Zhixin Shi

According to our database1, Zhixin Shi authored at least 67 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

A New Method of Cyber Deception Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

A Meta-Learning-Based Joint Two-View Framework for Inductive Knowledge Graph Completion.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Ethical Concerns of COVID-19 Contact Tracing: A Narrative Review.
Proceedings of the HCI International 2023 Posters, 2023

2022
A Novel Self-supervised Few-shot Network Intrusion Detection Method.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Improving the Semantic Consistency of Textual Adversarial Attacks via Prompt.
Proceedings of the International Joint Conference on Neural Networks, 2022

PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

NBP-MS: Malware Signature Generation Based on Network Behavior Profiling.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

2021
An Effective and Efficient Method for Word-Level Textual Adversarial Attack.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks.
Proceedings of the 28th International Conference on Telecommunications, 2021

DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Adversarial Attack against LSTM-based DDoS Intrusion Detection System.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Terminator: a data-level hybrid framework for intellectual property theft detection and prevention.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020

2019
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine.
Proceedings of the Knowledge Science, Engineering and Management, 2019

A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

A Behavior-Based Method for Distinguishing the Type of C&C Channel.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A New Hybrid Approach for C&C Channel Detection.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A SeqGAN-Based Method for Mimicking Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios.
Proceedings of the 17th IEEE International Conference On Trust, 2018

BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Comprehensive Behavior Profiling Model for Malware Classification.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Network Traffic Monitoring System Based on Big Data Technology.
Proceedings of the 2018 International Conference on Big Data and Computing, 2018

2017
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches.
Comput. Sci. Inf. Syst., 2017

Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

User Intention Classification in an Entities Missed In-vehicle Dialog System.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds.
Proceedings of the Knowledge Science, Engineering and Management, 2017

A New Mimicking Attack by LSGAN.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Could we beat a new mimicking attack?
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Botnet Detection Method Analysis on the Effect of Feature Extraction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Asian Character Recognition.
Proceedings of the Handbook of Document Image Processing and Recognition, 2014

A Two Level Algorithm for Text Detection in Natural Scene Images.
Proceedings of the 11th IAPR International Workshop on Document Analysis Systems, 2014

2013
A Model Based Framework for Table Processing in Degraded Document Images.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

2012
Model based table cell detection and content extraction from degraded document images.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

Keyword Spotting Framework Using Dynamic Background Model.
Proceedings of the 2012 International Conference on Frontiers in Handwriting Recognition, 2012

2011
Image Enhancement for Degraded Binary Document Images.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

2010
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Segmentation of Arabic Handwriting Based on both Contour and Skeleton Segmentation.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

A Steerable Directional Local Profile Technique for Extraction of Handwritten Arabic Text Lines.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Robust Fingerprint Matching Using Spiral Partitioning Scheme.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Line removal and handwritten word recognition of police accident report forms.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

2007
PDE-Based Enhancement of Low Quality Documents.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

2006
A chaincode based scheme for fingerprint feature extraction.
Pattern Recognit. Lett., 2006

Fingerprint Image Enhancement Based on Skin Profile Approximation.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

2005
Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005

Multi-scale Techniques for Document Page Segmentation.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005

Historical document image segmentation using background light intensity normalization.
Proceedings of the Document Recognition and Retrieval XII, 2005

2004
Historical Document Image Enhancement Using Background Light Intensity Normalization.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Forensic Handwritten Document Retrieval System.
Proceedings of the 1st International Workshop on Document Image Analysis for Libraries (DIAL 2004), 2004

Line Separation for Complex Document Images Using Fuzzy Runlength.
Proceedings of the 1st International Workshop on Document Image Analysis for Libraries (DIAL 2004), 2004

2003
Skew Detection for Complex Document Images Using Fuzzy Runlength.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

A Format-Driven Handwritten Word Recognition System.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

2001
Secondary classification using key features.
Proceedings of the Document Recognition and Retrieval VIII, 2001

1997
Segmentation and recognition of connected handwritten numeral strings.
Pattern Recognit., 1997

1996
Character image enhancement by selective region-growing.
Pattern Recognit. Lett., 1996

Document image-processing system for name and address recognition.
Int. J. Imaging Syst. Technol., 1996


  Loading...