default search action
Leyi Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Leyi Shi, Qihang Yang, Luhan Gao, Haowei Ge:
An ensemble system for machine learning IoT intrusion detection based on enhanced artificial hummingbird algorithm. J. Supercomput. 81(1): 110 (2025) - 2024
- [j21]Xiran Wang, Leyi Shi, Chi Cao, Weixin Wu, Zhihao Zhao, Ye Wang, Kai Wang:
Game analysis and decision making optimization of evolutionary dynamic honeypot. Comput. Electr. Eng. 119: 109534 (2024) - [j20]Leyi Shi, Baotong Wang, Ang Li, Haoyu Zhang:
Exploiting self-evolutionary strategies of components for Dynamic Heterogeneous Redundancy. Comput. Electr. Eng. 120: 109756 (2024) - [j19]Qiang Han, Lu Wang, Haoyu Zhang, Leyi Shi, Danxin Wang:
Ethchecker: a context-guided fuzzing for smart contracts. J. Supercomput. 80(10): 13949-13975 (2024) - 2023
- [j18]Leyi Shi, Yifan Miao, Jiahao Ren, Ran Liu:
Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy. IEEE Trans. Netw. Serv. Manag. 20(4): 4186-4197 (2023) - 2022
- [j17]Ruhua Huang, Yuting Huang, Fan Qi, Leyi Shi, Baiyang Li, Wei Yu:
Exploring the characteristics of special issues: distribution, topicality, and citation impact. Scientometrics 127(9): 5233-5256 (2022) - [c13]Leyi Shi, Yifan Miao, Jiahao Ren, Huiwen Hou, Qiang Han:
A defense mechanism analysis for Dynamic Heterogeneous Redundancy. APNOMS 2022: 1-4 - [c12]Ruhua Huang, Leyi Shi:
An Exploratory Study on Chinese Parents' Concerns about Preschoolers' Use of Digital Devices and Expectations for Digital Literacy Education. ASIST 2022: 706-708 - [c11]Lin Wang, Fangxiao Li, Yunfei Xie, Leyi Shi:
Identity Authentication Strategy of Mobile Crowd Sensing based on CFL. QRS 2022: 139-146 - 2021
- [j16]Jiuyun Xu, Lele Liu, Ruru Zhang, Jin Xie, Qiang Duan, Leyi Shi:
IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments. IEEE Access 9: 18112-18122 (2021) - [j15]Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, Leyi Shi:
Trust-aware generative adversarial network with recurrent neural network for recommender systems. Int. J. Intell. Syst. 36(2): 778-795 (2021) - [j14]Leyi Shi, Xiaoyu Li, Zhenbo Gao, Pengfei Duan, Na Liu, Honglong Chen:
Worm computing: A blockchain-based resource sharing and cybersecurity framework. J. Netw. Comput. Appl. 185: 103081 (2021) - [j13]Zhe Li, Honglong Chen, Kai Lin, Vladimir V. Shakhov, Leyi Shi, Jiguo Yu:
From edge data to recommendation: A double attention-based deformable convolutional network. Peer-to-Peer Netw. Appl. 14(6): 3984-3997 (2021) - [j12]Leyi Shi, Shanshan Du, Yifan Miao, Songbai Lan:
Modeling and Performance Analysis of Satellite Network Moving Target Defense System with Petri Nets. Remote. Sens. 13(7): 1262 (2021) - [c10]Weixin Wu, Xiaotong Liu, Leyi Shi, Yihao Liu, Yuxiao Song:
Multi-dimensional LSTM: A Model of Network Text Classification. WASA (3) 2021: 209-217 - 2020
- [j11]Leyi Shi, Yuxiao Song, Zhiyu Xue, Yihao Liu, Honglong Chen:
SACT: A New Model of Covert Communication Based on SDN. Sensors 20(24): 7300 (2020) - [c9]Zhe Li, Honglong Chen, Kai Lin, Vladimir V. Shakhov, Leyi Shi:
Double Attention-based Deformable Convolutional Network for Recommendation. ICCC 2020: 1051-1056 - [c8]Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, Leyi Shi:
TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems. ML4CS (3) 2020: 20-32
2010 – 2019
- 2019
- [j10]Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi, Lianhai Wang:
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. IEEE Access 7: 66347-66357 (2019) - [j9]Leyi Shi, Yang Li, Tianxu Liu, Jia Liu, Baoying Shan, Honglong Chen:
Dynamic Distributed Honeypot Based on Blockchain. IEEE Access 7: 72234-72246 (2019) - [j8]Yang Li, Leyi Shi, Haijie Feng:
A Game-Theoretic Analysis for Distributed Honeypots. Future Internet 11(3): 65 (2019) - [j7]Leyi Shi, Yuwen Cui, Xu Han, Honglong Chen, Deli Liu:
Mimicry honeypot: an evolutionary decoy system. Int. J. High Perform. Comput. Netw. 14(2): 157-164 (2019) - [j6]Xuxin Zhang, Honglong Chen, Kai Lin, Zhibo Wang, Jiguo Yu, Leyi Shi:
RMTS: A robust clock synchronization scheme for wireless sensor networks. J. Netw. Comput. Appl. 135: 1-10 (2019) - 2018
- [j5]Kai Lin, Honglong Chen, Tianjiao Dai, Denghui Liu, Lu Liu, Leyi Shi:
Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags. IEEE Access 6: 54435-54446 (2018) - [j4]Leyi Shi, Yang Li, Haijie Feng:
Performance Analysis of Honeypot with Petri Nets. Inf. 9(10): 245 (2018) - [j3]Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, Leyi Shi:
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. IEEE Internet Things J. 5(4): 2915-2926 (2018) - 2017
- [j2]Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, Xiangyuan Jiang:
Efficient 3-dimensional localization for RFID systems using jumping probe. Pervasive Mob. Comput. 41: 300-318 (2017) - 2016
- [j1]Xin Liu, Yao Wang, Dehai Zhao, Weishan Zhang, Leyi Shi:
Patching by automatically tending to hub nodes based on social trust. Comput. Stand. Interfaces 44: 94-101 (2016) - 2014
- [c7]Leyi Shi, Yao Wang, Xin Liu:
An ACO-Based Trust Inference Algorithm. BWCCA 2014: 216-220 - [c6]Xin Liu, Zhaojun Xin, Leyi Shi, Yao Wang:
A decentralized and personalized spam filter based on social computing. IWCMC 2014: 887-894 - 2013
- [c5]Xin Liu, Leyi Shi, Yao Wang, Zhaojun Xin, Wenjing Fu:
A Dynamic Trust Conference Algorithm for Social Network. 3PGCIC 2013: 340-346 - [c4]Xin Liu, Zhaojun Xin, Leyi Shi:
Automatic Patching Based on Social Computing in P2P Network. EIDWT 2013: 471-478 - 2012
- [c3]Leyi Shi, Xiaorui Wang, Wenjing Fu, Xin Liu, Zhen Qin:
An Improved Anti-collision Algorithm for ISO15693 RFID Systems. CSS 2012: 339-351
2000 – 2009
- 2008
- [c2]Leyi Shi, Chunfu Jia, Shuwang Lü:
Full Service Hopping for Proactive Cyber-Defense. ICNSC 2008: 1337-1342 - 2007
- [c1]Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu:
Port and Address Hopping for Active Cyber-Defense. PAISI 2007: 295-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint