Shi Dong

Orcid: 0000-0003-4616-6519

Affiliations:
  • Zhoukou Normal University, Zhoukou, China


According to our database1, Shi Dong authored at least 49 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Hybrid Blockchain-Based Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., November, 2024

Network Abnormal Traffic Detection Framework Based on Deep Reinforcement Learning.
IEEE Wirel. Commun., June, 2024

Android Malware Detection Method Based on CNN and DNN Bybrid Mechanism.
IEEE Trans. Ind. Informatics, May, 2024

SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning.
IEEE Internet Things J., May, 2024

An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs.
Veh. Commun., 2024

Task offloading strategies for mobile edge computing: A survey.
Comput. Networks, 2024

Dual Frequency-based Temporal Sequential Recommendation.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

Multi-temporal Sequential Recommendation Model Based on the Fused Learning Preferences.
Int. J. Comput. Intell. Syst., December, 2023

Android Malware Detection Methods Based on Convolutional Neural Network: A Survey.
IEEE Trans. Emerg. Top. Comput. Intell., October, 2023

A-CAVE: Network abnormal traffic detection algorithm based on variational autoencoder.
ICT Express, October, 2023

Quantum Particle Swarm Optimization for Task Offloading in Mobile Edge Computing.
IEEE Trans. Ind. Informatics, August, 2023

A systematic mapping study on machine learning methodologies for requirements management.
IET Softw., August, 2023

Network traffic identification in packet sampling environment.
Digit. Commun. Networks, August, 2023

A Novel Temporal Network-Embedding Algorithm for Link Prediction in Dynamic Networks.
Entropy, February, 2023

Blockchain technology and application: an overview.
PeerJ Comput. Sci., 2023

Predicting the Future Popularity of Academic Publications Using Deep Learning by Considering It as Temporal Citation Networks.
IEEE Access, 2023

Co-Evolving Popularity Prediction in Temporal Bipartite Networks: A Heuristics Based Model.
IEEE Access, 2023

Aspect-level Sentiment Analysis Based on Convolutional Network with Dependency Tree.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

A Novel Interaction Convolutional Network Based on Dependency Trees for Aspect-Level Sentiment Analysis.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Evolutionary Algorithm for Selecting Dynamic Signatures Partitioning Approach.
J. Artif. Intell. Soft Comput. Res., 2022

NOCD: a new overlapping community detection algorithm based on improved KNN.
J. Ambient Intell. Humaniz. Comput., 2022

Traffic identification model based on generative adversarial deep convolutional network.
Ann. des Télécommunications, 2022

An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural Networks.
Proceedings of the IEEE International Performance, 2022

2021
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., 2021

Distributed Data Gathering Algorithm Based on Spanning Tree.
IEEE Syst. J., 2021

Weber's law based multi-level convolution correlation features for image retrieval.
Multim. Tools Appl., 2021

Improved influential nodes identification in complex networks.
J. Intell. Fuzzy Syst., 2021

Multi class SVM algorithm with active learning for network traffic classification.
Expert Syst. Appl., 2021

A survey on deep learning and its applications.
Comput. Sci. Rev., 2021

Application of network link prediction in drug discovery.
BMC Bioinform., 2021

Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2020
Improving Positioning Algorithm Based on RSSI.
Wirel. Pers. Commun., 2020

TempNodeEmb: Temporal Node Embedding considering temporal edge influence matrix.
CoRR, 2020

Improved label propagation algorithm for overlapping community detection.
Computing, 2020

Entropy-based outlier detection using spark.
Clust. Comput., 2020

Energy-efficient scheme based on user task characteristic in virtual cloud platform.
Clust. Comput., 2020

DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks.
IEEE Access, 2020

2019
Traffic identification method based on multiple probabilistic neural network model.
Neural Comput. Appl., 2019

A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments.
IEEE Access, 2019

2018
Microblog Sentiment Analysis Method Based on Spectral Clustering.
J. Inf. Process. Syst., 2018

2017
A new routing algorithm based on opportunistic networks.
Int. J. Inf. Commun. Technol., 2017

Research on efficient-efficient routing protocol for WSNs based on improved artificial bee colony algorithm.
IET Wirel. Sens. Syst., 2017

Feature selection algorithm based on correlation between muti metric network traffic flow features.
Int. Arab J. Inf. Technol., 2017

2016
A time-slice optimization based weak feature association algorithm for video condensation.
Multim. Tools Appl., 2016

2014
Auto Adaptive Identification Algorithm Based on Network Traffic Flow.
Int. J. Comput. Commun. Control, 2014

2013
Network traffic prediction based on ARFIMA model
CoRR, 2013

2012
Measure Correlation Analysis of Network Flow Based On Symmetric Uncertainty.
KSII Trans. Internet Inf. Syst., 2012

2011
Classification of UDP traffic from P2P applications.
Proceedings of the 17th IEEE International Conference on Networks, 2011


  Loading...