Shanshan Tu

Orcid: 0000-0002-6220-4119

Affiliations:
  • Beijing University of Post and Telecommunication, Computer Science Department, China
  • Beijing University of Technology, Faculty of Information Technology, China


According to our database1, Shanshan Tu authored at least 97 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment.
IEEE Trans. Veh. Technol., August, 2024

EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing.
IEEE Trans. Mob. Comput., May, 2024

Emotion detection using convolutional neural network and long short-term memory: a deep multimodal framework.
Multim. Tools Appl., May, 2024

A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem.
IEEE Trans. Mob. Comput., February, 2024

Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization.
IEEE Trans. Computers, January, 2024

Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure.
PeerJ Comput. Sci., 2024

2023
DRL-Driven Joint Task Offloading and Resource Allocation for Energy-Efficient Content Delivery in Cloud-Edge Cooperation Networks.
IEEE Trans. Veh. Technol., December, 2023

Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security.
IEEE Trans. Intell. Transp. Syst., December, 2023

On the Effect of Emotion Identification from Limited Translated Text Samples Using Computational Intelligence.
Int. J. Comput. Intell. Syst., December, 2023

A novel routing optimization strategy based on reinforcement learning in perception layer networks.
Comput. Networks, December, 2023

Cyberattacks and Security of Cloud Computing: A Complete Guideline.
Symmetry, November, 2023

Secure Internet of Vehicles (IoV) With Decentralized Consensus Blockchain Mechanism.
IEEE Trans. Veh. Technol., September, 2023

LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things.
IEEE Internet Things J., July, 2023

Cooperative Computational Offloading in Mobile Edge Computing for Vehicles: A Model-Based DNN Approach.
IEEE Trans. Veh. Technol., March, 2023

Defense scheme against advanced persistent threats in mobile fog computing security.
Comput. Networks, February, 2023

A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks.
IEEE Trans. Serv. Comput., 2023

Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing.
IEEE Trans. Serv. Comput., 2023

Cloud-based Smart Parking System using Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Distance Vector and Prominent Reliable Path Selection based Stochastic Routing in Distributed Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Facial Expression Recognition from Occluded Images Using Deep Convolution Neural Network with Vision Transformer.
Proceedings of the Image and Graphics - 12th International Conference, 2023

An improved particle swarm optimization algorithm for P300 Neural network recognizer.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Multi-User Identity Authentication in Wireless Communication Based on Deep Learning and Data Augmentation.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private Blockchain.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

A Hybrid Deep Learning Model for Breast Cancer Detection and Classification.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Physical Layer Authentication Based on Transformer.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
Relay Hybrid Precoding in UAV-Assisted Wideband Millimeter-Wave Massive MIMO System.
IEEE Trans. Wirel. Commun., 2022

Non-Acted Text and Keystrokes Database and Learning Methods to Recognize Emotions.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks.
IEEE Trans. Comput. Soc. Syst., 2022

SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing.
Peer-to-Peer Netw. Appl., 2022

A novel energy-based online sequential extreme learning machine to detect anomalies over real-time data streams.
Neural Comput. Appl., 2022

Deep-Reinforcement-Learning-Based Resource Allocation for Content Distribution in Fog Radio Access Networks.
IEEE Internet Things J., 2022

A state-of-the-art technique to perform cloud-based semantic segmentation using deep learning 3D U-Net architecture.
BMC Bioinform., 2022

The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges.
Artif. Intell. Rev., 2022

Intelligent Task Offloading for Smart Devices in Mobile Edge Computing.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Enhancing Security in The Internet of Things Ecosystem using Reinforcement Learning and Blockchain.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Trusted connection architecture of electric IoT.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Character-level domain name generation algorithm based on ED-GAN.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Consensus Algorithm Based on Subject Credit.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Fast identification method of malicious code based on extreme learning machine.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

An Improved dynamic functional connectivity and deep neural network model for Autism Spectrum Disorder Classification.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022

Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A Post-quantum Secure Aggregation for Federated Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

SPoW: A solution to the problem of centralization of computing power.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A Spatial-Temporal Integration Analysis to Classify Dynamic Functional Connectivity for Brain Disease Diagnosis.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing.
Proceedings of the International Conference on Computer, 2022

Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment.
Proceedings of the International Conference on Computer, 2022

2021
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications.
IEEE Trans. Veh. Technol., 2021

ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition.
Soft Comput., 2021

A Hybrid Deep CNN Model for Abnormal Arrhythmia Detection Based on Cardiac ECG Signal.
Sensors, 2021

EEMDS: An Effective Emergency Message Dissemination Scheme for Urban VANETs.
Sensors, 2021

A fusing framework of shortcut convolutional neural networks.
Inf. Sci., 2021

An Evolutionary Computing-Based Efficient Hybrid Task Scheduling Approach for Heterogeneous Computing Environment.
J. Grid Comput., 2021

Efficient dynamic multi-replica auditing for the cloud with geographic location.
Future Gener. Comput. Syst., 2021

Utilizing 3D joints data extracted through depth camera to train classifiers for identifying suicide bomber.
Expert Syst. Appl., 2021

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing.
Comput. Networks, 2021

An In-ad contents-based viewability prediction framework using Artificial Intelligence for Web Ads.
Artif. Intell. Rev., 2021

Recent Development, Trends and Challenges in IoT Security.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

Deep Learning Models for Intelligent Healthcare: Implementation and Challenges.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
Multiple instance deep learning for weakly-supervised visual object tracking.
Signal Process. Image Commun., 2020

The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020

Human-computer interaction based on face feature localization.
J. Vis. Commun. Image Represent., 2020

Optimisation-based training of evolutionary convolution neural network for visual classification applications.
IET Comput. Vis., 2020

Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
IET Commun., 2020

Deep Learning Techniques for Future Intelligent Cross-Media Retrieval.
CoRR, 2020

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020

Tracking area list allocation scheme based on overlapping community algorithm.
Comput. Networks, 2020

A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications.
IEEE Access, 2020

Hybrid Precoding Design for Two-Way Relay-Assisted Terahertz Massive MIMO Systems.
IEEE Access, 2020

Implementation and Use of Disease Diagnosis Systems for Electronic Medical Records Based on Machine Learning: A Complete Review.
IEEE Access, 2020

An Efficient Non-Toxic and Non-Corrosive Perovskite Solar Cell.
IEEE Access, 2020

An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Service Completion Probability Enhancement and Fairness for SUs using Hybrid Mode CRNs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Intelligent attack defense scheme based on DQL algorithm in mobile fog computing.
J. Vis. Commun. Image Represent., 2019

Unsupervised pre-trained filter learning approach for efficient convolution neural network.
Neurocomputing, 2019

Tracking areas planning based on spectral clustering in small cell networks.
IET Commun., 2019

Water Preservation in Soan River Basin using Deep Learning Techniques.
CoRR, 2019

A Fast-Convergent Detector Based on Joint Jacobi and Richardson Method for Uplink Massive MIMO Systems.
Proceedings of the 28th Wireless and Optical Communications Conference, 2019

Learning a Semantic Space for Modeling Images, Tags and Feelings in Cross-Media Search.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019

2018
Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
IEEE Access, 2018

FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network.
IEEE Access, 2018

SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network.
IEEE Access, 2018

A Benchmark Dataset and Learning High-Level Semantic Embeddings of Multimedia for Cross-Media Retrieval.
IEEE Access, 2018

A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems.
IEEE Access, 2018

PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments.
IEEE Access, 2018

Facebook5k: A Novel Evaluation Resource Dataset for Cross-Media Search.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Abnormal Behavior Clustering Algorithm Based on K-means.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018

2017
CSFL: A novel unsupervised convolution neural network approach for visual pattern classification.
AI Commun., 2017

2016
A fine-grained access control and revocation scheme on clouds.
Concurr. Comput. Pract. Exp., 2016

2012
Fine-grained Access Control and Revocation for Sharing Data on Clouds.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012


  Loading...