Follow
Wei Shi
Wei Shi
Professor, P. Eng. School of Info. Tech./System and Computer Engineering, Faculty of Engineering
Verified email at carleton.ca - Homepage
Title
Cited by
Cited by
Year
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
1602019
Coverage protocols for wireless sensor networks: Review and future directions
R Elhabyan, W Shi, M St-Hilaire
Journal of Communications and Networks 21 (1), 45-60, 2019
1282019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
1272019
Budget-driven scheduling algorithms for batches of MapReduce jobs in heterogeneous clouds
Y Wang, W Shi
IEEE Transactions on Cloud Computing 2 (3), 306-319, 2014
1002014
Deep learning based emotion analysis of microblog texts
D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi
Information Fusion 64, 1-11, 2020
512020
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks
R Elhabyan, W Shi, M St-Hilaire
Journal of Network and Computer Applications 114, 57-69, 2018
512018
Black hole search in asynchronous rings using tokens
S Dobrev, R Královič, N Santoro, W Shi
Algorithms and Complexity, 139-150, 2006
432006
A novel web attack detection system for internet of things via ensemble classification
C Luo, Z Tan, G Min, J Gan, W Shi, Z Tian
IEEE Transactions on Industrial Informatics 17 (8), 5810-5818, 2020
422020
Black hole search with tokens in interconnected networks
W Shi
Stabilization, Safety, and Security of Distributed Systems, 670-682, 2009
352009
A privacy preserving scheme for nearest neighbor query
Y Wang, Z Tian, H Zhang, S Su, W Shi
Sensors 18 (8), 2440, 2018
332018
Using scattered mobile agents to locate a black hole in an un-oriented ring with tokens
S Dobrev, N Santoro, W Shi
International Journal of Foundations of Computer Science 19 (6), 1355-1372, 2008
302008
Aesmote: Adversarial reinforcement learning with smote for anomaly detection
X Ma, W Shi
IEEE Transactions on Network Science and Engineering 8 (2), 943-956, 2020
292020
An improved xen credit scheduler for i/o latency-sensitive applications on multicores
L Zeng, Y Wang, W Shi, D Feng
2013 International Conference on Cloud Computing and Big Data, 267-274, 2013
272013
Black hole search in computer networks: State-of-the-art, challenges and future directions
M Peng, W Shi, JP Corriveau, R Pazzi, Y Wang
Journal of Parallel and Distributed Computing 88, 1-15, 2016
242016
Modeling and validating requirements using executable cotnracts and scenarios
D Arnold, JP Corriveau, W Shi
2010 Eighth ACIS International Conference on Software Engineering Research …, 2010
212010
Scattered black hole search in an oriented ring using tokens
S Dobrev, N Santoro, W Shi
2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007
202007
Virtual servers co-migration for mobile accesses: Online versus off-line
Y Wang, W Shi, M Hu
IEEE Transactions on Mobile Computing 14 (12), 2576-2589, 2015
172015
Designing a streaming algorithm for outlier detection in data mining—An incremental approach
K Yu, W Shi, N Santoro
Sensors 20 (5), 1261, 2020
152020
A scheduling algorithm for hadoop mapreduce workflows with budget constraints in the heterogeneous cloud
A Wylie, W Shi, JP Corriveau, Y Wang
2016 IEEE International Parallel and Distributed Processing Symposium …, 2016
142016
Scenario-based validation: Beyond the user requirements notation
D Arnold, JP Corriveau, W Shi
2010 21st Australian Software Engineering Conference, 75-84, 2010
142010
The system can't perform the operation now. Try again later.
Articles 1–20