Follow
Wei Shi
Wei Shi
Professor, P. Eng. School of Info. Tech./System and Computer Engineering, Faculty of Engineering
Verified email at carleton.ca - Homepage
Title
Cited by
Cited by
Year
Coverage protocols for wireless sensor networks: Review and future directions
R Elhabyan, W Shi, M St-Hilaire
Journal of Communications and Networks 21 (1), 45-60, 2019
2592019
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani
IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019
2182019
A data-driven method for future Internet route decision modeling
Z Tian, S Su, W Shi, X Du, M Guizani, X Yu
Future Generation Computer Systems 95, 212-220, 2019
1452019
Deep learning based emotion analysis of microblog texts
D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi
Information Fusion 64, 1-11, 2020
1442020
A novel web attack detection system for internet of things via ensemble classification
C Luo, Z Tan, G Min, J Gan, W Shi, Z Tian
IEEE Transactions on Industrial Informatics 17 (8), 5810-5818, 2020
1362020
Aesmote: Adversarial reinforcement learning with smote for anomaly detection
X Ma, W Shi
IEEE Transactions on Network Science and Engineering 8 (2), 943-956, 2020
1192020
Budget-driven scheduling algorithms for batches of MapReduce jobs in heterogeneous clouds
Y Wang, W Shi
IEEE Transactions on Cloud Computing 2 (3), 306-319, 2014
1112014
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks
R Elhabyan, W Shi, M St-Hilaire
Journal of Network and Computer Applications 114, 57-69, 2018
822018
Black hole search in asynchronous rings using tokens
S Dobrev, R Královič, N Santoro, W Shi
Algorithms and Complexity, 139-150, 2006
452006
Designing a streaming algorithm for outlier detection in data mining—An incremental approach
K Yu, W Shi, N Santoro
Sensors 20 (5), 1261, 2020
402020
A privacy preserving scheme for nearest neighbor query
Y Wang, Z Tian, H Zhang, S Su, W Shi
Sensors 18 (8), 2440, 2018
372018
Black hole search with tokens in interconnected networks
W Shi
Stabilization, Safety, and Security of Distributed Systems, 670-682, 2009
362009
RD-IOD: Two-level residual-distillation-based triple-network for incremental object detection
D Yang, Y Zhou, W Shi, D Wu, W Wang
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022
352022
Using scattered mobile agents to locate a black hole in an un-oriented ring with tokens
S Dobrev, N Santoro, W Shi
International Journal of Foundations of Computer Science 19 (6), 1355-1372, 2008
352008
Obfuscation of images via differential privacy: From facial images to general images
WL Croft, JR Sack, W Shi
Peer-to-Peer Networking and Applications 14, 1705-1733, 2021
322021
An improved xen credit scheduler for i/o latency-sensitive applications on multicores
L Zeng, Y Wang, W Shi, D Feng
2013 International Conference on Cloud Computing and Big Data, 267-274, 2013
322013
Black hole search in computer networks: State-of-the-art, challenges and future directions
M Peng, W Shi, JP Corriveau, R Pazzi, Y Wang
Journal of Parallel and Distributed Computing 88, 1-15, 2016
282016
Differential privacy via a truncated and normalized laplace mechanism
W Croft, JR Sack, W Shi
Journal of Computer Science and Technology 37 (2), 369-388, 2022
272022
Terahertz-band channel and beam split estimation via array perturbation model
AM Elbir, W Shi, AK Papazafeiropoulos, P Kourtessis, S Chatzinotas
IEEE Open Journal of the communications society 4, 892-907, 2023
252023
Deep learning and dempster-shafer theory based insider threat detection
Z Tian, W Shi, Z Tan, J Qiu, Y Sun, F Jiang, Y Liu
Mobile Networks and Applications, 1-10, 2020
252020
The system can't perform the operation now. Try again later.
Articles 1–20