default search action
Lejun Zhang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Lejun Zhang, Chendong Zhu, Zhihong Tian, Yuan Liu, Jing Qiu, Shen Su, Guangxia Xu, Ran Guo:
ICRB: An improved consensus-based redactable blockchain considering contextual consistency. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j54]Hai Lu, Yan Zhu, Cecilia E. Chen, Rongquan Feng, Lejun Zhang, Di Ma:
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing. IEEE Internet Things J. 11(2): 1893-1909 (2024) - [j53]Guanglai Guo, Yan Zhu, Cecilia E. Chen, Lejun Zhang, Rongquan Feng, Di Ma:
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT. IEEE Internet Things J. 11(7): 11353-11367 (2024) - [j52]Lingfeng Qu, Mohan Li, Yanbin Sun, Shen Su, Yuan Liu, Lejun Zhang:
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101914 (2024) - [j51]Yuan Liu, Yanan Zhang, Shen Su, Lejun Zhang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy. IEEE J. Sel. Areas Commun. 42(4): 880-892 (2024) - [j50]Yue Cong, Yuxiang Zeng, Jing Qiu, Zhongyang Fang, Lejun Zhang, Du Cheng, Jia Liu, Zhihong Tian:
FedGA: A greedy approach to enhance federated learning with Non-IID data. Knowl. Based Syst. 301: 112201 (2024) - [j49]Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - [j48]Lejun Zhang, Yuan Li, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen, Zhihong Tian:
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS. J. Signal Process. Syst. 96(3): 215-237 (2024) - [c24]Yuan Gao, Lejun Zhang, Fei Xu, Tseren-Onolt Ishdorj, Yansen Su:
An Entity Alignment Model for Echinococcosis Knowledge Graph. ICIC (LNAI 6) 2024: 62-74 - 2023
- [j47]Ruyu Liu, Zhengzhe Liu, Jiaming Lu, Guodao Zhang, Zhigui Zuo, Bo Sun, Jianhua Zhang, Weiguo Sheng, Ran Guo, Lejun Zhang, Xiaozhen Hua:
Sparse-to-dense coarse-to-fine depth estimation for colonoscopy. Comput. Biol. Medicine 160: 106983 (2023) - [j46]Feixiang Zhao, Mingzhe Liu, Zhihong Gao, Xin Jiang, Ruili Wang, Lejun Zhang:
Dual-scale similarity-guided cycle generative adversarial network for unsupervised low-dose CT denoising. Comput. Biol. Medicine 161: 107029 (2023) - [j45]Zhiqing Chen, Li Xinxian, Ran Guo, Lejun Zhang, Sami Dhahbi, Sami Bourouis, Lei Liu, Xianchuan Wang:
Dispersed differential hunger games search for high dimensional gene data feature selection. Comput. Biol. Medicine 163: 107197 (2023) - [j44]Jing Qiu, Yang Lin, Hao Chen, Du Cheng, Muhammad Shafiq, Lejun Zhang, Zhihong Tian:
Diverse classifiers with label dependencies for long-tail relation extraction in big data. Comput. Electr. Eng. 110: 108812 (2023) - [j43]Zhujun Wang, Lejun Zhang, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian:
A covert channel over blockchain based on label tree without long waiting times. Comput. Networks 232: 109843 (2023) - [j42]Guangxia Xu, Zhaojian Zhou, Jingnan Dong, Lejun Zhang, Xiaoling Song:
A Blockchain-Based Federated Learning Scheme for Data Sharing in Industrial Internet of Things. IEEE Internet Things J. 10(24): 21467-21478 (2023) - [j41]Guanglai Guo, Yan Zhu, E. Chen, Ruyun Yu, Lejun Zhang, Kewei Lv, Rongquan Feng:
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining. IEEE Trans. Reliab. 72(4): 1308-1323 (2023) - [j40]Songwei Zhang, Fu Xiao, Lejun Zhang, Fengbiao Zan, Tie Qiu:
A Quantum-Behaved Heterogeneous Topology Optimization Model For Optical Wireless Communication Networks. IEEE Wirel. Commun. 30(5): 68-73 (2023) - [j39]Ximing Chen, Jing Qiu, Fasheng Zhou, Hui Lu, Lejun Zhang, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning. IEEE Wirel. Commun. 30(5): 96-103 (2023) - [c23]Zhongyuan Bao, Lejun Zhang, Zhengyu Lu:
Research on Named Entity Recognition Based on ERNIE-BiLSTM-CRF. CIPAE 2023: 523-527 - [c22]Xinwei Yang, Ning Chen, Songwei Zhang, Xiaobo Zhou, Lejun Zhang, Tie Qiu:
An Evolutionary Reinforcement Learning Scheme for IoT Robustness. CSCWD 2023: 756-761 - [c21]Dayu Tan, Yang Yang, Minglu Wang, Pengpeng Wang, Lejun Zhang, Tseren-Onolt Ishdorj, Yansen Su:
Extraction of Relationship Between Esophageal Cancer and Biomolecules Based on BioBERT. ICIC (3) 2023: 106-118 - 2022
- [j38]Lejun Zhang, Jinlong Wang, Weizheng Wang, Zilong Jin, Yansen Su, Huiling Chen:
Smart contract vulnerability detection combined with multi-objective detection. Comput. Networks 217: 109289 (2022) - [j37]Jiao Hu, Ali Asghar Heidari, Lejun Zhang, Xiao Xue, Wenyong Gui, Huiling Chen, Zhifang Pan:
Chaotic diffusion-limited aggregation enhanced grey wolf optimizer: Insights, analysis, binarization, and feature selection. Int. J. Intell. Syst. 37(8): 4864-4927 (2022) - [j36]Jinjin Chi, Bilin Wang, Huiling Chen, Lejun Zhang, Ximing Li, Jihong Ouyang:
Approximate continuous optimal transport with copulas. Int. J. Intell. Syst. 37(8): 5354-5380 (2022) - [j35]Lejun Zhang, Yanfei Zou, Muhammad Hassam Yousuf, Weizheng Wang, Zilong Jin, Yansen Su, Seokhoon Kim:
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment. KSII Trans. Internet Inf. Syst. 16(5): 1634-1652 (2022) - [j34]Xinchang Zhang, Changsen Xia, Tinghuai Ma, Lejun Zhang, Zilong Jin:
Optimizing Energy-Latency Tradeoff for Computation Offloading in SDIN-Enabled MEC-based IIoT. KSII Trans. Internet Inf. Syst. 16(12): 4081-4098 (2022) - [j33]Lejun Zhang, Weijie Chen, Weizheng Wang, Zilong Jin, Chunhui Zhao, Zhennao Cai, Huiling Chen:
CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model. Sensors 22(9): 3577 (2022) - [j32]Lejun Zhang, Jinlong Wang, Weizheng Wang, Zilong Jin, Chunhui Zhao, Zhennao Cai, Huiling Chen:
A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning. Sensors 22(9): 3581 (2022) - [j31]Lejun Zhang, Yuan Li, Tianxing Jin, Weizheng Wang, Zilong Jin, Chunhui Zhao, Zhennao Cai, Huiling Chen:
SPCBIG-EC: A Robust Serial Hybrid Model for Smart Contract Vulnerability Detection. Sensors 22(12): 4621 (2022) - [j30]Lejun Zhang, Zhijie Zhang, Weizheng Wang, Zilong Jin, Yansen Su, Huiling Chen:
Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment. IEEE Syst. J. 16(2): 2822-2833 (2022) - [j29]Fawad Masood, Junaid Masood, Lejun Zhang, Sajjad Shaukat Jamal, Wadii Boulila, Sadaqat ur Rehman, Fadia Ali Khan, Jawad Ahmad:
A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Comput. 26(16): 7461-7477 (2022) - [j28]Tong Wang, Azhar Hussain, Lejun Zhang, Chen Zhao:
Collaborative Edge Computing for Social Internet of Vehicles to Alleviate Traffic Congestion. IEEE Trans. Comput. Soc. Syst. 9(1): 184-196 (2022) - [j27]Zilong Jin, Chengbo Zhang, Yuanfeng Jin, Lejun Zhang, Jian Su:
A Resource Allocation Scheme for Joint Optimizing Energy Consumption and Delay in Collaborative Edge Computing-Based Industrial IoT. IEEE Trans. Ind. Informatics 18(9): 6236-6243 (2022) - [j26]Yuhan Chai, Jing Qiu, Lihua Yin, Lejun Zhang, Brij B. Gupta, Zhihong Tian:
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification. IEEE Trans. Netw. Serv. Manag. 19(4): 4248-4261 (2022) - [j25]Jun Yu, Jing Zhao, Huili Shao, Yu Lu, Yongjun He, Lejun Zhang:
Illumination compensation for microscope images based on illumination difference estimation. Vis. Comput. 38(5): 1775-1786 (2022) - [c20]Weiwei Wang, Liting Wei, Yun Li, Yi Zhu, Bin Li, Lejun Zhang:
Attentional Meta-path Contrastive Graph Convolutional Networks for Knowledge Concept Recommendation. CBD 2022: 200-205 - [c19]Chen Guo, Yang Lin, Hao Chen, Haiyang Yu, Chengwei Zhu, Lejun Zhang, Jing Qiu:
Modeling Dynamic Entities in Temporal Knowledge Graphs. CCIS 2022: 480-484 - [c18]Yuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities. SmartCom 2022: 350-359 - [c17]Weijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
Smart Contract Vulnerability Detection Model Based on Siamese Network. SmartCom 2022: 639-648 - 2021
- [j24]Lejun Zhang, Yanfei Zou, Weizheng Wang, Zilong Jin, Yansen Su, Huiling Chen:
Resource allocation and trust computing for blockchain-enabled edge computing system. Comput. Secur. 105: 102249 (2021) - [j23]Xueqing Wang, Shuang Liu, Lejun Zhang:
Highway Cost Prediction Based on LSSVM Optimized by Intial Parameters. Comput. Syst. Sci. Eng. 36(1): 259-269 (2021) - [j22]Caiyang Yu, Ali Asghar Heidari, Xiao Xue, Lejun Zhang, Huiling Chen, Weibin Chen:
Boosting quantum rotation gate embedded slime mould algorithm. Expert Syst. Appl. 181: 115082 (2021) - [j21]Lejun Zhang, Minghui Peng, Weizheng Wang, Zilong Jin, Yansen Su, Huiling Chen:
Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j20]Lejun Zhang, Zhijie Zhang, Zilong Jin, Yansen Su, Zhuzhu Wang:
An approach of covert communication based on the Ethereum whisper protocol in blockchain. Int. J. Intell. Syst. 36(2): 962-996 (2021) - [j19]Tinghuai Ma, Hongmei Wang, Lejun Zhang, Yuan Tian, Najla Al-Nabhan:
Graph classification based on structural features of significant nodes and spatial convolutional neural networks. Neurocomputing 423: 639-650 (2021) - [j18]Zilong Jin, Chengbo Zhang, Guanzhe Zhao, Yuanfeng Jin, Lejun Zhang:
A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems. KSII Trans. Internet Inf. Syst. 15(2): 383-403 (2021) - [j17]Weizheng Wang, Huakun Huang, Lejun Zhang, Chunhua Su:
Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw. Appl. 14(5): 2681-2693 (2021) - [j16]Xiao Xue, Shuai Huangfu, Lejun Zhang, Shufang Wang:
Research on Escaping the Big-Data Traps in O2O Service Recommendation Strategy. IEEE Trans. Big Data 7(1): 199-213 (2021) - [c16]Yuying Yang, Xiao Xue, Fozhi Hou, Shizhan Chen, Zhiyong Feng, Lejun Zhang:
Alleviating the Matthew Effect in O2O Service Matching Process. ICWS 2021: 173-178 - 2020
- [j15]Hao Chen, Ali Asghar Heidari, Xuehua Zhao, Lejun Zhang, Huiling Chen:
Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies. Expert Syst. Appl. 144: 113113 (2020) - [j14]Kunliang Yu, Liquan Chen, Yu Wang, Jinguang Han, Lejun Zhang:
Reversible data hiding in encrypted images for coding channel based on adaptive steganography. IET Image Process. 14(16): 4229-4239 (2020) - [j13]Zilong Jin, Yuxin Xu, Xiaorui Zhang, Jin Wang, Lejun Zhang:
Trajectory-prediction based relay scheme for time-sensitive data communication in VANETs. KSII Trans. Internet Inf. Syst. 14(8): 3399-3419 (2020) - [j12]Yuchang Mo, Liudong Xing, Lejun Zhang, Shaobin Cai:
Performability analysis of multi-state sliding window systems. Reliab. Eng. Syst. Saf. 202: 107003 (2020) - [j11]Sa Math, Lejun Zhang, Seokhoon Kim, Intae Ryoo:
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment. Secur. Commun. Networks 2020: 8881640:1-8881640:11 (2020) - [j10]Tinghuai Ma, Raeed Al-Sabri, Lejun Zhang, Bockarie Daniel Marah, Najla Al-Nabhan:
The Impact of Weighting Schemes and Stemming Process on Topic Modeling of Arabic Long and Short Texts. ACM Trans. Asian Low Resour. Lang. Inf. Process. 19(6): 81:1-81:23 (2020) - [c15]Zhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong Jin, Tinghuai Ma, Huiling Chen, Guangquan Xu:
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol. FCS 2020: 215-230 - [c14]Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su:
BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid. TrustCom 2020: 1332-1338 - [i1]Xiao Xue, Deyu Zhou, Yaodan Guo, Zhiyong Feng, Lejun Zhang, Lin Meng:
Value driven Analysis Framework of Service Ecosystem Evolution Mechanism. CoRR abs/2008.01055 (2020)
2010 – 2019
- 2019
- [j9]Zilong Jin, Kan Yao, Ben Lee, Jinsung Cho, Lejun Zhang:
Channel Status Learning for Cooperative Spectrum Sensing in Energy-Restricted Cognitive Radio Networks. IEEE Access 7: 64946-64954 (2019) - [j8]Lejun Zhang, Xiaoyan Hu, Waqas Rasheed, Tianwen Huang, Chunhui Zhao:
An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography. IEEE Access 7: 97187-97195 (2019) - [j7]Donghai Guan, Tingting Wang, Weiwei Yuan, Lejun Zhang, Yuan Tian, Mohammed Al-Dhelaan, Abdullah Al-Dhelaan:
SWNF: Sign Prediction of Weak Ties Based on the Network Features. IEEE Access 7: 102054-102063 (2019) - [j6]Lejun Zhang, Tianwen Huang, Waqas Rasheed, Xiaoyan Hu, Chunhui Zhao:
An Enlarging-the-Capacity Packet Sorting Covert Channel. IEEE Access 7: 145634-145640 (2019) - [j5]Xiao Xue, Shufang Wang, Lejun Zhang, Zhiyong Feng:
Evaluating of dynamic service matching strategy for social manufacturing in cloud environment. Future Gener. Comput. Syst. 91: 311-326 (2019) - [j4]Xue Xiao, Shufang Wang, Lejun Zhang, Cheng-Zhi Qin:
Complexity analysis of manufacturing service ecosystem: a mapping-based computational experiment approach. Int. J. Prod. Res. 57(2): 357-378 (2019) - [j3]Xiao Xue, Shufang Wang, Lejun Zhang, Zhiyong Feng, Yaodan Guo:
Social Learning Evolution (SLE): Computational Experiment-Based Modeling Framework of Social Manufacturing. IEEE Trans. Ind. Informatics 15(6): 3343-3355 (2019) - 2018
- [j2]Francisco J. Testa, Cecilia Villanueva, David R. Cooke, Lejun Zhang:
Lithological and Hydrothermal Alteration Mapping of Epithermal, Porphyry and Tourmaline Breccia Districts in the Argentine Andes Using ASTER Imagery. Remote. Sens. 10(2): 203 (2018) - [j1]Zilong Jin, Yu Qiao, Alex Liu, Lejun Zhang:
EESS: An Energy-Efficient Spectrum Sensing Method by Optimizing Spectrum Sensing Node in Cognitive Radio Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 9469106:1-9469106:11 (2018) - [c13]Tianwen Huang, Lejun Zhang, Xiaoyan Hu, Xiaoying Lei:
A Data Validation Method Based on IP Covert Channel Packet Ordering. CIS 2018: 223-227 - [c12]Xiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei:
A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding. CIS 2018: 228-232 - [c11]Zhuoshi Yang, Yanxiang Wang, Lejun Zhang, Yiran Shen:
Indoor Interference Classification Based on WiFi Channel State Information. SpaCCS 2018: 136-145 - 2017
- [c10]Lejun Zhang, Weijie Zhao, Chunhui Zhao:
Research on Information Propagation Method Based on Individual User Characteristics. CIS 2017: 442-446 - 2012
- [c9]Lei Xia, Lejun Zhang, Jianpei Zhang, Jing Yang, Lin Guo:
An Improved Community Detection Algorithm Based on Local Information in Social Networks. CIS 2012: 288-292 - 2010
- [c8]Lin Guo, Zhi-hai Yu, Hai-Bo Li, Lejun Zhang, Jianpei Zhang:
A remote data disaster recovery system model based on Undo. NCM 2010: 123-128
2000 – 2009
- 2009
- [c7]Lin Guo, Hai-Bo Li, Zhi-hai Yu, Lejun Zhang, Jianpei Zhang:
A Novel Security Network Storage System Based on Internet. NCM 2009: 1123-1127 - [c6]Lejun Zhang, Jianpei Zhang, Lin Guo, Hua Huang, Yongtian Yang, Pengfei Sun:
Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network. NCM 2009: 1153-1156 - 2008
- [c5]Lin Guo, Hua Huang, Lejun Zhang, Yongtian Yang, Jianpei Zhang:
Research on Disaster Tolerance System Based on Network Dataflow. CIS (1) 2008: 355-360 - 2007
- [c4]Lejun Zhang, Lin Guo, Wu Yang, Wei Wang, Yongtian Yang:
An Efficient Survivability Hierarchy Analysis Model for Networked Information System. CIS 2007: 759-762 - [c3]Dapeng Man, Wu Yang, Yongtian Yang, Wei Wang, Lejun Zhang:
A Quantitative Evaluation Model for Network Security. CIS 2007: 773-777 - [c2]Yu-E Zheng, Huadong Ma, Lejun Zhang:
A Temporal Logic Based Grid Workflow Model and Scheduling Scheme. GCC 2007: 338-345 - [c1]Lejun Zhang, Wu Yang, Wei Wang, Lin Guo, Yongtian Yang:
A Method to Enhance Service Survivability Based on Autonomous Configuration. IMSCCS 2007: 387-390
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint