Shen Su

Orcid: 0000-0003-2744-3584

According to our database1, Shen Su authored at least 67 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
LGTDA: Bandwidth exhaustion attack on Ethereum via dust transactions.
Future Gener. Comput. Syst., 2025

2024
Wind power prediction method based on cloud computing and data privacy protection.
J. Cloud Comput., December, 2024

BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024

A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS.
J. Signal Process. Syst., March, 2024

Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024

Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles.
Comput. Networks, 2024

Ada-FFL: Adaptive computing fairness federated learning.
CAAI Trans. Intell. Technol., 2024

2023
Prediction of venting gas explosion overpressure based on a combination of explosive theory and machine learning.
Expert Syst. Appl., December, 2023

A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023

Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023

C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language Models.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Smart Contract Vulnerability Detection Model Based on Siamese Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

2021
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021

Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding.
Future Gener. Comput. Syst., 2021

2020
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks.
IEEE Wirel. Commun., 2020

Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020

User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020

A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range.
KSII Trans. Internet Inf. Syst., 2020

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020

A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020

Wearable-sensors Based Activity Recognition for Smart Human Healthcare Using Internet of Things.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A defense scheme of voice control system against DolphinAttack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019

Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019

Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

Towards Privacy-Preserving Location Sharing over Mobile Online Social Networks.
IEICE Trans. Inf. Syst., 2019

A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019

Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019

Broken Bike Recycling Planning for Sharing Bikes System.
IEEE Access, 2019

Preserving Location Privacy in Mobile Edge Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018

A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018

A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.
Int. J. Netw. Manag., 2018

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018

Enhancing Location Privacy for Geolocation Service Through Perturbation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Insider Threat Detection Using Characterizing User Behavior.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Predicting the Popularity of Online Content Based on the Weak Ties Theory.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

A Location Privacy-Aware Method for kNN Query in Location Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A Proactive Service Model Facilitating Stream Data Fusion and Correlation.
Int. J. Web Serv. Res., 2017

Service Hyperlink: Modeling and Reusing Partial Process Knowledge by Mining Event Dependencies among Sensor Data Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

An Approach to Modeling and Discovering Event Correlation for Service Collaboration.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

A Proactive Data Service Model to Encapsulating Stream Sensor Data into Service.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Extracting Log Patterns Based on Association Analysis for Power Quality Disturbance Detection.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense.
IEICE Trans. Inf. Syst., 2016

Towards Route Dynamics in AS-Level Path Prediction.
IEICE Trans. Commun., 2016

CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Shrinking the Sentiment Analysis for Signed Network Construction.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Lightweight Model for Stream Sensor Data Service.
Proceedings of the Advances in Services Computing, 2016

2015
Towards real-time route leak events detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Online Detection of Concurrent Prefix Hijacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Quantifying AS-level routing policy changes.
Proceedings of the IEEE International Conference on Communications, 2014

Contention-based adaptive position update for intermittently connected VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

2011
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement.
IEEE J. Sel. Areas Commun., 2011


  Loading...