


default search action
Jiangchuan Chen
Person information
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j17]Wengang Ma, Wenhui Zhao, Junjiang He
, Ao Liu
, Wenbo Fang
, Jiangchuan Chen
:
Bearing fault diagnosis with class-aware re-weighting based multi-source domain adaptation under imperfect samples. Appl. Soft Comput. 189: 114442 (2026)
[j16]Jiangchuan Chen
, Yunfei Yin
, Yuanhao Liu
, Xiaohe Wu
, Abaho G. Gershome
, Zejiao Dong
:
LK-Road3R: Road point cloud mapping via UAV-based video and deep learning. Expert Syst. Appl. 304: 130605 (2026)- 2025
[j15]Jiangchuan Chen, Junjiang He
, Wenshan Li, Wenbo Fang
, Xiaolong Lan
, Wengang Ma, Tao Li, Dawei Zhao:
NSA-AE: An inadequately represented immune spaces NSA augmented via autoencoders. Neurocomputing 652: 131063 (2025)
[j14]Jiahang Tang
, Junjiang He
, Yaxin Li, Pin Yang, Xiaolong Lan
, Jiangchuan Chen
, Tao Li
:
An Immune Memory-Empowered SCADA-Based Industrial Virus Dynamic Repropagation Model. IEEE Internet Things J. 12(24): 55120-55136 (2025)
[j13]Wenbo Fang
, Junjiang He
, Wenshan Li
, Wengang Ma
, Linlin Zhang
, Xiaolong Lan
, Geying Yang
, Jiangchuan Chen
, Tao Li
:
Unknown Cyber Threat Discovery Empowered by Genetic Evolution Without Prior Knowledge. IEEE Trans. Inf. Forensics Secur. 20: 9552-9567 (2025)
[j12]Peng Gao
, Jiangchuan Chen
, Xun Che
, Fan Liu, Yu Lu, Yuting Guan, Junjiang He
:
Attention-Driven Deep Neural Networks With Cross-Channel Temporal Modeling for Robust Cybersecurity Situational Awareness. IEEE Trans. Inf. Forensics Secur. 20: 11223-11237 (2025)
[j11]Jiangchuan Chen
, Wenjing Zhang
, Xianyong Ma
, Yunfei Yin
, Zejiao Dong
, Abaho G. Gershome
, Meng Guo
:
Vibration Visualization: High-Quality Vehicle Detection With DVS Data Using Deep Learning Network. IEEE Trans. Instrum. Meas. 74: 1-13 (2025)
[j10]Yang Chen, Junjiang He, Wenbo Fang, Shenwen Yang, Jiangchuan Chen, Tao Li, Xiaolong Lan:
Automatic penetration testing model based on reinforcement learning for complex network environments. J. Supercomput. 81(11): 1169 (2025)
[c5]Linfeng Du, Lei Yun, Siqi Zhang, Jiangchuan Chen, Ziyu Liu, Junjiang He:
BiAttnNet: A Bidirectional Attentive Framework for Firmware Semantic Modeling in Industrial Control System Security. FSDM 2025: 651-660
[c4]Ruoning Liu, Zhanguo Xu, Jiangchuan Chen, Yun Wang:
An Overview of Wireless Charging Systems for Electric Vehicles: From Historical Evolution to Modern Applications. ICIT 2025: 1-6- 2024
[j9]Ziyu Liu, Tao Yang
, Wen Chen, Jiangchuan Chen
, Qinru Li, Jun Zhang:
Sentiment analysis of social media comments based on multimodal attention fusion network. Appl. Soft Comput. 164: 112011 (2024)
[j8]Hongli Deng, Yu Lu, Tao Yang
, Ziyu Liu, Jiangchuan Chen:
Unmanned Aerial Vehicles anomaly detection model based on sensor information fusion and hybrid multimodal neural network. Eng. Appl. Artif. Intell. 132: 107961 (2024)
[j7]Junjiang He
, Wenbo Fang
, Xiaolong Lan
, Geying Yang
, Ziyu Chen, Yang Chen, Tao Li, Jiangchuan Chen
:
Efficient Based on Improved Random Forest Defense System Against Application-Layer DDoS Attacks. Int. J. Intell. Syst. 2024 (2024)
[j6]Jiangchuan Chen
, Junjiang He
, Wenshan Li
, Wenbo Fang
, Xiaolong Lan
, Wengang Ma, Tao Li
:
A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution. IEEE Internet Things J. 11(20): 33312-33325 (2024)
[j5]Jiangchuan Chen
, Junjiang He
, Wenshan Li
, Wenbo Fang
, Xiaolong Lan
, Wengang Ma, Tao Li
:
Corrections to "A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution". IEEE Internet Things J. 11(23): 38952 (2024)
[j4]Tao Yang
, Jiangchuan Chen
, Hongli Deng, Baolin He:
A lightweight intrusion detection algorithm for IoT based on data purification and a separable convolution improved CNN. Knowl. Based Syst. 304: 112473 (2024)
[c3]Junjiang He, Jiayan Wang, Jiangchuan Chen, Wenbo Fang, Lei Zhang, Tao Li:
Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security. ICDF2C (2) 2024: 39-50- 2023
[j3]Zhengji Li
, Yuexin Wu, Jin Yang
, Jiangchuan Chen
, Tianrui Li
:
Improving rating predictions with time-varying attention and dual-optimizer. Appl. Intell. 53(21): 26098-26109 (2023)
[j2]Xitong Chen
, Yuntao Wu, Jiangchuan Chen, Jiaming Wang, Kangli Zeng:
Efficient face image super-resolution with convenient alternating projection network. IET Signal Process. 17(4) (2023)- 2022
[c2]Tao Yang, Lingling He, Ziyu Liu, Jiangchuan Chen, Hongli Deng:
Evaluation algorithm of false index of social text for opinion leaders. CAIBDA 2022: 1-5
2010 – 2019
- 2019
[j1]Jiangchuan Chen, Jiajia Jiang, Dan Luo:
A Predictive and Evolutionary Approach for Cost-Effective and Deadline-Constrained Workflow Scheduling Over Distributed IaaS Clouds. Int. J. Web Serv. Res. 16(3): 78-94 (2019)- 2018
[c1]Xiaoning Sun, Jiangchuan Chen, Yunni Xia, Qiang He, Yuandou Wang, Xin Luo, Rongqing Zhang, Wuhong Han, Quanwang Wu:
A Fluctuation-Aware Approach for Predictive Web Service Composition. SCC 2018: 121-128
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-13 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







