default search action
Zhixin Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Doudou Yang, Zhixin Shi, Yangyang Zong, Xiaoyu Kang:
A Meta-Learning-Based Joint Two-View Framework for Inductive Knowledge Graph Completion. IJCNN 2024: 1-9 - [c60]Chaochao Liu, Degang Sun, Zhixin Shi, Ning Zhang:
A New Method of Cyber Deception Defense. ISCC 2024: 1-7 - [c59]Minghao Ma, Zhixin Shi, Qilei Yin, Yangyang Zong:
SHTree: A Structural Encrypted Traffic Fingerprint Generation Method for Multiple Classification Tasks. ISCC 2024: 1-7 - [c58]Yangyang Zong, Zhixin Shi, Weiqing Huang:
LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features. ISCC 2024: 1-6 - 2023
- [c57]Zhixin Shi, Zhixuan Zhou, Abhinav Choudhry, Mengyi Wei, Xiang Chen, Bohui Shen:
Ethical Concerns of COVID-19 Contact Tracing: A Narrative Review. HCI (43) 2023: 502-511 - [c56]Zhixin Shi, Hao Wu, Jing Zhang, Meng Zhang, Weiqing Huang:
FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. ISCC 2023: 816-822 - [c55]Weiqing Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu:
MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. ISCC 2023: 1274-1279 - [c54]Zhixin Shi, Mengyan Xing, Jing Zhang, B. Hao Wu:
Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method. WCNC 2023: 1-6 - 2022
- [c53]Zhixin Shi, Xiangyu Wang, Pengcheng Liu:
NBP-MS: Malware Signature Generation Based on Network Behavior Profiling. ICPR 2022: 1865-1870 - [c52]Weiqing Huang, Yangyang Zong, Zhixin Shi, Leiqi Wang, Pengcheng Liu:
PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection. IJCNN 2022: 1-8 - [c51]Xiaoyan Yu, Qilei Yin, Zhixin Shi, Yuru Ma:
Improving the Semantic Consistency of Textual Adversarial Attacks via Prompt. IJCNN 2022: 1-8 - [c50]Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu:
Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. ISCC 2022: 1-8 - [c49]Jing Zhang, Zhixin Shi, Hao Wu, Mengyan Xing:
A Novel Self-supervised Few-shot Network Intrusion Detection Method. WASA (1) 2022: 513-525 - 2021
- [c48]Degang Sun, Meichen Liu, Meimei Li, Zhixin Shi, Pengcheng Liu, Xu Wang:
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. CSCWD 2021: 335-341 - [c47]Pengcheng Liu, Zhen Han, Zhixin Shi, Meichen Liu:
Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks. ICT 2021: 1-5 - [c46]Zhixin Shi, Yuru Ma, Xiaoyan Yu:
An Effective and Efficient Method for Word-Level Textual Adversarial Attack. ISCC 2021: 1-6 - 2020
- [c45]Meichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu:
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention. CF 2020: 142-149 - [c44]Weiqing Huang, Xiao Peng, Zhixin Shi, Yuru Ma:
Adversarial Attack against LSTM-based DDoS Intrusion Detection System. ICTAI 2020: 686-693
2010 – 2019
- 2019
- [c43]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. CF 2019: 24-31 - [c42]Weiqing Huang, Xiao Peng, Zhixin Shi:
A SeqGAN-Based Method for Mimicking Attack. Inscrypt 2019: 118-133 - [c41]Jianguo Jiang, Qilei Yin, Zhixin Shi, Qiwen Wang, Wei Zhou:
A New Hybrid Approach for C&C Channel Detection. HPCC/SmartCity/DSS 2019: 583-590 - [c40]Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu, Xiaoyu Kang:
A Behavior-Based Method for Distinguishing the Type of C&C Channel. ICA3PP (1) 2019: 624-636 - [c39]Degang Sun, Yulan Hu, Zhixin Shi, Guokun Xu, Wei Zhou:
An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data. ICBDC 2019: 151-155 - [c38]Xiao Peng, Weiqing Huang, Zhixin Shi:
Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method. ICTAI 2019: 1288-1295 - [c37]Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li, Bin Lv:
A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning. IPCCC 2019: 1-9 - [c36]Biao Qi, Jianguo Jiang, Zhixin Shi, Meimei Li, Wei Fan:
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine. KSEM (1) 2019: 275-286 - 2018
- [c35]Bin Lv, Xuemin Yu, Guokun Xu, Qilei Yin, Zhixin Shi:
Network Traffic Monitoring System Based on Big Data Technology. ICBDC 2018: 27-32 - [c34]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Biao Qi:
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection. ICCSP 2018: 77-81 - [c33]Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li:
Comprehensive Behavior Profiling Model for Malware Classification. ISCC 2018: 129-135 - [c32]Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. TrustCom/BigDataSE 2018: 727-736 - [c31]Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:
BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. TrustCom/BigDataSE 2018: 754-762 - 2017
- [j5]Bin Kong, Kun Yang, Degang Sun, Meimei Li, Zhixin Shi:
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches. Comput. Sci. Inf. Syst. 14(3): 839-856 (2017) - [c30]Degang Sun, Kun Yang, Bin Lv, Zhixin Shi:
Could we beat a new mimicking attack? APNOMS 2017: 247-250 - [c29]Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. Inscrypt 2017: 383-403 - [c28]Degang Sun, Kun Yang, Zhixin Shi, Chao Chen:
A New Mimicking Attack by LSGAN. ICTAI 2017: 441-447 - [c27]Degang Sun, Kun Yang, Zhixin Shi, Bin Lv:
A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds. KSEM 2017: 129-136 - [c26]Ke Zhang, Qingjie Zhu, Naiqian Zhang, Zhixin Shi, Yongsong Zhan:
User Intention Classification in an Entities Missed In-vehicle Dialog System. ICSI (2) 2017: 529-537 - [c25]Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior. TrustCom/BigDataSE/ICESS 2017: 65-72 - [c24]Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. WASA 2017: 729-740 - 2016
- [c23]Jianguo Jiang, Biao Qi, Zhixin Shi, Yan Wang, Bin Lv:
Botnet Detection Method Analysis on the Effect of Feature Extraction. Trustcom/BigDataSE/ISPA 2016: 1882-1888 - 2014
- [c22]Li Rong, Suyu Wang, Zhixin Shi:
A Two Level Algorithm for Text Detection in Natural Scene Images. Document Analysis Systems 2014: 329-333 - [p1]Srirangaraj Setlur, Zhixin Shi:
Asian Character Recognition. Handbook of Document Image Processing and Recognition 2014: 459-486 - 2013
- [c21]Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju:
A Model Based Framework for Table Processing in Degraded Document Images. ICDAR 2013: 963-967 - 2012
- [c20]Gaurav Kumar, Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju, Ramachandrula Sitaram:
Keyword Spotting Framework Using Dynamic Background Model. ICFHR 2012: 582-587 - [c19]Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju:
Model based table cell detection and content extraction from degraded document images. DAR@ICVGIP 2012: 62-67 - 2011
- [c18]Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju:
Image Enhancement for Degraded Binary Document Images. ICDAR 2011: 895-899 - 2010
- [c17]Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju:
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile. ICPR 2010: 1916-1919
2000 – 2009
- 2009
- [c16]Daekeun You, Zhixin Shi, Venu Govindaraju, Alan Blatt:
Line removal and handwritten word recognition of police accident report forms. D.GO 2009: 317-318 - [c15]Zhixin Shi, Venu Govindaraju:
Robust Fingerprint Matching Using Spiral Partitioning Scheme. ICB 2009: 647-655 - [c14]Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju:
A Steerable Directional Local Profile Technique for Extraction of Handwritten Arabic Text Lines. ICDAR 2009: 176-180 - [c13]Safwan Wshah, Zhixin Shi, Venu Govindaraju:
Segmentation of Arabic Handwriting Based on both Contour and Skeleton Segmentation. ICDAR 2009: 793-797 - 2007
- [c12]Ifeoma Nwogu, Zhixin Shi, Venu Govindaraju:
PDE-Based Enhancement of Low Quality Documents. ICDAR 2007: 541-545 - 2006
- [j4]Zhixin Shi, Venu Govindaraju:
A chaincode based scheme for fingerprint feature extraction. Pattern Recognit. Lett. 27(5): 462-468 (2006) - [c11]Zhixin Shi, Venu Govindaraju:
Fingerprint Image Enhancement Based on Skin Profile Approximation. ICPR (3) 2006: 714-717 - 2005
- [c10]Zhixin Shi, Venu Govindaraju:
Historical document image segmentation using background light intensity normalization. DRR 2005: 167-174 - [c9]Zhixin Shi, Srirangaraj Setlur, Venu Govindaraju:
Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map. ICDAR 2005: 794-798 - [c8]Zhixin Shi, Venu Govindaraju:
Multi-scale Techniques for Document Page Segmentation. ICDAR 2005: 1020-1024 - 2004
- [c7]Sargur N. Srihari, Zhixin Shi:
Forensic Handwritten Document Retrieval System. DIAL 2004: 188-194 - [c6]Zhixin Shi, Venu Govindaraju:
Line Separation for Complex Document Images Using Fuzzy Runlength. DIAL 2004: 306-313 - [c5]Zhixin Shi, Venu Govindaraju:
Historical Document Image Enhancement Using Background Light Intensity Normalization. ICPR (1) 2004: 473-476 - 2003
- [c4]Venu Govindaraju, Zhixin Shi, John Schneider:
Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images. AVBPA 2003: 268-275 - [c3]Zhixin Shi, Venu Govindaraju:
Skew Detection for Complex Document Images Using Fuzzy Runlength. ICDAR 2003: 715-719 - [c2]Xia Liu, Zhixin Shi:
A Format-Driven Handwritten Word Recognition System. ICDAR 2003: 1118-1122 - 2001
- [c1]Venu Govindaraju, Zhixin Shi, Ankur Teredesai:
Secondary classification using key features. Document Recognition and Retrieval 2001: 272-279
1990 – 1999
- 1997
- [j3]Zhixin Shi, Venu Govindaraju:
Segmentation and recognition of connected handwritten numeral strings. Pattern Recognit. 30(9): 1501-1504 (1997) - 1996
- [j2]Sargur N. Srihari, Yong-Chul Shin, Vemulapati Ramanaprasad, Zhixin Shi:
Document image-processing system for name and address recognition. Int. J. Imaging Syst. Technol. 7(4): 379-391 (1996) - [j1]Zhixin Shi, Venu Govindaraju:
Character image enhancement by selective region-growing. Pattern Recognit. Lett. 17(5): 523-527 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint