Shudong Li
Orcid: 0000-0001-6381-1984
According to our database1,
Shudong Li
authored at least 77 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Multim. Comput. Commun. Appl., November, 2024
MFLink: User Identity Linkage Across Online Social Networks via Multimodal Fusion and Adversarial Learning.
IEEE Trans. Emerg. Top. Comput. Intell., October, 2024
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning.
IEEE Trans. Intell. Transp. Syst., September, 2024
2023
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion.
IEEE Internet Things J., September, 2023
BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection.
World Wide Web (WWW), July, 2023
A Deceptive Reviews Detection Method Based on Multidimensional Feature Construction and Ensemble Feature Selection.
IEEE Trans. Comput. Soc. Syst., February, 2023
Cogn. Comput., January, 2023
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Netw. Sci. Eng., 2023
Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning.
IEEE Trans. Intell. Transp. Syst., 2023
Appl. Math. Comput., 2023
OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers.
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
A Social Bot Detection Method Using Multi-features Fusion and Model Optimization Strategy.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
2022
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm.
IEEE Trans. Netw. Serv. Manag., December, 2022
Int. J. Semantic Web Inf. Syst., 2022
Comput. Electron. Agric., 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
A Review of Provenance Graph based APT Attack Detection: Applications and Developments.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021
Comparison of Muscle Activity and Ultrasound Response of Lower Extremity Muscles During Treadmill and Track Running.
J. Medical Imaging Health Informatics, 2021
The biomechanical characteristics of a feline distal forelimb: A finite element analysis study.
Comput. Biol. Medicine, 2021
Appl. Math. Comput., 2021
Detection method for individual pig based on improved YOLOv4 Convolutional Neural Network.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
An android malware detection approach using multi-feature fusion and TF-IDF algorithm.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
World Wide Web, 2020
Investigating the co-evolution of node reputation and edge-strategy in prisoner's dilemma game.
Appl. Math. Comput., 2020
Appl. Math. Comput., 2020
IEEE Access, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Building framework for selecting finite element models of complex large welded structure of railway vehicles.
Simul. Model. Pract. Theory, 2019
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019
Multim. Tools Appl., 2019
J. Medical Syst., 2019
Investigation of epidemic spreading process on multiplex networks by incorporating fatal properties.
Appl. Math. Comput., 2019
Appl. Math. Comput., 2019
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access, 2019
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
2018
J. Robotics Netw. Artif. Life, 2018
J. Comput. Sci., 2018
IEEE Access, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Approximation Algorithms for Controller Placement Problems in Software Defined Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Stress distribution of metatarsals during forefoot strike versus rearfoot strike: A finite element study.
Comput. Biol. Medicine, 2017
A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Neurocomputing, 2016
2015
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2015
2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013
A MapReduce and Information Compression Based Social Community Structure Mining Method.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
Secur. Commun. Networks, 2012
Comput. Optim. Appl., 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
2011
Application of equipment maintenance vehicles based on entropy multi-objective decision.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011