanli Zhang
,
Zhijie Fan
Study of Flow Control System Model Based on Bypass Protocol Analysis.
ICICA (1)
(2011)