Wei Shi
Wei Shi
Professor, P. Eng. School of Info. Tech./System and Computer Engineering, Faculty of Engineering
Dirección de correo verificada de - Página principal
Citado por
Citado por
Coverage protocols for wireless sensor networks: Review and future directions
R Elhabyan, W Shi, M St-Hilaire
Journal of Communications and Networks 21 (1), 45-60, 2019
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
Deep learning based emotion analysis of microblog texts
D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi
Information Fusion 64, 1-11, 2020
A novel web attack detection system for internet of things via ensemble classification
C Luo, Z Tan, G Min, J Gan, W Shi, Z Tian
IEEE Transactions on Industrial Informatics 17 (8), 5810-5818, 2020
Budget-driven scheduling algorithms for batches of MapReduce jobs in heterogeneous clouds
Y Wang, W Shi
IEEE Transactions on Cloud Computing 2 (3), 306-319, 2014
Aesmote: Adversarial reinforcement learning with smote for anomaly detection
X Ma, W Shi
IEEE Transactions on Network Science and Engineering 8 (2), 943-956, 2020
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks
R Elhabyan, W Shi, M St-Hilaire
Journal of Network and Computer Applications 114, 57-69, 2018
Black hole search in asynchronous rings using tokens
S Dobrev, R Královič, N Santoro, W Shi
Algorithms and Complexity, 139-150, 2006
A privacy preserving scheme for nearest neighbor query
Y Wang, Z Tian, H Zhang, S Su, W Shi
Sensors 18 (8), 2440, 2018
Black hole search with tokens in interconnected networks
W Shi
Stabilization, Safety, and Security of Distributed Systems, 670-682, 2009
Using scattered mobile agents to locate a black hole in an un-oriented ring with tokens
S Dobrev, N Santoro, W Shi
International Journal of Foundations of Computer Science 19 (6), 1355-1372, 2008
RD-IOD: Two-level residual-distillation-based triple-network for incremental object detection
D Yang, Y Zhou, W Shi, D Wu, W Wang
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022
Designing a streaming algorithm for outlier detection in data mining—An incremental approach
K Yu, W Shi, N Santoro
Sensors 20 (5), 1261, 2020
An improved xen credit scheduler for i/o latency-sensitive applications on multicores
L Zeng, Y Wang, W Shi, D Feng
2013 International Conference on Cloud Computing and Big Data, 267-274, 2013
Black hole search in computer networks: State-of-the-art, challenges and future directions
M Peng, W Shi, JP Corriveau, R Pazzi, Y Wang
Journal of Parallel and Distributed Computing 88, 1-15, 2016
Obfuscation of images via differential privacy: From facial images to general images
WL Croft, JR Sack, W Shi
Peer-to-Peer Networking and Applications 14, 1705-1733, 2021
Differential privacy via a truncated and normalized laplace mechanism
W Croft, JR Sack, W Shi
Journal of Computer Science and Technology 37 (2), 369-388, 2022
Virtual servers co-migration for mobile accesses: Online versus off-line
Y Wang, W Shi, M Hu
IEEE Transactions on Mobile Computing 14 (12), 2576-2589, 2015
Scattered black hole search in an oriented ring using tokens
S Dobrev, N Santoro, W Shi
2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20