scispace - formally typeset
W

Wenjiang Ji

Researcher at Xi'an University of Science and Technology

Publications -  52
Citations -  320

Wenjiang Ji is an academic researcher from Xi'an University of Science and Technology. The author has contributed to research in topics: Cloud computing & Computer science. The author has an hindex of 6, co-authored 46 publications receiving 137 citations. Previous affiliations of Wenjiang Ji include Civil Aviation University of China.

Papers
More filters
Journal ArticleDOI

Motion trajectory prediction based on a CNN-LSTM sequential model

TL;DR: Experimental results demonstrate that the proposed CNN-LSTM method is more accurate and features a shorter time cost, which meets the prediction requirements and provides an effective method for the safe operation of unmanned systems.
Journal ArticleDOI

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

TL;DR: This paper considers cheating problem in bivariate polynomial based secret sharing scheme, and proposes two cheating identification algorithms respectively that are efficient with respect of cheater identification capabilities and achieves stronger capability of cheating identification with the collaboration of the rest n − m users who are not involved in secret reconstruction.
Journal ArticleDOI

A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G

TL;DR: This article proposes a novel IoV block-streaming service awareness and trusted verification in 6 G, combined with identity-based blind signature technology, which can realize the mutual authentication of IoV devices and edge servers while keeping the user's real identity information confidential.
Journal ArticleDOI

Towards energy efcient cloud: an optimized ant colony model for virtual machine placement

TL;DR: A virtual machine placement optimization model based on optimized ant colony algorithm is proposed, able to determine the physical machines suitable for hosting migrated virtual machines and solves the problem of redundant power consumption resulting from idle resource waste of physical machines.
Journal ArticleDOI

Dynamic game model of botnet DDoS attack and defense

TL;DR: A novel game theory-based model is proposed to describe the scenario, in which the botmaster launching Distributed Denial of Service attacks using a botnet while the defender equipped a firewall defending, and it is helpful to evaluate defense ability of the defender towards current botmaster attacks by analyzing attack log in sandbox.