default search action
Jun Hou 0002
Person information
- affiliation: Nanjing University of Science and Technology, School of Cyber Science and Engineering, China
- affiliation: Nanjing Institute of Industry Technology, School of Social Science, China
- affiliation: Nanjing Vocational University of Industry Technology, School of Social Science, China
- affiliation: Wuyi University, Department of Intelligent Manufacturing, Jiangmen, China
Other persons with the same name
- Jun Hou — disambiguation page
- Jun Hou 0001 — University of Michigan, Department of Naval Architecture and Marine Engineering, Ann Arbor, MI, USA (and 1 more)
- Jun Hou 0003 — Chang'an University, School of Information Engineering, Xi'an, China
- Jun Hou 0004 — Hohai University, College of Environment, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Shiyu Chen, Jun Hou, Qianmu Li, Shunmei Meng, Jing Zhang:
Temporal-aware influence maximization solution in artificial intelligent edge application. Wirel. Networks 30(5): 4301-4313 (2024) - 2023
- [j25]Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou, Adnan Iftekhar:
Detecting the research structure and topic trends of social media using static and dynamic probabilistic topic models. Aslib J. Inf. Manag. 75(2): 215-245 (2023) - [j24]Jun Hou, Peng Wang, Haixia Yang, Meiting Gong, Shiqiang Xiong, Haifeng Pei:
New characteristics in ECG induced by ultra-high altitude hypoxia. Biomed. Signal Process. Control. 85: 104987 (2023) - [j23]Hanrui Zhang, Qianmu Li, Jiangmin Xu, Shunmei Meng, Jun Hou:
A privacy-preserving recommendation method with clustering and locality-sensitive hashing. Comput. Intell. 39(1): 121-144 (2023) - [j22]Ming Wu, Qianmu Li, Fei Yang, Jing Zhang, Victor S. Sheng, Jun Hou:
Learning from biased crowdsourced labeling with deep clustering. Expert Syst. Appl. 211: 118608 (2023) - [j21]Shuo Wang, Qianmu Li, Zhiyong Cui, Jun Hou, Chanying Huang:
Bandit-based data poisoning attack against federated learning for autonomous driving models. Expert Syst. Appl. 227: 120295 (2023) - [j20]Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou:
Secure multi-factor access control mechanism for pairing blockchains. J. Inf. Secur. Appl. 74: 103477 (2023) - [j19]Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou:
Reflecting the trends in the academic landscape of special education using probabilistic dynamic topic modeling. Libr. Hi Tech 41(6): 1676-1693 (2023) - [c25]Bowen Guo, Yuxin Yang, Qianmu Li, Jun Hou, Ya Rao:
Boosting Adversarial Attacks with Improved Sign Method. ADMA (5) 2023: 150-164 - [c24]Yinzhao Zhang, Wei Sun, Jun Hou, Qianmu Li:
Hybrid Multi-Strategy Improvements for The Aquila Optimizer. DASC/PiCom/CBDCom/CyberSciTech 2023: 549-556 - [c23]Shufan Yang, Qianmu Li, Zhichao Lian, Pengchuan Wang, Jun Hou:
MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks. ICONIP (6) 2023: 3-18 - 2022
- [j18]Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou:
Analyzing the Research Trends of IoT Using Topic Modeling. Comput. J. 65(10): 2589-2609 (2022) - [j17]Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou:
A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things. Cryptogr. 6(3): 33 (2022) - [j16]Wenqing Yang, Xiaochao Li, Peng Wang, Jun Hou, Qianmu Li, Nan Zhang:
Defect knowledge graph construction and application in multi-cloud IoT. J. Cloud Comput. 11: 59 (2022) - [j15]Hanwen Liu, Shunmei Meng, Jun Hou, Shuo Wang, Qianmu Li, Chanying Huang:
Locality-Sensitive Hashing-Based Link Prediction Process on Smart Campus Education or Online Social Platform. J. Circuits Syst. Comput. 31(9): 2250160:1-2250160:25 (2022) - [j14]Jun Hou, Shiyu Chen, Huaqiu Long, Qianmu Li:
Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data. J. Organ. End User Comput. 34(10): 1-23 (2022) - [j13]Qianmu Li, Huaqiu Long, Zhuoran Xu, Jun Hou, Junhui Cai:
A threat recognition solution of edge data security in industrial internet. World Wide Web 25(5): 2109-2138 (2022) - [c22]Hao Ge, Qianmu Li, Shunmei Meng, Jun Hou:
CPGCN: Collaborative Property-aware Graph Convolutional Networks for Service Recommendation. SCC 2022: 10-19 - [c21]Wenqing Yang, Xiaochao Li, Peng Wang, Jun Hou, Qianmu Li, Nan Zhang:
A Joint Knowledge Graph Reasoning Method. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - [c20]Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou:
A Gas Cost Analytical Approach Based on Certificateless Key Encapsulation Protocol for Medicalized Blockchains. FCS 2022: 241-257 - [c19]Wei Sun, Qianmu Li, Pengchuan Wang, Jun Hou:
Evolving convolutional neural networks for intrusion detection system using hybrid multi-strategy aquila optimizer. GECCO Companion 2022: 304-307 - [c18]Ming Wu, Qianmu Li, Jing Zhang, Jun Hou:
Label Aggregation with Clustering for Biased Crowdsourced Labeling. ICMLC 2022: 165-169 - [c17]Yang Li, Qianmu Li, Shunmei Meng, Jun Hou:
Attention-Based Knowledge-aware Multi-Interest Intelligent Model for Sequential Recommendation. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 904-911 - 2021
- [j12]Ming Wu, Qianmu Li, Muhammad Bilal, Xiaolong Xu, Jing Zhang, Jun Hou:
Multi-label active learning from crowds for secure IIoT. Ad Hoc Networks 121: 102594 (2021) - [j11]Jun Hou, Qianmu Li, Yaozong Liu, Sainan Zhang:
An Enhanced Cascading Model for E-Commerce Consumer Credit Default Prediction. J. Organ. End User Comput. 33(6): 1-18 (2021) - [c16]Hao Ge, Qianmu Li, Shunmei Meng, Jun Hou:
KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems. CloudComp 2021: 107-122 - [c15]Wei Sun, Qianmu Li, Pengchuan Wang, Jun Hou:
Heuristic Network Security Risk Assessment Based on Attack Graph. CloudComp 2021: 181-194 - [c14]Yang Li, Qianmu Li, Shunmei Meng, Jun Hou:
Transformer-Based Rating-Aware Sequential Recommendation. ICA3PP (1) 2021: 759-774 - 2020
- [j10]Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long:
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks. Complex. 2020: 7136160:1-7136160:18 (2020) - [j9]Shuo Wang, Qianmu Li, Jun Hou, Shunmei Meng, Bo Zhang, Cangqi Zhou:
Active Defense by Mimic Association Transmission in Edge Computing. Mob. Networks Appl. 25(2): 725-742 (2020) - [j8]Abigail Akosua Addobea, Jun Hou, Qianmu Li:
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. Secur. Commun. Networks 2020: 7085623:1-7085623:12 (2020) - [j7]Jun Hou, Qianmu Li, Shicheng Cui, Shunmei Meng, Sainan Zhang, Zhen Ni, Ye Tian:
Low-cohesion differential privacy protection for industrial Internet. J. Supercomput. 76(11): 8450-8472 (2020) - [c13]Shuo Wang, Qianmu Li, Jun Hou, Jian Jiang:
Security Control Components for Epidemic Prevention Donation Management Blockchain. BSCI 2020: 73-84 - [c12]Yutao Song, Jun Hou, Yanjun Song, Qianmu Li:
Research Review on Imbalanced Learning Models in Embedded Intelligent Computing. ICESS 2020: 1-8 - [c11]Hafsat Muhammad Bashir, Qianmu Li, Jun Hou:
A High Capacity Text Steganography Utilizing Unicode Zero-Width Characters. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 668-675 - [c10]Jun Hou, Yutao Song, Qianmu Li, Huaqiu Long, Jian Jiang:
Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought. SPDE 2020: 695-710
2010 – 2019
- 2019
- [j6]Qianmu Li, Shunmei Meng, Sainan Zhang, Jun Hou, Lianyong Qi:
Complex Attack Linkage Decision-Making in Edge Computing Networks. IEEE Access 7: 12058-12072 (2019) - [j5]Qianmu Li, Shunmei Meng, Shuo Wang, Jing Zhang, Jun Hou:
CAD: Command-Level Anomaly Detection for Vehicle-Road Collaborative Charging Network. IEEE Access 7: 34910-34924 (2019) - [j4]Jun Hou, Qianmu Li, Shunmei Meng, Zhen Ni, Yini Chen, Yaozong Liu:
DPRF: A Differential Privacy Protection Random Forest. IEEE Access 7: 130707-130720 (2019) - [j3]Jun Hou, Qianmu Li, Rong Tan, Shunmei Meng, Hanrui Zhang, Sainan Zhang:
An Intrusion Tracking Watermarking Scheme. IEEE Access 7: 141438-141455 (2019) - [j2]Milad Taleby Ahvanooey, Qianmu Li, Jun Hou, Ahmed Raza Rajput, Yini Chen:
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis. Entropy 21(4): 355 (2019) - [c9]Xiao Dong, Qianmu Li, Jun Hou, Jing Zhang, Yaozong Liu:
Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map. BigDataService 2019: 232-236 - [c8]Shengzhi Chen, Jun Hou, Qianmu Li:
Safety Risk Monitoring of Hydraulic Power Generation Industrial Control Network. BigDataService 2019: 237-241 - [c7]Hanrui Zhang, Qianmu Li, Yong Qi, Jun Hou, Yaozong Liu:
The Research Reviewed of Edge Network Active Safety Defense Technology. BigDataService 2019: 242-246 - [c6]Yan Xu, Summera Shamrooz Aslam, Qianmu Li, Jun Hou:
Self-Similarity Analysis and Application of Water Network Traffic. BigDataService 2019: 257-261 - [c5]Ming Wu, Qianmu Li, Shuo Wang, Jun Hou:
A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing. CSE/EUC 2019: 373-378 - [c4]Tian Qiu, Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long, Yaozong Liu:
Fusion Learning Model for Embedded Face Safe Detection and Facial Gesture Analysis. CSE/EUC 2019: 431-435 - [c3]Xiaoqian Liu, Qianmu Li, Zhen Ni, Jun Hou:
Differentially Private Recommender System with Autoencoders. iThings/GreenCom/CPSCom/SmartData 2019: 450-457 - 2018
- [j1]Milad Taleby Ahvanooey, Qianmu Li, Jun Hou, Hassan Dana Mazraeh, Jing Zhang:
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media. IEEE Access 6: 65981-65995 (2018) - 2015
- [c2]Ming Ni, Qianmu Li, Hong Zhang, Tao Li, Jun Hou:
File Relation Graph Based Malware Detection Using Label Propagation. WISE (2) 2015: 164-176 - 2012
- [c1]Qianmu Li, Qiugan Shi, Jun Hou, Yong Qi, Hong Zhang:
A Mobile-Certificate Security Method of Satellite-Earth Integration Networks. ICICA (LNCS) 2012: 88-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint