Wang, Longjuan
100  results:
Search for persons X
?
1

Exploring How Cybersecurity Competitions Can Help Improve S..:

, In: Lecture Notes in Electrical Engineering; Proceedings of Innovative Computing 2024, Vol. 4,
Wang, Longjuan ; Zhou, Xiaoyi ; Qin, Xiaoli. - p. 168-175 , 2024
 
?
3

Application Analysis of Blockchain Technology for 6G Networ:

, In: Lecture Notes in Electrical Engineering; Innovative Computing Vol 2 - Emerging Topics in Future Internet,
Jia, Dongfang ; Wang, Longjuan - p. 698-706 , 2023
 
?
4

Research on the IoT and AI Under the Background of Blockcha..:

, In: Lecture Notes in Electrical Engineering; Innovative Computing Vol 2 - Emerging Topics in Future Internet,
Jia, Dongfang ; Wang, Longjuan - p. 647-656 , 2023
 
?
5

Model Similarity-Based Defense Scheme Against Backdoor Atta..:

, In: Lecture Notes in Electrical Engineering; Frontier Computing,
Su, Long ; Ye, Jun ; Wang, Longjuan - p. 1957-1961 , 2023
 
?
6

Construction of Chinese Healthy Eating Knowledge Graph:

, In: Lecture Notes in Electrical Engineering; Frontier Computing,
Liu, Zhicong ; Su, Long ; Ye, Jun. - p. 1951-1956 , 2023
 
?
7

DACN: Malware Classification Based on Dynamic Analysis and ..:

, In: Communications in Computer and Information Science; Frontiers in Cyber Security,
Zou, Binghui ; Cao, Chunjie ; Wang, Longjuan. - p. 3-13 , 2022
 
?
8

GWDGA: An Effective Adversarial DGA:

, In: Communications in Computer and Information Science; Frontiers in Cyber Security,
Shu, Xiang ; Cao, Chunjie ; Wang, Longjuan. - p. 30-48 , 2022
 
?
9

IMCLNet: A lightweight deep neural network for Image-based ..:

Zou, Binghui ; Cao, Chunjie ; Tao, Fangjian.
Journal of Information Security and Applications.  70 (2022)  - p. 103313 , 2022
 
?
10

DCAL: A New Method for Defending Against Adversarial Exampl..:

, In: Lecture Notes in Computer Science; Artificial Intelligence and Security,
Lin, Xiaoyu ; Cao, Chunjie ; Wang, Longjuan... - p. 38-50 , 2022
 
?
11

Secure Data Storage Scheme of Judicial System Based on Bloc..:

, In: Communications in Computer and Information Science; Security and Privacy in Social Networks and Big Data,
Jing, Zhaoxing ; Cao, Chunjie ; Wang, Longjuan. - p. 339-350 , 2022
 
?
12

Research on smart contract technology based on block chain:

, In: 2022 International Conference on Artificial Intelligence in Everything (AIE),
Dongfang, Jia ; Wang, Longjuan - p. 664-668 , 2022
 
?
13

Research on knowledge representation learning method of die..:

, In: 2022 International Conference on Artificial Intelligence in Everything (AIE),
Liu, Zhicong ; Su, Long ; Xu, Zifeng. - p. 653-658 , 2022
 
?
14

Multi-modal Universal Embedding Representations for Languag..:

, In: Communications in Computer and Information Science; Frontiers in Cyber Security,
Luo, Xi ; Cao, Chunjie ; Wang, Longjuan - p. 103-119 , 2022
 
?
15

RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Rou..:

Wang, Longjuan ; Cao, Chunjie ; Ye, Jun..
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-9 , 2022
 
1-15