default search action
Shi Dong 0001
Person information
- affiliation: Zhoukou Normal University, Zhoukou, China
Other persons with the same name
- Shi Dong — disambiguation page
- Shi Dong 0002 — Northeastern University, Boston, MA, USA
- Shi Dong 0003 — Stanford University, Stanford, CA, USA
- Shi Dong 0004 — Wuhan University, National Engineering Research Center for Multimedia Software, Wuhan, China
- Shi Dong 0005 — Chang'an University, College of Transportation Engineering, Xi'an, China
- Shi Dong 0006 — University of Science and Technology of China, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Shi Dong, Junxiao Tang, Khushnood Abbas, Ruizhe Hou, Joarder Kamruzzaman, Leszek Rutkowski, Rajkumar Buyya:
Task offloading strategies for mobile edge computing: A survey. Comput. Networks 254: 110791 (2024) - [j39]Yuanjun Xia, Yining Liu, Shi Dong, Meng Li, Cheng Guo:
SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning. IEEE Internet Things J. 11(10): 18351-18365 (2024) - [j38]Shi Dong, Longhui Shu, Shan Nie:
Android Malware Detection Method Based on CNN and DNN Bybrid Mechanism. IEEE Trans. Ind. Informatics 20(5): 7744-7753 (2024) - [j37]Huadong Su, Shi Dong, Ning Wang, Ting Zhang:
An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs. Veh. Commun. 45: 100727 (2024) - [j36]Shi Dong, Yuanjun Xia, Tao Wang:
Network Abnormal Traffic Detection Framework Based on Deep Reinforcement Learning. IEEE Wirel. Commun. 31(3): 185-193 (2024) - [c6]Shijie Luo, Jianxia Chen, Tianci Yu, Shi Dong, Gaohang Jiang, Ninglong Ding:
Dual Frequency-based Temporal Sequential Recommendation. IJCNN 2024: 1-8 - 2023
- [j35]Khushnood Abbas, Mohammad Kamrul Hasan, Alireza Abbasi, Shi Dong, Taher M. Ghazal, Siti Norul Huda Sheikh Abdullah, Asif Khan, Dabiah Ahmed Alboaneen, Fatima Rayan Awad Ahmed, Thowiba E. Ahmed, Shayla Islam:
Co-Evolving Popularity Prediction in Temporal Bipartite Networks: A Heuristics Based Model. IEEE Access 11: 37546-37559 (2023) - [j34]Khushnood Abbas, Mohammad Kamrul Hasan, Alireza Abbasi, Umi Asma' Mokhtar, Asif Khan, Siti Norul Huda Sheikh Abdullah, Shi Dong, Shayla Islam, Dabiah Ahmed Alboaneen, Fatima Rayan Awad Ahmed:
Predicting the Future Popularity of Academic Publications Using Deep Learning by Considering It as Temporal Citation Networks. IEEE Access 11: 83052-83068 (2023) - [j33]Shi Dong, Yuanjun Xia:
Network traffic identification in packet sampling environment. Digit. Commun. Networks 9(4): 957-970 (2023) - [j32]Khushnood Abbas, Alireza Abbasi, Shi Dong, Niu Ling, Liyong Chen, Bolun Chen:
A Novel Temporal Network-Embedding Algorithm for Link Prediction in Dynamic Networks. Entropy 25(2): 257 (2023) - [j31]Shi Dong, Huadong Su, Yue Liu:
A-CAVE: Network abnormal traffic detection algorithm based on variational autoencoder. ICT Express 9(5): 896-902 (2023) - [j30]Chi Xu, Yuanbang Li, Bangchao Wang, Shi Dong:
A systematic mapping study on machine learning methodologies for requirements management. IET Softw. 17(4): 405-423 (2023) - [j29]Jianxia Chen, Liwei Pan, Shi Dong, Tianci Yu, Liang Xiao, Meihan Yao, Shijie Luo:
Multi-temporal Sequential Recommendation Model Based on the Fused Learning Preferences. Int. J. Comput. Intell. Syst. 16(1): 143 (2023) - [j28]Shi Dong, Khushnood Abbas, Meixi Li, Joarder Kamruzzaman:
Blockchain technology and application: an overview. PeerJ Comput. Sci. 9: e1705 (2023) - [j27]Longhui Shu, Shi Dong, Huadong Su, Junjie Huang:
Android Malware Detection Methods Based on Convolutional Neural Network: A Survey. IEEE Trans. Emerg. Top. Comput. Intell. 7(5): 1330-1350 (2023) - [j26]Shi Dong, Yuanjun Xia, Joarder Kamruzzaman:
Quantum Particle Swarm Optimization for Task Offloading in Mobile Edge Computing. IEEE Trans. Ind. Informatics 19(8): 9113-9122 (2023) - [j25]Shi Dong, Huadong Su, Yuanjun Xia, Fei Zhu, Xinrong Hu, Bangchao Wang:
A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 13573-13602 (2023) - [c5]Lei Mao, Jianxia Chen, Shi Dong, Liang Xiao, Haoying Si, Shu Li, Xinyun Wu:
A Novel Interaction Convolutional Network Based on Dependency Trees for Aspect-Level Sentiment Analysis. ICONIP (2) 2023: 388-400 - [c4]Lei Mao, Jianxia Chen, Shi Dong, Liang Xiao, Haoying Si, Xinyun Wu:
Aspect-level Sentiment Analysis Based on Convolutional Network with Dependency Tree. SEKE 2023: 536-541 - 2022
- [j24]Shi Dong, Yuanjun Xia, Tao Peng:
Traffic identification model based on generative adversarial deep convolutional network. Ann. des Télécommunications 77(9-10): 573-587 (2022) - [j23]Shi Dong, Mudar Sarem:
NOCD: a new overlapping community detection algorithm based on improved KNN. J. Ambient Intell. Humaniz. Comput. 13(6): 3053-3063 (2022) - [j22]Marcin Zalasinski, Lukasz Laskowski, Tacjana Niksa-Rynkiewicz, Krzysztof Cpalka, Aleksander Byrski, Krzysztof Przybyszewski, Pawel Trippner, Shi Dong:
Evolutionary Algorithm for Selecting Dynamic Signatures Partitioning Approach. J. Artif. Intell. Soft Comput. Res. 12(4): 267-279 (2022) - [c3]Qinyu Xia, Shi Dong, Tao Peng:
An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural Networks. IPCCC 2022: 352-359 - 2021
- [j21]Khushnood Abbas, Alireza Abbasi, Shi Dong, Niu Ling, Laihang Yu, Bolun Chen, Shi-Min Cai, Qambar Hasan:
Application of network link prediction in drug discovery. BMC Bioinform. 22(1): 187 (2021) - [j20]Shi Dong, Ping Wang, Khushnood Abbas:
A survey on deep learning and its applications. Comput. Sci. Rev. 40: 100379 (2021) - [j19]Shi Dong:
Multi class SVM algorithm with active learning for network traffic classification. Expert Syst. Appl. 176: 114885 (2021) - [j18]Shi Dong, Wengang Zhou:
Improved influential nodes identification in complex networks. J. Intell. Fuzzy Syst. 41(6): 6263-6271 (2021) - [j17]Laihang Yu, Ningzhong Liu, Wengang Zhou, Shi Dong, Yu Fan, Khushnood Abbas:
Weber's law based multi-level convolution correlation features for image retrieval. Multim. Tools Appl. 80(13): 19157-19177 (2021) - [j16]Shi Dong, Mudar Sarem, Wengang Zhou:
Distributed Data Gathering Algorithm Based on Spanning Tree. IEEE Syst. J. 15(1): 289-296 (2021) - [j15]Shi Dong, Yuanjun Xia, Tao Peng:
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 18(4): 4197-4212 (2021) - [c2]Yuanjun Xia, Shi Dong, Tao Peng, Tao Wang:
Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning. MSN 2021: 528-535 - 2020
- [j14]Shi Dong, Mudar Sarem:
DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks. IEEE Access 8: 5039-5048 (2020) - [j13]Guilan Feng, Zhengnan Li, Wengang Zhou, Shi Dong:
Entropy-based outlier detection using spark. Clust. Comput. 23(2): 409-419 (2020) - [j12]Shi Dong, Raj Jain:
Energy-efficient scheme based on user task characteristic in virtual cloud platform. Clust. Comput. 23(2): 1125-1135 (2020) - [j11]Shi Dong:
Improved label propagation algorithm for overlapping community detection. Computing 102(10): 2185-2198 (2020) - [j10]Xinhui Ding, Shi Dong:
Improving Positioning Algorithm Based on RSSI. Wirel. Pers. Commun. 110(4): 1947-1961 (2020) - [i2]Khushnood Abbas, Alireza Abbasi, Shi Dong, Niu Ling, Mingsheng Shang, Chen Liong, Bolun Chen:
TempNodeEmb: Temporal Node Embedding considering temporal edge influence matrix. CoRR abs/2008.06940 (2020)
2010 – 2019
- 2019
- [j9]Shi Dong, Khushnood Abbas, Raj Jain:
A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments. IEEE Access 7: 80813-80828 (2019) - [j8]Shi Dong, Ruixuan Li:
Traffic identification method based on multiple probabilistic neural network model. Neural Comput. Appl. 31(2): 473-487 (2019) - 2018
- [j7]Shi Dong, Xingang Zhang, Ya Li:
Microblog Sentiment Analysis Method Based on Spectral Clustering. J. Inf. Process. Syst. 14(3): 727-739 (2018) - 2017
- [j6]Yongfeng Cui, Shi Dong, Wei Liu:
Feature selection algorithm based on correlation between muti metric network traffic flow features. Int. Arab J. Inf. Technol. 14(3): 362-371 (2017) - [j5]Huadong Wang, Ying Chen, Shi Dong:
Research on efficient-efficient routing protocol for WSNs based on improved artificial bee colony algorithm. IET Wirel. Sens. Syst. 7(1): 15-20 (2017) - [j4]Shi Dong, Yingchun Qi, Dingding Zhou:
A new routing algorithm based on opportunistic networks. Int. J. Inf. Commun. Technol. 11(1): 81-93 (2017) - 2016
- [j3]Yongfeng Cui, Wei Liu, Shi Dong:
A time-slice optimization based weak feature association algorithm for video condensation. Multim. Tools Appl. 75(24): 17515-17530 (2016) - 2014
- [j2]Shi Dong, Xingang Zhang, Dingding Zhou:
Auto Adaptive Identification Algorithm Based on Network Traffic Flow. Int. J. Comput. Commun. Control 9(6): 672-685 (2014) - 2013
- [i1]Dingding Zhou, Songling Chen, Shi Dong:
Network traffic prediction based on ARFIMA model. CoRR abs/1302.6324 (2013) - 2012
- [j1]Shi Dong, Wei Ding, Liang Chen:
Measure Correlation Analysis of Network Flow Based On Symmetric Uncertainty. KSII Trans. Internet Inf. Syst. 6(6): 1649-1667 (2012) - 2011
- [c1]Gang Wang, Wei Ding, Shi Dong:
Classification of UDP traffic from P2P applications. ICON 2011: 252-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint