Junjiang He

ORCID: 0000-0001-7040-2425
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Artificial Immune Systems Applications
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Advanced Multi-Objective Optimization Algorithms
  • Security and Verification in Computing
  • Complex Network Analysis Techniques
  • Web Application Security Vulnerabilities
  • Evolutionary Algorithms and Applications
  • Human Mobility and Location-Based Analysis
  • Age of Information Optimization
  • vaccines and immunoinformatics approaches
  • IoT Networks and Protocols
  • Face and Expression Recognition
  • Metaheuristic Optimization Algorithms Research
  • Advanced Steganography and Watermarking Techniques
  • Software Testing and Debugging Techniques
  • Adversarial Robustness in Machine Learning
  • Elevator Systems and Control
  • Advanced MIMO Systems Optimization
  • Wireless Communication Security Techniques
  • Software-Defined Networks and 5G
  • Advanced Decision-Making Techniques
  • Cancer-related molecular mechanisms research

Sichuan University
2019-2025

Southwest Petroleum University
2017

Android malware and its variants are a major challenge for mobile platforms. However, there two main problems in the existing detection methods: <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">a</i> ) The method lacks evolution ability malware, which leads to low rate of model variants. xmlns:xlink="http://www.w3.org/1999/xlink">b</i> Traditional methods require centralized data training, however, aggregation training samples is limited due...

10.1109/tifs.2023.3287395 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Intrusion detection systems are crucial in fighting against various network attacks. By monitoring the behavior real time, possible attack attempts can be detected and acted upon. However, with development of openness flexibility networks, artificial immunity-based anomaly methods lack continuous adaptability hence have poor performance. Thus, a novel framework for adaptive regulation is built this paper. First, heuristic dimensionality reduction algorithm based on unsupervised clustering...

10.1155/2023/8980876 article EN cc-by International Journal of Intelligent Systems 2023-02-24

Single-cell RNA sequencing (scRNA-seq) technologies have provided unprecedented insights into gene expression at the cellular level. Drop-seq is one of most widely used scRNA-seq protocols, and rapid development analytical tools for data has followed. These methods are typically evaluated using spike-in experiments or simulated datasets, as real-world differential often unknown. However, can be both costly time-consuming, making datasets a more practical alternative. Despite this, existing...

10.37394/23208.2025.22.27 article EN WSEAS TRANSACTIONS ON BIOLOGY AND BIOMEDICINE 2025-05-12

The multiobjective immune optimization algorithms (MOIAs) utilize the principle of clonal selection, iteratively evolving by replicating a small number superior solutions to optimize decision vectors. However, this method often leads lack diversity and is particularly ineffective when facing large‐scale problems. Moreover, an overemphasis on elite may result in large redundant offspring, reducing evolutionary efficiency. By delving into causes these issues, we find that key factor existing...

10.1155/int/6462697 article EN cc-by International Journal of Intelligent Systems 2025-01-01

SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to examination of detection techniques, which progressed from traditional signature-based methods machine- deep-learning-based models. These techniques demonstrated promising results on existing datasets; however, most studies overlooked impact adversarial particularly...

10.3390/fi15040133 article EN cc-by Future Internet 2023-03-30

In this article, we focus on a wireless multiuser uplink network consisting of single antenna access point (AP) and multiple users, in which each user transmits time-sensitive confidential message to the AP time-division (TDMA) manner. When is scheduled transmit, other users will be regarded as potential eavesdroppers. practical Internet Things (IoT) applications, different may have requirements for throughput, timeliness information needs guaranteed. order effectively adapt these...

10.1109/jiot.2024.3350672 article EN IEEE Internet of Things Journal 2024-01-08

A wireless multi-user uplink heterogeneous network is investigated in this paper, which comprises an access point and two distinct user groups including throughput-oriented users age of information (AoI)-oriented users, prioritize achieving as high throughput possible, while AoI-oriented emphasize timely transmission information. It assumed that the transmitted needs to be kept strictly confidential unintended time-division multiple (TDMA) approach adopted transmit each user. For such a...

10.1109/jiot.2024.3386765 article EN IEEE Internet of Things Journal 2024-07-01

Supervisory Control and Data Acquisition (SCADA) systems are the core of industrial control an important part critical infrastructure. With deployment 5G networks around world, SCADA no longer a relatively secure physically isolated system like in past, but facing huge network virus threats. In order to solve problem that existing models ignore communication between nodes system, we propose transmission model SELBR based on immune knowledge by simulating function T cells system. By...

10.1109/jiot.2024.3407768 article EN IEEE Internet of Things Journal 2024-05-31

Unmanned aerial vehicles (UAVs) have experienced rapid development, permeating diverse domains. However, addressing security challenges in UAV networks remains daunting due to resource limitations and the high autonomy of terminals. The current research on network intrusion detection lacks an efficient process covering each terminal a lightweight collaborative response mechanism between UAVs ground stations, which affects performance detection. In this article, inspired by vaccine...

10.1109/jiot.2024.3426054 article EN IEEE Internet of Things Journal 2024-07-10

Host-based intrusion detection systems (HIDS) have been widely acknowledged as an effective approach for detecting and mitigating malicious activities. Among various data sources utilized in HIDS, system call traces gained significant popularity due to their inherent advantage of providing fine-grained information. Nevertheless, conventional feature extraction techniques relying on calls tend overlook the issue high-dimensional sparse space. In this paper, we conduct a theoretical analysis...

10.1109/tifs.2023.3324388 article EN IEEE Transactions on Information Forensics and Security 2023-10-13
Coming Soon ...