default search action
Fei Shao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Beibei Zhu, Ruolin Wang, Junyi Wang, Fei Shao, Kerun Wang:
A survey: knowledge graph entity alignment research based on graph embedding. Artif. Intell. Rev. 57(9): 229 (2024) - [j13]Jianbin Xue, Fei Shao, Tingjuan Zhang, Guiying Tian, Hengjie Jiang:
VEC Collaborative Task Offloading and Resource Allocation Based on Deep Reinforcement Learning Under Parking Assistance. Wirel. Pers. Commun. 136(1): 321-345 (2024) - [c20]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. NDSS 2024 - 2023
- [j12]Kun Tang, Tangyi Guo, Fei Shao, Yongfeng Ma, Aemal J. Khattak:
Spatial-temporal traffic performance collaborative forecast in urban road network based on dynamic factor model. Expert Syst. Appl. 225: 120090 (2023) - [j11]Jianbin Xue, Tingjuan Zhang, Fei Shao, Jia Yao, Xiaofeng Xu:
Joint optimization of trajectory and resource allocation in cellular-connected multi-UAV MEC networks. Phys. Commun. 61: 102209 (2023) - [c19]Liting Niu, Weiyi Zhang, Cheng Nian, Fei Shao, Fasih Ud Din Farrukh, Chun Zhang:
Hardware-Software Co-Design of Matrix-Solving for Non-Linear Optimization in SLAM Systems. IECON 2023: 1-8 - [c18]Cheng Nian, Weiyi Zhang, Liting Niu, Yiyang Wang, Chaoyang Ding, Fei Shao, Chun Zhang:
Energy-Efficient Pose-Estimation FPGA-Accelerator for Real-Time Mobile V-SLAM Robot. MWSCAS 2023: 566-570 - [c17]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023: 6575-6592 - [i3]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. CoRR abs/2311.02331 (2023) - 2022
- [c16]Liangyi Huang, Sophia Hall, Fei Shao, Arafath Nihar, Vipin Chaudhary, Yinghui Wu, Roger H. French, Xusheng Xiao:
System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems. CIKM 2022: 4872-4876 - 2021
- [j10]Fei Shao, Wei Zhao, Binghua Cheng:
Enhance the Transfer Capacity of Multiplex Networks. Complex. 2021: 6687463:1-6687463:8 (2021) - [c15]Fei Shao, Peng Kuang:
Design of fuel Cell Test System Based on Modularization. AIAM (ACM) 2021: 678-682 - [c14]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. ICDE 2021: 193-204 - [c13]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. ICDE 2021: 2705-2708 - [c12]Lei Gao, Linyue Bai, Fei Shao, Qingna Ma, Ming Ni:
Teaching Reform of Steel Structure Curriculum Basing on Study-Group Method and SPOC Platform. ICEIT 2021: 5-9 - [c11]Fei Shao:
WebEvo: Taming Web Application Evolution via Semantic Structure Change Detection. ICSE (Companion Volume) 2021: 141-143 - [c10]Fei Shao, Rui Xu, Wasif Arman Haque, Jingwei Xu, Ying Zhang, Wei Yang, Yanfang Ye, Xusheng Xiao:
WebEvo: taming web application evolution via detecting semantic structure changes. ISSTA 2021: 16-28 - [i2]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. CoRR abs/2101.06761 (2021) - 2020
- [j9]Fei Shao, Jiaying Cao, Ye Ying, Ying Liu, Dan Wang, Xiaoyu Guo, Yiping Wu, Ying Wen, Haifeng Yang:
Preparation of Hydrophobic Film by Electrospinning for Rapid SERS Detection of Trace Triazophos. Sensors 20(15): 4120 (2020) - [i1]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. CoRR abs/2010.13637 (2020)
2010 – 2019
- 2019
- [j8]Fei Shao, Wei Zhao, ZiNan Chang:
Suppress traffic-driven epidemic spreading in weighted network. Clust. Comput. 22(6): 14201-14206 (2019) - 2018
- [j7]Wei Zhao, Fei Shao, Song Ye, Wei Zheng:
LSRR-LA: An Anisotropy-Tolerant Localization Algorithm Based on Least Square Regularized Regression for Multi-Hop Wireless Sensor Networks. Sensors 18(11): 3974 (2018) - [j6]Wei Zhao, Shoubao Su, Fei Shao:
Improved DV-Hop Algorithm Using Locally Weighted Linear Regression in Anisotropic Wireless Sensor Networks. Wirel. Pers. Commun. 98(4): 3335-3353 (2018) - [c9]Gong Cheng, Fei Shao, Yuzhong Qu:
An Empirical Evaluation of Techniques for Ranking Semantic Associations (Extended Abstract). ICDE 2018: 1793-1794 - [c8]Wei Zhao, Shoubao Su, ZiNan Chang, Binghua Cheng, Fei Shao:
Improved Multi-hop Localization Algorithm with Network Division. IntelliSys (1) 2018: 1404-1421 - 2017
- [j5]Fei Shao, Rong Peng, Han Lai, Bangchao Wang:
DRank: A semi-automated requirements prioritization method based on preferences and dependencies. J. Syst. Softw. 126: 141-156 (2017) - [j4]Gong Cheng, Fei Shao, Yuzhong Qu:
An Empirical Evaluation of Techniques for Ranking Semantic Associations. IEEE Trans. Knowl. Data Eng. 29(11): 2388-2401 (2017) - 2015
- [j3]Wei Zhao, Xiaoyong Yan, Fei Shao, Xianghong Tian, Binghua Cheng:
Collaborative Routing Protocol Based on Hydrodynamics for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 276276:1-276276:10 (2015) - [c7]Fei Shao, Li-Yung Ho, Jan-Jan Wu, Pangfeng Liu:
Efficient distributed maximum matching for solving the container exchange problem in the maritime industry. IEEE BigData 2015: 1031-1036 - [c6]Shoubao Su, Yu Su, Fei Shao, Haifeng Guo:
A Power-Aware Virtual Machine Mapper Using Firefly Optimization. CBD 2015: 96-103 - [c5]Fei Shao, Xingce Wang, Qianqian Jiang, Zhongke Wu, Mingquan Zhou:
Modeling Curly Hair Based on Static Super-Helices. CW 2015: 306-313 - 2014
- [j2]Fei Shao, Binghua Cheng:
Optimal Routing Strategy Based on Specifying Shortest Path. Int. J. Comput. Commun. Control 9(5): 602-609 (2014) - [c4]Fei Shao, Rong Cheng, Fangguo Zhang:
A Full Privacy-Preserving Scheme for Location-Based Services. ICT-EurAsia 2014: 596-601 - 2013
- [c3]Enqiang Liu, Zengliang Liu, Fei Shao:
Digital Rights Management and Access Control in Multimedia Social Networks. ICGEC 2013: 257-266 - 2012
- [j1]Fei Shao, Guoping Jiang:
Traffic Driven Epidemic Spreading in Homogeneous Networks with Community Structure. J. Networks 7(5): 850-855 (2012) - [c2]Fei Shao, Wei Deng, Bing Zhang:
Traffic Information Management and Promulgating System Based on GIS. ICDMA 2012: 994-997 - [c1]Han Lai, Rong Peng, Dong Sun, Fei Shao, Yousong Liu:
A Survey of RE-specific Wikis for Distributed Requirements Engineering. SKG 2012: 47-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint