Zhaojun Gu

ORCID: 0000-0002-1972-0951
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Software System Performance and Reliability
  • Advanced Malware Detection Techniques
  • Advanced Machining and Optimization Techniques
  • Aquatic Ecosystems and Phytoplankton Dynamics
  • Water Quality Monitoring Technologies
  • Advanced machining processes and optimization
  • Advanced Surface Polishing Techniques
  • Spam and Phishing Detection
  • Fish Ecology and Management Studies
  • Wastewater Treatment and Nitrogen Removal
  • Blockchain Technology Applications and Security
  • Advanced Computational Techniques and Applications
  • Mobile Agent-Based Network Management
  • Constructed Wetlands for Wastewater Treatment
  • Aquaculture Nutrition and Growth
  • Guidance and Control Systems
  • UAV Applications and Optimization
  • Security and Verification in Computing
  • Cybercrime and Law Enforcement Studies
  • Topic Modeling
  • Cloud Computing and Remote Desktop Technologies
  • Infrastructure Maintenance and Monitoring
  • Advanced Text Analysis Techniques

Civil Aviation University of China
2010-2025

Ministry of Agriculture and Rural Affairs
2010-2024

Dalian Maritime University
2024

Chinese Academy of Fishery Sciences
2012-2024

China Fishery Machinery and Instrument Research Institute
2019-2023

Digital assets have come under various network security threats in the digital age. As a kind of equipment to protect assets, intrusion detection system (IDS) is less efficient if alert not timely and IDS useless accuracy cannot meet requirements. Therefore, an model that combines machine learning with deep proposed this paper. The uses k-means random forest (RF) algorithms for binary classification, distributed computing these implemented on Spark platform quickly classify normal events...

10.1109/access.2021.3082147 article EN cc-by IEEE Access 2021-01-01

Anomaly detection is a unique type of classification challenge. The coupling imbalance, overlap and other complexity the data such as noise in industrial internet things (IIoT) scenarios affect accuracy seriously. To address this issue, article proposes novel oversampling approach based on synthetic minority technology via hypersphere coverage adaptive differential evolution (HCADE-SMOTE). However, intensification caused by generated samples over-loss valid information have always been...

10.1109/jiot.2025.3526160 article EN IEEE Internet of Things Journal 2025-01-01

Logs are extensively used to analyze the running states of systems in many fields, such as cyber security, performance monitoring, and fault diagnosis, by recording events representing real-time system states. Conventional log parsing methods time-consuming prone overfitting or underfitting. Thus, automatic methods, known parsers, have been proposed. However, most parsers do not exhibit both high accuracy low time. In addition, they typically overfit during template generation; thus, cannot...

10.3390/app15041740 article EN cc-by Applied Sciences 2025-02-08

Pond aquaculture is the major freshwater method in China. Ammonia-oxidizing communities inhabiting pond sediments play an important role controlling culture water quality. However, distribution and activities of ammonia-oxidizing microbial along sediment profiles are poorly understood this specific environment. Vertical variations abundance, transcription, potential ammonia oxidizing rate, community composition bacteria (AOB) archaea (AOA) samples (0-50 cm depth) collected from a were...

10.3389/fmicb.2015.01539 article EN cc-by Frontiers in Microbiology 2016-01-20

In recent years, the development of Internet Things technology has been very rapid. However, with explosive growth IoT devices, challenges facing environment are becoming more and serious. How to ensure security becomes a key issue. The primary purpose is protect private data users, infrastructure, devices. This paper reviews threat models at each level in years discusses some past future solutions. At first, threats systematically introduced from perspectives physics, network data....

10.1109/dsc.2019.00059 article EN 2019-06-01

The following topics are dealt with: learning (artificial intelligence); data mining; social networking (online); pattern classification; text analysis; security of data; feature extraction; Internet; graph theory; computer network security.

10.1109/dsc.2019.00100 article EN 2019-06-01

Abstract Grass carp, Ctenopharyngodon idella , is the largest freshwater aquaculture fish species worldwide. However, its environmental impacts are increasingly controversial. In this paper, we considered production of a 1500 g commercial grass carp as an example, analyzed through life cycle assessment. The results showed that indicators global warming potential (GWP), acidification potential, eutrophication eco‐toxicity (FAETP), land competition (LC), and fossil energy consumption producing...

10.1111/jwas.12990 article EN cc-by Journal of the World Aquaculture Society 2023-05-31

10.1007/s00170-020-06020-3 article EN The International Journal of Advanced Manufacturing Technology 2020-09-08

Cybersecurity risk assessment is an important means of effective response to network attacks on industrial control systems. However, cybersecurity process susceptible subjective and objective effects. To solve this problem, paper introduced method based fuzzy theory Attack-Defense Tree model probability technology, applied it airport automatic fuel supply system. Firstly, was established the potential threat system deployed security equipment. Secondly, interval attack path calculated using...

10.3233/jifs-201126 article EN Journal of Intelligent & Fuzzy Systems 2021-04-09

Water quality monitoring is an important way to monitor the environment, control pollution and protect water resources, its research has great practical significance for environmental protection. Aiming at disadvantages of existing methods such as high node power consumption small coverage, this paper proposes online system scheme using NB-IOT protocol communication. The prototype shows that can meet needs Bolong Lake.

10.1109/isssr51244.2020.00023 article EN 2020-10-01

The algal succession in Microcystis blooms of varying biomass under continuous aeration was studied a greenhouse. There were four treatments (control, Low, Medium, and High) with initial chlorophyll (Chl-a) 32.5, 346.8, 1413.7, 14,250.0 μg L-1, respectively. During the experiment, Cyanophyta lowest Medium treatment (P < 0.05), while its Chlorophyta highest 0.05). Both Bacillariophyta High biomass, particularly diatom Nitzschia palea Low cells attached to colonies. Thus, shift disturbance...

10.1038/s41598-022-25017-4 article EN cc-by Scientific Reports 2022-12-05

In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed at edge network exchange information collaborate with each other in a dynamic way, also used. order to understand applicability viability this approach, it is necessary know its advantages disadvantages not only terms security privacy challenges. The purpose paper show that IoT three-layer logic architecture...

10.1109/dsc.2019.00058 article EN 2019-06-01

With the rapid development of Internet Things, combination Things with machine learning, Hadoop and other fields are current trends. Distributed File System (HDFS) is one core components Hadoop, which used to process files that divided into data blocks distributed in cluster. Once log abnormal, it will cause serious losses. When using learning algorithms for system anomaly detection, output threshold-based classification models only normal or abnormal simple predictions. This paper...

10.3390/electronics9020232 article EN Electronics 2020-01-31

Syslog audit acts an important role in keeping host secure. This paper studied Host-based syslog, and constructed a secure state model for performing normally from the angle of anomaly detection. Through deep research on syslog protocol, log collection tool was created collecting remote or local syslog. Because different segments imply system information, separated every segment record with Regular Expression, then it made data preprocessing statistic rule matching, end conducted analysis by...

10.1109/etcs.2010.128 article EN 2010-01-01
Coming Soon ...