Shengjun Wei

ORCID: 0000-0003-0501-2812
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Software Engineering Research
  • Cloud Data Security Solutions
  • Software Reliability and Analysis Research
  • UAV Applications and Optimization
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Computational Techniques and Applications
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • Opportunistic and Delay-Tolerant Networks
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Complex Network Analysis Techniques
  • Infrared Target Detection Methodologies
  • Advanced Sensor and Control Systems
  • Robotics and Sensor-Based Localization
  • Anomaly Detection Techniques and Applications
  • Technology and Security Systems
  • BIM and Construction Integration
  • Privacy-Preserving Technologies in Data
  • Advanced Memory and Neural Computing
  • Interconnection Networks and Systems
  • Neuroscience and Neural Engineering

Beijing Institute of Technology
2010-2025

Wenzhou University
2022

Nanjing Agricultural University
2017

Zhongshan Hospital
2011

It is a trend to construct multicomponent room temperature phosphorescence/RTP doped materials in the future improve phosphorescence performance by using advantage that host system can be used as container containing other components. Herein, systems are constructed with two isoquinoline derivatives (OxISQ and PrISQ) guests, diphenyl sulfoxide/SDB host, alkali (KOH) fourth component. Bicomponent material OxISQ/SDB has strong cyan RTP, whereas PrISQ/SDB almost no RTP activity. The effect of...

10.1021/acsmaterialslett.2c00575 article EN ACS Materials Letters 2022-08-10

The advent of unmanned aerial vehicle (UAV) swarm technology brings possibilities to help humans complete tasks in no man's land, such as deserts and rainforests. However, UAV network faces many cyber threats, where attackers can impersonate legitimate entities or tamper with task data. For identity security, most the existing methods use centralized authentication schemes, which have a single point failure problem. data only secure ground system, ignoring security air network. Therefore,...

10.1109/jiot.2023.3279923 article EN IEEE Internet of Things Journal 2023-05-25

Software defect prediction technology mainly relies on machine learning algorithm to learn the measurement data of existing software. There is some redundant in element software defect, which will reduce accuracy algorithm. This paper proposes a model based KPCA-SVM.First, dimension reduction pretreatment sets carried out.Then, using support vector machines for classification.The can be improved by keeping global features selection algorithm.Therefore, kernel principal component analysis...

10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00244 article EN 2019-08-01

The soybean sprout is a nutritious and delicious vegetable that rich in ascorbic acid (AsA). Hydrogen gas (H

10.1038/s41598-017-16021-0 article EN cc-by Scientific Reports 2017-11-21

The dramatic increase in the number of sensors with wireless communication capability has resulted emergence a new class computer worms which specifically target such networks. most striking feature worm these networks is that they do not require Internet connectivity for their propagation but can spread directly from sensor node to another using short-range radio technology. In this paper, we model and analyze epidemic theory. From numerical simulation results, observe process very...

10.1109/wicom.2009.5301407 article EN 2009-09-01

The popularity of wireless communication networks makes them an attractive target to the creators worms and other malicious code. Indeed, recently a number designed specifically spread via these have emerged. Based on epidemic theory, this paper proposes general model which predicts how worm propagates through ad hoc network. Then differential equations is presented necessary condition for in derived, may be useful designing secure Simulation results show that process propagation sensitive...

10.1109/iccsit.2009.5234685 article EN 2009-01-01

A novel approach for IP traceback is proposed, which combines probabilistic packet marking and network coding techniques. Dissimilar to prior PPM schemes, our stores random linear combinations of router labels instead overwriting further decrease the convergence time attack path reconstruction. Based on coupon collector problem with unequal probability, we also present accurate models proposed as well that schemes. Simulation results analysis indicate can effectively improve performance.

10.1109/wcse.2009.642 article EN 2009-01-01

To build a secure communications software, Vulnerability Prediction Models (VPMs) are used to predict vulnerable software modules in the system before security testing. At present many metrics have been proposed design VPM. In this paper, we classes by establishing system's weighted network. The obtained from nodes' attributes We and implement crawler tool collect all public vulnerabilities Mozilla Firefox. Based on these data, prediction model is trained tested. results show that VPM based...

10.1109/glocom.2018.8647583 preprint EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

10.1109/csrswtc64338.2024.10811583 article EN 2021 Cross Strait Radio Science and Wireless Technology Conference (CSRSWTC) 2024-11-04

In recent years, there has been a constant barrage of worms over the Internet. To develop appropriate tools for thwarting quick spread worms, researchers are trying to understand behavior worm propagation with aid epidemiological models. this paper, two improvements classical SIS (susceptible-infectious-susceptible) and SIR (susceptible-infectious-recovered) models quarantine strategy presented; thresholds equilibriums appearance endemic these dynamic found, furthermore, their stability is...

10.1109/iccsit.2009.5234704 article EN 2009-01-01

In recent years, network worm that had a dramatic increase in the frequency and virulence of such outbreaks have become one major threats to security Internet. To develop appropriate tools for thwarting quick spread worms, researchers are trying understand behavior propagation with aid epidemiological models. this paper, new model bilinear incidence rate is proposed discussed based on classical Kermack-Mckendrick (KM) model. It supports hosts decrease leaving from network. Moreover, global...

10.1109/ias.2009.180 article EN 2009-01-01

Image recognition of small UAVs is the basis anti-UAV technology based on photoelectric detection. In this paper, an automatic image method for Faster RCNN proposed. The deep residual network adopted to extract features UAVs. Then, extracted are input into region proposal network, which can generate a box that contains final result obtained through classification and regression. After training testing model dataset thousands images common UAV market, shows recall 98%, average precision close...

10.1145/3448823.3448844 article EN 2020-12-09
Coming Soon ...