Lijuan Xu
YOU?
Author Swipe
View article: Classification and influencing factors of family resilience and posttraumatic growth in patients with spinal tumor: a cross-sectional study
Classification and influencing factors of family resilience and posttraumatic growth in patients with spinal tumor: a cross-sectional study Open
Patients with spinal tumors demonstrate distinct profiles of family resilience and PTG. Factors such as coping ability and social support play key roles in determining patient classification. These findings highlight the importance of stra…
View article: Correction: Xu et al. Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks. Electronics 2023, 12, 4817
Correction: Xu et al. Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks. Electronics 2023, 12, 4817 Open
The journal has corrected the article “Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks” [...]
View article: A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing
A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing Open
Network protocol syntax information plays a crucial role in grammar-based fuzzing. Current network protocol syntax extraction methods are less versatile, inefficient, and the extracted information is not comprehensive. This paper proposes …
View article: Growth reduction of Vibrionaceae and microflora diversification in ice-stored Pacific white shrimp (Penaeus vannamei) treated with low-frequency electric field
Growth reduction of Vibrionaceae and microflora diversification in ice-stored Pacific white shrimp (Penaeus vannamei) treated with low-frequency electric field Open
A novel storage technique combining low-frequency electric field (LFEF) and ice temperature was applied to extend the shelf life of Pacific white shrimp ( Penaeus vannamei ). Changes in microbial community composition was investigated in P…
View article: Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks
Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks Open
Android malware detection is a critical research field due to the increasing prevalence of mobile devices and apps. Improved methods are necessary to address Android apps’ complexity and malware’s elusive nature. We propose an approach for…
View article: A Malware Detection Framework Based on Semantic Information of Behavioral Features
A Malware Detection Framework Based on Semantic Information of Behavioral Features Open
As the amount of malware has grown rapidly in recent years, it has become the most dominant attack method in network security. Learning execution behavior, especially Application Programming Interface (API) call sequences, has been shown t…
View article: Effect of low-frequency electric field on microbial community structure of Pacific white shrimp (Penaeus vannamei) during ice-temperature storage
Effect of low-frequency electric field on microbial community structure of Pacific white shrimp (Penaeus vannamei) during ice-temperature storage Open
Low-frequency electric field (LFEF) is a potential adjuvant technology for low-temperature preservation that can stabilize the supercooling state while delaying corruption and extending the shelf life. Changes in microbial community compos…
View article: Image-Based Malware Classification Method with the AlexNet Convolutional Neural Network Model
Image-Based Malware Classification Method with the AlexNet Convolutional Neural Network Model Open
In recent years, malware has experienced explosive growth and has become one of the most severe security threats. However, feature engineering easily restricts the traditional machine learning methods-based malware classification and is ha…
View article: 3D printed thermo-responsive electroconductive hydrogel and its application for motion sensor
3D printed thermo-responsive electroconductive hydrogel and its application for motion sensor Open
Stimulus-responsive hydrogels with excellent conductivity have been widely used in electrical, electrochemical, biomedical, and other fields. It is still a challenge to prepare gels with high conductivity. In this paper, poly (N-isopropyl …
View article: A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal–Spatial Data
A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal–Spatial Data Open
Anomaly detection in multivariate time series is an important problem with applications in several domains. However, the key limitation of the approaches that have been proposed so far lies in the lack of a highly parallel model that can f…
View article: Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization Open
With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important…
View article: Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm
Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm Open
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi-step attacks. The complexity of multi-step attacks makes it difficult for security protection personnel to effectively determine the targe…
View article: Optimal Defense Strategy Selection Algorithm Based on Reinforcement Learning and Opposition-Based Learning
Optimal Defense Strategy Selection Algorithm Based on Reinforcement Learning and Opposition-Based Learning Open
Industrial control systems (ICS) are facing increasing cybersecurity issues, leading to enormous threats and risks to numerous industrial infrastructures. In order to resist such threats and risks, it is particularly important to scientifi…
View article: Characterization of hot deformation and microstructure evolution of a new metastable β titanium alloy
Characterization of hot deformation and microstructure evolution of a new metastable β titanium alloy Open
The hot deformation characteristics of as-forged Ti−3.5Al−5Mo−6V−3Cr−2Sn−0.5Fe−0.1B−0.1C alloy within a temperature range from 750 to 910 °C and a strain rate range from 0.001 to 1 s−1 were investigated by hot compression tests. The stress…
View article: Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph Open
By violating semantic constraints that the control process impose, the semantic attack leads the Industry Control Systems (ICS) into an undesirable state or critical state. The spread of semantic attack has caused huge economic losses and …
View article: Method to Evaluate the Resistance–Capacitance Voltage Divider and Uncertainty Analysis
Method to Evaluate the Resistance–Capacitance Voltage Divider and Uncertainty Analysis Open
The resistance and capacitance parameters of a resistance–capacitance divider may change due to factors such as long-term operation, internal insulation flashover, and dielectric breakdown, which will affect the measurement characteristics…
View article: Fixed-Time Synchronization Analysis for Complex-Valued Neural Networks via a New Fixed-Time Stability Theorem
Fixed-Time Synchronization Analysis for Complex-Valued Neural Networks via a New Fixed-Time Stability Theorem Open
Based on variable substitution, calculating definite integral and solving the minimization problem, in this paper we establish a new fixed-time stability theorem, which can provide a novel upper bound estimate formula for the settling time…
View article: The improved properties and microstructure of β-solidify TiAl alloys by boron addition and multi steps forging process
The improved properties and microstructure of β-solidify TiAl alloys by boron addition and multi steps forging process Open
A novel forging process has been designed for better mechanical properties of Ti-43Al-6Nb-1Mo-1Cr-(0,0.6)B alloys in this paper. Multi step forging process could provide much finer microstructure, higher room-temperature strength, increase…
View article: Secure Virtualization Environment Based on Advanced Memory Introspection
Secure Virtualization Environment Based on Advanced Memory Introspection Open
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtual machine under the assumption that the operating system (OS) version and kernel structure information are known at the hypervisor level. I…
View article: Applying the Method for Solving Traveling Salesman Problem Based on Backtracking Algorithm to Order Picking
Applying the Method for Solving Traveling Salesman Problem Based on Backtracking Algorithm to Order Picking Open
In the distribution center, the way of order picking personnel to pick goods has two kinds: single picking and batch picking. Based on the way of the single picking and assumed warehouse model, in order to reduce the walking path of order …