Wei Shi
Orcid: 0000-0002-3071-8350Affiliations:
- Carleton University, School of Infermation Technology, Faculty of Engineering and Design, Ottawa, ON, Canada
- University of Ontario Institute of Technology, Oshawa, ON, Canada (2008 - 2016)
- Algonquin College of Applied Arts and Technology, Ottawa, ON, Canada (2007 - 2008)
- Carleton University, School of Computer Science, Ottawa, ON, Canada (PhD 2007)
According to our database1,
Wei Shi
authored at least 102 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Blockchain-Based Intelligence Networking for Cooperative Positioning Towards Future Internet of Vehicles.
IEEE Trans. Veh. Technol., March, 2024
Balancing Power Grids and Maximizing Revenue: A Novel Approach to Rebate Auctions for Cloud Workload Migrations.
IEEE Access, 2024
Proceedings of the Progress in Artificial Intelligence, 2024
An Enhanced Combinatorial Contextual Neural Bandit Approach for Client Selection in Federated Learning.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
IEEE Open J. Commun. Soc., 2023
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023
IEEE Access, 2023
Proceedings of the Intelligent Systems and Applications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Enhancing Writing Style Change Detection using Transformer-based Models and Data Augmentation.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2023), 2023
2022
RD-IOD: Two-Level Residual-Distillation-Based Triple-Network for Incremental Object Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2022
Multiaccess Edge Integrated Networking for Internet of Vehicles: A Blockchain-Based Deep Compressed Cooperative Learning Approach.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Netw., 2022
J. Comput. Sci. Technol., 2022
IET Cyper-Phys. Syst.: Theory & Appl., 2022
Network intrusion detection using machine learning approaches: Addressing data imbalance.
IET Cyper-Phys. Syst.: Theory & Appl., 2022
Future Gener. Comput. Syst., 2022
Rebate Auction Mechanisms for Bidirectional Grid Balancing Using Cloud Workload Migrations.
IEEE Access, 2022
Auction-Based Scheduling of Excess Energy Consumption to Enhance Grid Upward Flexibility.
IEEE Access, 2022
A Blockchain-Based Distributed Pruning Deep Compression Approach for Cooperative Positioning in Internet of Vehicles.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
A Dynamic Vehicle-Ranking Approach for Online Virtual Network Embedding in Internet of Vehicles.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022
A Blockchain-Based Distributed Machine Learning (BDML) Approach for Resource Allocation in Vehicular Ad-Hoc Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 17th International Conference, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021
Obfuscation of images via differential privacy: From facial images to general images.
Peer-to-Peer Netw. Appl., 2021
Mob. Networks Appl., 2021
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
Frontiers Neurorobotics, 2021
Non-Intrusive Load Monitoring based Demand Prediction for Smart Meter Attack Detection.
Proceedings of the 2021 International Conference on Control, 2021
2020
The Impact of Range Constraints on Utility in the Design of Differentially Private Mechanisms.
Trans. Data Priv., 2020
Designing a Streaming Algorithm for Outlier Detection in Data Mining - An Incrementa Approach.
Sensors, 2020
An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020
Storage and Rack Sensitive Replica Placement Algorithm for Distributed Platform with Data as Files.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020
2019
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019
Sensors, 2019
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019
J. Commun. Networks, 2019
Future Gener. Comput. Syst., 2019
A coverage and obstacle-aware clustering protocol for wireless sensor networks in 3D terrain.
Comput. Commun., 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the Machine Learning and Knowledge Extraction, 2019
2018
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2018
Evolutionary-Based Coverage Control Mechanism for Clustered Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 2018
An Obstacle-Aware Clustering Protocol for Wireless Sensor Networks with Irregular Terrain.
Proceedings of the Wired/Wireless Internet Communications, 2018
SHAstor: A Scalable HDFS-Based Storage Framework for Small-Write Efficiency in Pervasive Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018
Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
A Full Area Coverage Guaranteed, Energy Efficient Network Configuration Strategy for 3D Wireless Sensor Networks.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
2017
J. Geogr. Syst., 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
2016
On Optimal Scheduling Algorithms for Well-Structured Workows in the Cloud with Budget and Deadline Constraints.
Parallel Process. Lett., 2016
Black hole search in computer networks: State-of-the-art, challenges and future directions.
J. Parallel Distributed Comput., 2016
Location-based anonymization: comparison and evaluation of the Voronoi-based aggregation system.
Int. J. Geogr. Inf. Sci., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
A Scheduling Algorithm for Hadoop MapReduce Workflows with Budget Constraints in the Heterogeneous Cloud.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
2015
IEEE Trans. Mob. Comput., 2015
CoRR, 2015
Comput. J., 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
On Performance Resilient Scheduling for Scientific Workflows in HPC Systems with Constrained Storage Resources.
Proceedings of the 6th Workshop on Scientific Cloud Computing, 2015
2014
Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous Clouds.
IEEE Trans. Cloud Comput., 2014
Searching for a black hole in interconnected networks using mobile agents and tokens.
J. Parallel Distributed Comput., 2014
Int. J. Comput. Games Technol., 2014
Proceedings of the IEEE 30th Symposium on Mass Storage Systems and Technologies, 2014
Sensor deployment by a robot in an unknown orthogonal region: Achieving full coverage.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
2013
Adaptive Search-Based Service Migration with Virtual Moves in Clouds for Mobile Accesses.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013
On Scheduling Algorithms for MapReduce Jobs in Heterogeneous Clouds with Budget Constraints.
Proceedings of the Principles of Distributed Systems - 17th International Conference, 2013
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013
LiU: Hiding Disk Access Latency for HPC Applications with a New SSD-Enabled Data Layout.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013
Proceedings of the 19th IEEE International Conference on Networks, 2013
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013
2012
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012
2011
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2011
2010
Detection of the Evil ring attack in wireless sensor networks using cross verification.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Validation Against Actual Behavior: Still a Challenge for Testing Tools.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010
Proceedings of the Software Engineering Approaches for Offshore and Outsourced Development, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the International Academic Conference on the Future of Game Design and Technology, Vancouver, BC, Canada, May 06, 2010
Proceedings of the 21st Australian Software Engineering Conference (ASWEC 2010), 2010
2009
Proceedings of the Stabilization, 2009
2008
Using Scattered Mobile Agents to Locate a Black Hole in an un-Oriented Ring with Tokens.
Int. J. Found. Comput. Sci., 2008
2007
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents.
Proceedings of the Euro-Par 2007, 2007
2006
Proceedings of the Algorithms and Complexity, 6th Italian Conference, 2006
2004
System family engineering for leader election in ring topology.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004