Shancang Li

Orcid: 0000-0001-5663-7420

According to our database1, Shancang Li authored at least 103 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dancing with the sound in edge computing environments.
Wirel. Networks, July, 2024

Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions.
J. Ind. Inf. Integr., March, 2024

Live Power Generation Predictions via AI-Driven Resilient Systems in Smart Microgrids.
IEEE Trans. Consumer Electron., February, 2024

Lightweight privacy-preserving predictive maintenance in 6G enabled IIoT.
J. Ind. Inf. Integr., 2024

2023
Blockchain-based Zero Trust Cybersecurity in the Internet of Things.
ACM Trans. Internet Techn., August, 2023

Data Privacy Enhancing in the IoT User/Device Behavior Analytics.
ACM Trans. Sens. Networks, May, 2023

Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Deep Learning Enabled Keystroke Eavesdropping Attack Over Videoconferencing Platforms.
Proceedings of the IEEE INFOCOM 2023, 2023

Hybrid cyber threats detection using explainable AI in Industrial IoT.
Proceedings of the International Conference on Human-Centered Cognitive Systems, 2023

Human-centric Artificial Intelligence enabled Digital Images and Videos Forensic Triage.
Proceedings of the International Conference on Human-Centered Cognitive Systems, 2023

2022
Microservices priority estimation for IoT platform based on analytic hierarchy process and fuzzy comprehensive method.
World Wide Web, 2022

A Secure and Anonymous Communicate Scheme over the Internet of Things.
ACM Trans. Sens. Networks, 2022

Edge-Based Collaborative Training System for Artificial Intelligence-of-Things.
IEEE Trans. Ind. Informatics, 2022

Robust Collaborative Filtering Recommendation With User-Item-Trust Records.
IEEE Trans. Comput. Soc. Syst., 2022

SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control.
IEEE Trans. Comput. Soc. Syst., 2022

An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite-Assisted Internet of Things.
IEEE Trans. Aerosp. Electron. Syst., 2022

Multi-Model Running Latency Optimization in an Edge Computing Paradigm.
Sensors, 2022

Privacy-Preserving Federated Deep Learning for Cooperative Hierarchical Caching in Fog Computing.
IEEE Internet Things J., 2022

Lightweight Privacy-Preserving Scheme Using Homomorphic Encryption in Industrial Internet of Things.
IEEE Internet Things J., 2022

Intelligent algorithm for dynamic functional brain network complexity from CN to AD.
Int. J. Intell. Syst., 2022

A long short-term memory-based model for greenhouse climate prediction.
Int. J. Intell. Syst., 2022

ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
Entropy, 2022

An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds.
Comput. J., 2022

2021
Image Source Identification Using Convolutional Neural Networks in IoT Environment.
Wirel. Commun. Mob. Comput., 2021

Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing.
IEEE Trans. Netw. Sci. Eng., 2021

A Stream Processing Framework Based on Linked Data for Information Collaborating of Regional Energy Networks.
IEEE Trans. Ind. Informatics, 2021

Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things.
IEEE Trans. Comput. Soc. Syst., 2021

Visual-Textual Sentiment Analysis Enhanced by Hierarchical Cross-Modality Interaction.
IEEE Syst. J., 2021

ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities.
Secur. Commun. Networks, 2021

Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey.
Secur. Commun. Networks, 2021

Influencing factors analysis in pear disease recognition using deep learning.
Peer-to-Peer Netw. Appl., 2021

Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment.
Mob. Networks Appl., 2021

Multi-scale skip-connection network for image super-resolution.
Multim. Syst., 2021

A novel conflict detection method for ABAC security policies.
J. Ind. Inf. Integr., 2021

Privacy-preserving using homomorphic encryption in Mobile IoT systems.
Comput. Commun., 2021

2020
An LSH-based Offloading Method for IoMT Services in Integrated Cloud-Edge Environment.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Symmetry Degree Measurement and its Applications to Anomaly Detection.
IEEE Trans. Inf. Forensics Secur., 2020

Computational Intelligence Enabled Cybersecurity for the Internet of Things.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Venue2Vec: An Efficient Embedding Model for Fine-Grained User Location Prediction in Geo-Social Networks.
IEEE Syst. J., 2020

Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques.
Secur. Commun. Networks, 2020

Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model.
Secur. Commun. Networks, 2020

Machine Learning Based Activity Learning for Behavioral Contexts in Internet of Things (IoT).
Program. Comput. Softw., 2020

Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud.
Mob. Networks Appl., 2020

A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model.
Mob. Networks Appl., 2020

Spatial-temporal data-driven service recommendation with privacy-preservation.
Inf. Sci., 2020

Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment.
Comput. Commun., 2020

A Convolutional Neural Network for Image Super-Resolution Using Internal Dataset.
IEEE Access, 2020

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020

2019
Blockchain Enabled Industrial Internet of Things Technology.
IEEE Trans. Comput. Soc. Syst., 2019

Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT.
IEEE Trans. Comput. Soc. Syst., 2019

Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems.
IEEE Trans. Comput. Soc. Syst., 2019

Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities.
Sensors, 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Secur. Commun. Networks, 2019

Time-aware distributed service recommendation with privacy-preservation.
Inf. Sci., 2019

Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems.
IEEE Internet Things J., 2019

IoT Forensics: Amazon Echo as a Use Case.
IEEE Internet Things J., 2019

Local experts finding using user comments in location-based social networks.
Trans. Emerg. Telecommun. Technol., 2019

A Heuristic Offloading Method for Deep Learning Edge Services in 5G Networks.
IEEE Access, 2019

Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation.
IEEE Access, 2019

Social Relationships and Temp-Spatial Behaviors Based Community Discovery to Improve Cyber Security Practices.
IEEE Access, 2019

A Novel Color Image Watermarking Algorithm Based on Digital Signature.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Lightweight Encryption Algorithm Containing SPN Structure for IoT.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems.
IEEE Trans. Comput. Soc. Syst., 2018

An IoT-Oriented data placement method with privacy preservation in cloud environment.
J. Netw. Comput. Appl., 2018

5G Internet of Things: A survey.
J. Ind. Inf. Integr., 2018

Local spatial obesity analysis and estimation using online social network sensors.
J. Biomed. Informatics, 2018

MIAEC: Missing Data Imputation Based on the Evidence Chain.
IEEE Access, 2018

Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management.
IEEE Access, 2018

Forensic Analysis of Digital Images over Smart Devices and Online Social Networks.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Industrial wireless sensor networks 2016.
Int. J. Distributed Sens. Networks, 2017

A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
IEEE Trans. Cybern., 2016

Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations.
IEEE Trans. Cybern., 2016

The Internet of Things: a security point of view.
Internet Res., 2016

2015
The internet of things: a survey.
Inf. Syst. Frontiers, 2015

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Internet of Things in Industries: A Survey.
IEEE Trans. Ind. Informatics, 2014

A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014

QoS-Aware Scheduling of Services-Oriented Internet of Things.
IEEE Trans. Ind. Informatics, 2014

Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks.
IEEE Syst. J., 2014

Local Semidefinite Programming-Based Node Localization System for Wireless Sensor Network Applications.
IEEE Syst. J., 2014

Industrial Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Managing cyber security risks in industrial control systems with game theory and viable system modelling.
Proceedings of the 9th International Conference on System of Systems Engineering, 2014

2013
Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things.
IEEE Trans. Ind. Informatics, 2013

A Continuous Biomedical Signal Acquisition System Based on Compressed Sensing in Body Sensor Networks.
IEEE Trans. Ind. Informatics, 2013

Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets.
IEEE Syst. J., 2013

2012
Manifold learning-based automatic signal identification in cognitive radio networks.
IET Commun., 2012

Polychromatic set theory-based spectrum access in cognitive radios.
IET Commun., 2012

Efficient blind spectrum sensing for cognitive radio networks based on compressed sensing.
EURASIP J. Wirel. Commun. Netw., 2012

Integration of hybrid wireless networks in cloud services oriented enterprise information systems.
Enterp. Inf. Syst., 2012

2011
A novel gait recognition analysis system based on body sensor networks for patients with Parkinson's disease.
Int. J. Commun. Networks Distributed Syst., 2011

Multipath Routing for Video Streaming inWireless Mesh Networks.
Ad Hoc Sens. Wirel. Networks, 2011

2010
Source nodes localisation algorithm for large-scale wireless sensor networks using self-organising isometric mapping.
Int. J. Sens. Networks, 2010

QoS scheme for multimedia multicast communications over wireless mesh networks.
IET Commun., 2010

A high performance congestion control scheme for streaming transmission over wireless mesh networks.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

2009
An adaptive distributed localisation in wireless sensor network.
Enterp. Inf. Syst., 2009

2008
Node localisation in wireless sensor network based on self-organising isometric embedding.
Enterp. Inf. Syst., 2008

2007
A Novel Manifold Learning Algorithm for Localization Estimation in Wireless Sensor Networks.
IEICE Trans. Commun., 2007

A decision support system for product design in concurrent engineering.
Decis. Support Syst., 2007

2006
A Formal Modeling Method based on CPN.
Proceedings of the IEEE International Conference on Systems, 2006

Modeling and Analyzing Concurrent Design Process for Manufacturing Enterprise Information Systems.
Proceedings of the IEEE International Conference on Systems, 2006

A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006


  Loading...