Personal information

No personal information available

Activities

Works (19)

An intrusion response approach based on multi-objective optimization and deep Q network for industrial control systems

Expert Systems with Applications
2025-05 | Journal article
Contributors: Yiqun Yue; Dawei Zhao; Yang Zhou; Lijuan Xu; Yongwei Tang; Haipeng Peng
Source: check_circle
Crossref

AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE

Computers & Security
2025-03 | Journal article
Contributors: Lijuan Xu; ZiCheng Zhao; Dawei Zhao; Xin Li; XiYu Lu; DingYu Yan
Source: check_circle
Crossref

DAN: Neural network based on dual attention for anomaly detection in ICS

Expert Systems with Applications
2025-03 | Journal article
Contributors: Lijuan Xu; Bailing Wang; Dawei Zhao; Xiaoming Wu
Source: check_circle
Crossref

Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation

IEEE Transactions on Sustainable Computing
2024 | Journal article
Contributors: Lijuan Xu; Ziyu Han; Dawei Zhao; Xin Li; Fuqiang Yu; Chuan Chen
Source: check_circle
Crossref

Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter

IEEE Transactions on Computational Social Systems
2024 | Journal article
Contributors: Lijuan Xu; Ziyu Han; Zhen Wang; Dawei Zhao
Source: check_circle
Crossref

TFHSVul:A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IOT

IEEE Internet of Things Journal
2024 | Journal article
Contributors: Lijuan Xu; Baolong An; Xin Li; Dawei Zhao; Haipeng Peng; Weizhao Song; Fenghua Tong; Xiaohui Han
Source: check_circle
Crossref

Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud

IEEE Transactions on Services Computing
2024 | Journal article
Contributors: Xinzhe Zhang; Lei Wu; Zhien Liu; Hao Wang; Lijuan Xu; Songnian Zhang; Rongxing Lu
Source: check_circle
Crossref

Intelligent Detection and Analysis Techniques for Botnet Malicious Traffic

2024-06-07 | Conference paper
Contributors: Yunxiao Wang; Yansheng Qu; Lin Sang; Bo Cui; Lijuan Xu; Xin Li
Source: check_circle
Crossref

Multidimensional data fusion detection method based on time series data model

2024-06-07 | Conference paper
Contributors: Lina Zhao; Ming Li; Jinchao Ni; Xue Liu; Lijuan Xu; Zhiang Yao
Source: check_circle
Crossref

Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems

Computers & Security
2024-05 | Journal article
Contributors: Yaru Liu; Lijuan Xu; Shumian Yang; Dawei Zhao; Xin Li
Source: check_circle
Crossref

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things

Expert Systems with Applications
2023-12 | Journal article
Contributors: Xuecai Feng; Hui Xia; Shuo Xu; Lijuan Xu; Rui Zhang
Source: check_circle
Crossref

A dynamic adaptive iterative clustered federated learning scheme

Knowledge-Based Systems
2023-09 | Journal article
Contributors: Run Du; Shuo Xu; Rui Zhang; Lijuan Xu; Hui Xia
Source: check_circle
Crossref

ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT

IEEE Internet of Things Journal
2023-09-15 | Journal article
Contributors: Lijuan Xu; Xiao Ding; Haipeng Peng; Dawei Zhao; Xin Li
Source: check_circle
Crossref

Image-Based Malware Classification Method with the AlexNet Convolutional Neural Network Model

Security and Communication Networks
2023-04-17 | Journal article
Contributors: Zilin Zhao; Dawei Zhao; Shumian Yang; Lijuan Xu; Tom Chen
Source: check_circle
Crossref

A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal–Spatial Data

Entropy
2023-01 | Journal article | Author
Contributors: Lijuan Xu; Xiao Ding; dawei zhao; Alex X. Liu; Zhen Zhang
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph

IEEE Transactions on Network Science and Engineering
2022-03-01 | Journal article
Contributors: Lijuan Xu; Bailing Wang; Xiaoming Wu; Dawei Zhao; Lei Zhang; Zhen Wang
Source: check_circle
Crossref

MultiGModeAttackDetectionandEvaluationofAbnormalStatesforIndustrial ControlNetwor

Journal of Computer Research and Development
2021-11-01 | Journal article
Source: Self-asserted source
Lijuan Xu

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints

Computer & Security
2020-02-04 | Journal article
Source: Self-asserted source
Lijuan Xu

Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-duration Evolution Graph

IEEE Transactions on Network Science and Engineering Information
Dataset
Source: Self-asserted source
Lijuan Xu