Name
Affiliation
Papers
ZHIJUN WU
Civil Aviat Univ China, Sch Elect Informat Engn, Tianjin, Peoples R China
23
Collaborators
Citations 
PageRank 
39
12
8.03
Referers 
Referees 
References 
42
86
28
Title
Citations
PageRank
Year
AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation00.342022
Steganography And Steganalysis In Voice Over Ip: A Review00.342021
I-CIFA: An improved collusive interest flooding attack in named data networking00.342021
Bd-D1sec: Protocol Of Security Authentication For Beidou D1 Civil Navigation Message Based On Certificateless Signature00.342021
High-Potency Models of LDoS Attack Against CUBIC plus RED00.342021
A Detection Method for I-CIFA Attack in NDN Network00.342021
Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model00.342021
An ADS-B Message Authentication Method Based on Certificateless Short Signature10.362020
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN.20.362020
Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec.00.342020
BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication.00.342020
Mitigation measures of collusive interest flooding attacks in named data networking10.362020
Adaptive Speech Information Hiding Method Based on K-Means.00.342020
A 4D Trajectory Prediction Model Based on the BP Neural Network00.342020
Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey.30.412020
Research on SWIM Services Dynamic Migration Method.00.342019
ECDSA-based Message Authentication Scheme for BeiDou-II Navigation Satellite System10.362019
Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks.20.382019
Speech Information Hiding Algorithm Based On Complete Binary Tree Dynamic Codebook Grouping00.342019
Chtds: A Cp-Abe Access Control Scheme Based On Hash Table And Data Segmentation In Ndn00.342019
A Novel Time-Domain Dme Interference Mitigation Approach For L-Band Aeronautical Communication System00.342016
A New Exploration of FB-Shrew Attack.20.392016
A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks00.342016