Zhixin Shi
According to our database1,
Zhixin Shi
authored at least 67 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
A Meta-Learning-Based Joint Two-View Framework for Inductive Knowledge Graph Completion.
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the HCI International 2023 Posters, 2023
2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks.
Proceedings of the 28th International Conference on Telecommunications, 2021
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
2019
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine.
Proceedings of the Knowledge Science, Engineering and Management, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the 4th International Conference on Big Data and Computing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2018 International Conference on Big Data and Computing, 2018
2017
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches.
Comput. Sci. Inf. Syst., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017
Proceedings of the Knowledge Science, Engineering and Management, 2017
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2014
Proceedings of the Handbook of Document Image Processing and Recognition, 2014
Proceedings of the 11th IAPR International Workshop on Document Analysis Systems, 2014
2013
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013
2012
Model based table cell detection and content extraction from degraded document images.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012
Proceedings of the 2012 International Conference on Frontiers in Handwriting Recognition, 2012
2011
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011
2010
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile.
Proceedings of the 20th International Conference on Pattern Recognition, 2010
2009
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
A Steerable Directional Local Profile Technique for Extraction of Handwritten Arabic Text Lines.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
Proceedings of the Advances in Biometrics, Third International Conference, 2009
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009
2007
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007
2006
Pattern Recognit. Lett., 2006
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
2005
Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005
Historical document image segmentation using background light intensity normalization.
Proceedings of the Document Recognition and Retrieval XII, 2005
2004
Historical Document Image Enhancement Using Background Light Intensity Normalization.
Proceedings of the 17th International Conference on Pattern Recognition, 2004
Proceedings of the 1st International Workshop on Document Image Analysis for Libraries (DIAL 2004), 2004
Proceedings of the 1st International Workshop on Document Image Analysis for Libraries (DIAL 2004), 2004
2003
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003
2001
Proceedings of the Document Recognition and Retrieval VIII, 2001
1997
Pattern Recognit., 1997
1996
Pattern Recognit. Lett., 1996
Int. J. Imaging Syst. Technol., 1996