


default search action
Huijuan Zhu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c10]Jie Chen, Liangmin Wang, Huijuan Zhu, Victor S. Sheng:
CLEP: A Novel Contrastive Learning Method for Evolutionary Reentrancy Vulnerability Detection. AAAI 2025: 67-74 - 2024
- [j22]Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Heping Song
:
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack. Comput. J. 67(6): 2331-2345 (2024) - [j21]Runze Ma
, Shangnan Yin
, Xia Feng
, Huijuan Zhu
, Victor S. Sheng
:
A lightweight deep learning-based android malware detection framework. Expert Syst. Appl. 255: 124633 (2024) - [j20]Xi Bai, Zhibo Zhou
, Zeyan Zheng, Yansheng Li, Kejia Liu
, Yuanjun Zheng, Hongbo Yang, Huijuan Zhu, Shi Chen, Hui Pan:
Development and evaluation of machine learning models for predicting large-for-gestational-age newborns in women exposed to radiation prior to pregnancy. BMC Medical Informatics Decis. Mak. 24(1): 174 (2024) - [j19]Qiang Zhou
, Liangmin Wang
, Huijuan Zhu
, Tong Lu, Victor S. Sheng
:
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks. IEEE Trans. Inf. Forensics Secur. 19: 30-43 (2024) - [j18]Huijuan Zhu
, Xilong Chen, Liangmin Wang
, Zhicheng Xu, Victor S. Sheng
:
A Dynamic Analysis-Powered Explanation Framework for Malware Detection. IEEE Trans. Knowl. Data Eng. 36(12): 7483-7496 (2024) - [j17]Huijuan Zhu
, Mengzhen Xia, Liangmin Wang
, Zhicheng Xu, Victor S. Sheng
:
A Novel Knowledge Search Structure for Android Malware Detection. IEEE Trans. Serv. Comput. 17(6): 3052-3064 (2024) - [j16]Huijuan Zhu
, Lei Yang, Liangmin Wang
, Victor S. Sheng
:
A Survey on Security Analysis Methods of Smart Contracts. IEEE Trans. Serv. Comput. 17(6): 4522-4539 (2024) - [c9]Longxin Chen, Yunbo Zhao, Binkun Liu, Shaojie Dong, Huijuan Zhu, Peng Bai:
A Reliable Ensemble Model based on Hierarchical Component Features for Repair Label Prediction of Soldering Defects. ASCC 2024: 1563-1568 - [d1]Huijuan Zhu, Mengzhen Xia, Liangmin Wang, Zhicheng Xu, Victor S. Sheng:
Android malware detection dataset. IEEE DataPort, 2024 - 2023
- [j15]Qiang Zhou
, Liangmin Wang, Huijuan Zhu, Tong Lu:
Few-shot website fingerprinting attack with cluster adaptation. Comput. Networks 229: 109780 (2023) - [j14]Huijuan Zhu, Wei Gu
, Liangmin Wang, Zhicheng Xu, Victor S. Sheng:
Android malware detection based on multi-head squeeze-and-excitation residual network. Expert Syst. Appl. 212: 118705 (2023) - [j13]Huijuan Zhu
, Huahui Wei, Liangmin Wang
, Zhicheng Xu, Victor S. Sheng
:
An effective end-to-end android malware detection method. Expert Syst. Appl. 218: 119593 (2023) - [j12]Hui-juan Zhu
, Yang Li
, Liangmin Wang, Victor S. Sheng
:
A multi-model ensemble learning framework for imbalanced android malware detection. Expert Syst. Appl. 234: 120952 (2023) - [j11]Liangmin Wang, Victor S. Sheng, Boris Düdder
, Haiqin Wu
, Huijuan Zhu:
Security and privacy issues in blockchain and its applications. IET Blockchain 3(4): 169-171 (2023) - [j10]Kexin Gong, Xiangmei Song, Na Wang, Chunyang Wang, Huijuan Zhu
:
SCGformer: Smart contract vulnerability detection based on control flow graph and transformer. IET Blockchain 3(4): 213-221 (2023) - [c8]Huijuan Zhu, Meiyu Zhou:
Design and Research of Intelligent Walking Aid Products for Visually Impaired Individuals. HCI (49) 2023: 453-467 - [c7]Tong Lu, Qiang Zhou, Huijuan Zhu:
Lightweight Website Fingerprinting Defense Method Based on Distribution Distance Padding. HPCC/DSS/SmartCity/DependSys 2023: 607-614 - [c6]Rui Shen, Hui-juan Zhu, Chang Li, Hua-hui Wei:
GAResNet: A Transfer Learning based Framework for Android Malware Detection. ICKG 2023: 263-268 - [c5]Huijuan Zhu, Kaixuan Yang, Liangmin Wang, Zhicheng Xu, Victor S. Sheng:
GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability Detection. ISSRE 2023: 568-577 - 2022
- [j9]Yunying Feng, Siyu Liang, Yuelun Zhang, Shi Chen, Qing Wang, Tianze Huang, Feng Sun
, Xiaoqing Liu, Huijuan Zhu
, Hui Pan:
Automated medical literature screening using artificial intelligence: a systematic review and meta-analysis. J. Am. Medical Informatics Assoc. 29(8): 1425-1432 (2022) - [j8]Huijuan Zhu
, Liang-Min Wang
, Sheng Zhong
, Yang Li, Victor S. Sheng
:
A Hybrid Deep Network Framework for Android Malware Detection. IEEE Trans. Knowl. Data Eng. 34(12): 5558-5570 (2022) - 2021
- [j7]Huijuan Zhu
, Yang Li, Ruidong Li
, Jianqiang Li
, Zhuhong You
, Houbing Song
:
SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection. IEEE Trans. Netw. Sci. Eng. 8(2): 984-994 (2021) - [c4]Ping Huang, Lei Zheng, Ying Wang, Huijuan Zhu:
Sentiment Analysis of Chinese Text Based on CNN-BiLSTM Serial Hybrid Model. ICCPR 2021: 309-313 - [c3]Ping Huang, Huijuan Zhu, Lei Zheng, Ying Wang:
Text Sentiment Analysis based on BERT and Convolutional Neural Networks. NLPIR 2021: 1-7 - 2020
- [c2]Huijuan Zhu, Tao Zhang, Qi Wang, Yanan Gu:
Improvement of Contact Graph Routing Algorithm in LEO Satellite DTN Network. IoTaaS 2020: 484-492
2010 – 2019
- 2019
- [j6]Hui-Juan Zhu
, Zhu-Hong You
, Wei-Lei Shi, Shoukun Xu, Tong-Hai Jiang, Li-Hua Zhuang:
Improved Prediction of Protein-Protein Interactions Using Descriptors Derived From PSSM via Gray Level Co-Occurrence Matrix. IEEE Access 7: 49456-49465 (2019) - [j5]Hui-Juan Zhu, Tong-Hai Jiang, Yi Wang, Li Cheng, Bo Ma, Fan Zhao:
A data cleaning method for heterogeneous attribute fusion and record linkage. Int. J. Comput. Sci. Eng. 19(3): 311-324 (2019) - [c1]Hai-Cheng Yi
, Zhu-Hong You
, Yan-Bin Wang, Zhan-Heng Chen
, Zhen-Hao Guo, Hui-Juan Zhu:
In Silico Identification of Anticancer Peptides with Stacking Heterogeneous Ensemble Learning Model and Sequence Information. ICIC (2) 2019: 313-323 - 2018
- [j4]Hui-Juan Zhu, Zhu-Hong You
, Zexuan Zhu, Wei-Lei Shi, Xing Chen, Li Cheng:
DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model. Neurocomputing 272: 638-646 (2018) - [j3]Hui-Juan Zhu
, Zhengwei Zhu
, Tong-Hai Jiang
, Li Cheng, Wei-Lei Shi, Xi Zhou, Fan Zhao, Bo Ma:
A Type-Based Blocking Technique for Efficient Entity Resolution over Large-Scale Data. J. Sensors 2018: 2094696:1-2094696:12 (2018) - [j2]Jianrui Xu, Hui-Juan Zhu:
基于自适应惩罚函数的云工作流调度协同进化遗传算法 (Coevolutionary Genetic Algorithm of Cloud Workflow Scheduling Based on Adaptive Penalty Function). 计算机科学 45(8): 105-112 (2018) - [j1]Hui-Juan Zhu, Tonghai Jiang, Bo Ma, Zhu-Hong You
, Wei-Lei Shi, Li Cheng:
HEMD: a highly efficient random forest-based malware detection framework for Android. Neural Comput. Appl. 30(11): 3353-3361 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-20 23:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint