Coverage protocols for wireless sensor networks: Review and future directions R Elhabyan, W Shi, M St-Hilaire Journal of Communications and Networks 21 (1), 45-60, 2019 | 225 | 2019 |
Real-time lateral movement detection based on evidence reasoning network for edge computing environment Z Tian, W Shi, Y Wang, C Zhu, X Du, S Su, Y Sun, N Guizani IEEE Transactions on Industrial Informatics 15 (7), 4285-4294, 2019 | 195 | 2019 |
A data-driven method for future Internet route decision modeling Z Tian, S Su, W Shi, X Du, M Guizani, X Yu Future Generation Computer Systems 95, 212-220, 2019 | 141 | 2019 |
Deep learning based emotion analysis of microblog texts D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi Information Fusion 64, 1-11, 2020 | 109 | 2020 |
A novel web attack detection system for internet of things via ensemble classification C Luo, Z Tan, G Min, J Gan, W Shi, Z Tian IEEE Transactions on Industrial Informatics 17 (8), 5810-5818, 2020 | 109 | 2020 |
Budget-driven scheduling algorithms for batches of MapReduce jobs in heterogeneous clouds Y Wang, W Shi IEEE Transactions on Cloud Computing 2 (3), 306-319, 2014 | 107 | 2014 |
Aesmote: Adversarial reinforcement learning with smote for anomaly detection X Ma, W Shi IEEE Transactions on Network Science and Engineering 8 (2), 943-956, 2020 | 87 | 2020 |
A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks R Elhabyan, W Shi, M St-Hilaire Journal of Network and Computer Applications 114, 57-69, 2018 | 73 | 2018 |
Black hole search in asynchronous rings using tokens S Dobrev, R Královič, N Santoro, W Shi Algorithms and Complexity, 139-150, 2006 | 45 | 2006 |
A privacy preserving scheme for nearest neighbor query Y Wang, Z Tian, H Zhang, S Su, W Shi Sensors 18 (8), 2440, 2018 | 37 | 2018 |
Black hole search with tokens in interconnected networks W Shi Stabilization, Safety, and Security of Distributed Systems, 670-682, 2009 | 36 | 2009 |
Using scattered mobile agents to locate a black hole in an un-oriented ring with tokens S Dobrev, N Santoro, W Shi International Journal of Foundations of Computer Science 19 (6), 1355-1372, 2008 | 34 | 2008 |
RD-IOD: Two-level residual-distillation-based triple-network for incremental object detection D Yang, Y Zhou, W Shi, D Wu, W Wang ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022 | 32 | 2022 |
Designing a streaming algorithm for outlier detection in data mining—An incremental approach K Yu, W Shi, N Santoro Sensors 20 (5), 1261, 2020 | 32 | 2020 |
An improved xen credit scheduler for i/o latency-sensitive applications on multicores L Zeng, Y Wang, W Shi, D Feng 2013 International Conference on Cloud Computing and Big Data, 267-274, 2013 | 30 | 2013 |
Black hole search in computer networks: State-of-the-art, challenges and future directions M Peng, W Shi, JP Corriveau, R Pazzi, Y Wang Journal of Parallel and Distributed Computing 88, 1-15, 2016 | 27 | 2016 |
Obfuscation of images via differential privacy: From facial images to general images WL Croft, JR Sack, W Shi Peer-to-Peer Networking and Applications 14, 1705-1733, 2021 | 23 | 2021 |
Virtual servers co-migration for mobile accesses: Online versus off-line Y Wang, W Shi, M Hu IEEE Transactions on Mobile Computing 14 (12), 2576-2589, 2015 | 22 | 2015 |
Differential privacy via a truncated and normalized laplace mechanism W Croft, JR Sack, W Shi Journal of Computer Science and Technology 37 (2), 369-388, 2022 | 21 | 2022 |
Multi-candidate voting model based on blockchain D Xu, W Shi, W Zhai, Z Tian IEEE/CAA Journal of Automatica Sinica 8 (12), 1891-1900, 2021 | 21 | 2021 |