Jiangyong Shi
According to our database1,
Jiangyong Shi
authored at least 19 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Defending against Adversarial Attacks in Federated Learning on Metric Learning Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
2022
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
2021
Comput. Syst. Sci. Eng., 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021
2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 8th International Conference on Communication and Network Security, 2018
2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection.
Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
2013
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Proceedings of the Information and Communications Security - 15th International Conference, 2013