Kai Shi

Orcid: 0000-0002-7174-7924

Affiliations:
  • Tianjin University, Department of Computer Science, China


According to our database1, Kai Shi authored at least 26 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Toward data efficient anomaly detection in heterogeneous edge-cloud environments using clustered federated learning.
Future Gener. Comput. Syst., 2025

2024
A privacy-preserving model for blockchain-based data sharing in the industrial internet.
Trans. Emerg. Telecommun. Technol., April, 2024

2023
Data Rights Verification in the Industrial Internet: A Securing Progressive Scheme with Locked-NFTs and Adaptive Federated Learning.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Malicious Process Identification via System Audit Logs Analysis.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Constructing Weighted Host Communication Networks for Intrusion Detection based on Complex Network Theory.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Incentive Mechanism for Federated Learning Participants Based on Statistical Analysis Features.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Research on Network Traffic Feature Map Generation and Evaluation Methods.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

A 3D CNN Model With 3d CBAM Layer For Micro-Expression Recognition.
Proceedings of the 2023 International Conference on Artificial Intelligence, 2023

2022
Improving Address Clustering in Bitcoin by Proposing Heuristics.
IEEE Trans. Netw. Serv. Manag., December, 2022

2021
Renyi entropy-based detection method for low-rate interest flooding attacks.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

A cache replacement strategy based on content features in named data networking.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2018
Optimal decision for a fuzzy supply chain with shrinkage under VaR criterion.
J. Intell. Fuzzy Syst., 2018

PM-RAD: An Efficient Restore Algorithm in Deduplication by Pattern Matching.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Loop Invariant Generation for Non-monotone Loop Structures.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2016
Extremal graphic model in optimizing fractional repetition codes for efficient storage repair.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reliability Analysis for Software Cluster Systems Based on Proportional Hazard Model.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An Enhanced TCP for Optimizing Channel Utilization in Dynamic Spectrum Access Networks.
Int. J. Grid High Perform. Comput., 2015

A Scenario-Based Reliability Analysis Approach for Component-Based Software.
IEICE Trans. Inf. Syst., 2015

2014
A fuzzy waiting time contract for patient's public health care.
J. Intell. Fuzzy Syst., 2014

2013
New pattern erasure codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Expander code: A scalable erasure-resilient code to keep up with data growth in distributed storage.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

2009
A Principal-Agent Method to Prevent Selfish MAC Layer Behavior in Wireless Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Receiver Centric Fuzzy Logic Congestion Control for TCP Throughput Improvement over Wireless Networks.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
RCP throughput modeling and performance improvement.
Proceedings of the 2008 Spring Simulation Multiconference, 2008


  Loading...