Leyi Shi

Orcid: 0000-0003-0460-1674

According to our database1, Leyi Shi authored at least 35 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
An ensemble system for machine learning IoT intrusion detection based on enhanced artificial hummingbird algorithm.
J. Supercomput., January, 2025

2024
Ethchecker: a context-guided fuzzing for smart contracts.
J. Supercomput., July, 2024

Game analysis and decision making optimization of evolutionary dynamic honeypot.
Comput. Electr. Eng., 2024

Exploiting self-evolutionary strategies of components for Dynamic Heterogeneous Redundancy.
Comput. Electr. Eng., 2024

2023
Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy.
IEEE Trans. Netw. Serv. Manag., December, 2023

2022
Exploring the characteristics of special issues: distribution, topicality, and citation impact.
Scientometrics, 2022

Identity Authentication Strategy of Mobile Crowd Sensing based on CFL.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

An Exploratory Study on Chinese Parents' Concerns about Preschoolers' Use of Digital Devices and Expectations for Digital Literacy Education.
Proceedings of the Crisis, Transition, Resilience: Re-imagining an information resilient society, 2022

A defense mechanism analysis for Dynamic Heterogeneous Redundancy.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
Modeling and Performance Analysis of Satellite Network Moving Target Defense System with Petri Nets.
Remote. Sens., 2021

From edge data to recommendation: A double attention-based deformable convolutional network.
Peer-to-Peer Netw. Appl., 2021

Worm computing: A blockchain-based resource sharing and cybersecurity framework.
J. Netw. Comput. Appl., 2021

Trust-aware generative adversarial network with recurrent neural network for recommender systems.
Int. J. Intell. Syst., 2021

IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments.
IEEE Access, 2021

Multi-dimensional LSTM: A Model of Network Text Classification.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
SACT: A New Model of Covert Communication Based on SDN.
Sensors, 2020

TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Double Attention-based Deformable Convolutional Network for Recommendation.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Netw. Comput. Appl., 2019

Mimicry honeypot: an evolutionary decoy system.
Int. J. High Perform. Comput. Netw., 2019

A Game-Theoretic Analysis for Distributed Honeypots.
Future Internet, 2019

Dynamic Distributed Honeypot Based on Blockchain.
IEEE Access, 2019

Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019

2018
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet Things J., 2018

Performance Analysis of Honeypot with Petri Nets.
Inf., 2018

Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags.
IEEE Access, 2018

2017
Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive Mob. Comput., 2017

2016
Patching by automatically tending to hub nodes based on social trust.
Comput. Stand. Interfaces, 2016

2014
A decentralized and personalized spam filter based on social computing.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

An ACO-Based Trust Inference Algorithm.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Automatic Patching Based on Social Computing in P2P Network.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

A Dynamic Trust Conference Algorithm for Social Network.
Proceedings of the Eighth International Conference on P2P, 2013

2012
An Improved Anti-collision Algorithm for ISO15693 RFID Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2008
Full Service Hopping for Proactive Cyber-Defense.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Port and Address Hopping for Active Cyber-Defense.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007


  Loading...