Follow
Wei Shi
Wei Shi
Professor, P. Eng. School of Info. Tech./System and Computer Engineering, Faculty of Engineering
Verified email at carleton.ca - Homepage
Title
Cited by
Cited by
Year
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
1702019
Coverage protocols for wireless sensor networks: Review and future directions
R Elhabyan, W Shi, M St-Hilaire
Journal of Communications and Networks 21 (1), 45-60, 2019
1502019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
1322019
Budget-driven scheduling algorithms for batches of MapReduce jobs in heterogeneous clouds
Y Wang, W Shi
IEEE Transactions on Cloud Computing 2 (3), 306-319, 2014
1022014
Deep learning based emotion analysis of microblog texts
D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi
Information Fusion 64, 1-11, 2020
752020
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks
R Elhabyan, W Shi, M St-Hilaire
Journal of Network and Computer Applications 114, 57-69, 2018
632018
A novel web attack detection system for internet of things via ensemble classification
C Luo, Z Tan, G Min, J Gan, W Shi, Z Tian
IEEE Transactions on Industrial Informatics 17 (8), 5810-5818, 2020
622020
Black hole search in asynchronous rings using tokens
S Dobrev, R Královič, N Santoro, W Shi
Algorithms and Complexity, 139-150, 2006
432006
Aesmote: Adversarial reinforcement learning with smote for anomaly detection
X Ma, W Shi
IEEE Transactions on Network Science and Engineering 8 (2), 943-956, 2020
372020
Black hole search with tokens in interconnected networks
W Shi
Stabilization, Safety, and Security of Distributed Systems, 670-682, 2009
342009
A privacy preserving scheme for nearest neighbor query
Y Wang, Z Tian, H Zhang, S Su, W Shi
Sensors 18 (8), 2440, 2018
332018
Using scattered mobile agents to locate a black hole in an un-oriented ring with tokens
S Dobrev, N Santoro, W Shi
International Journal of Foundations of Computer Science 19 (6), 1355-1372, 2008
302008
An improved xen credit scheduler for i/o latency-sensitive applications on multicores
L Zeng, Y Wang, W Shi, D Feng
2013 International Conference on Cloud Computing and Big Data, 267-274, 2013
292013
Black hole search in computer networks: State-of-the-art, challenges and future directions
M Peng, W Shi, JP Corriveau, R Pazzi, Y Wang
Journal of Parallel and Distributed Computing 88, 1-15, 2016
262016
Designing a streaming algorithm for outlier detection in data mining—An incremental approach
K Yu, W Shi, N Santoro
Sensors 20 (5), 1261, 2020
222020
Modeling and validating requirements using executable cotnracts and scenarios
D Arnold, JP Corriveau, W Shi
2010 Eighth ACIS International Conference on Software Engineering Research …, 2010
212010
Scattered black hole search in an oriented ring using tokens
S Dobrev, N Santoro, W Shi
2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007
202007
Virtual servers co-migration for mobile accesses: Online versus off-line
Y Wang, W Shi, M Hu
IEEE Transactions on Mobile Computing 14 (12), 2576-2589, 2015
192015
Rd-iod: Two-level residual-distillation-based triple-network for incremental object detection
D Yang, Y Zhou, W Shi, D Wu, W Wang
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022
162022
Scenario-based validation: Beyond the user requirements notation
D Arnold, JP Corriveau, W Shi
2010 21st Australian Software Engineering Conference, 75-84, 2010
142010
The system can't perform the operation now. Try again later.
Articles 1–20