Kai Shi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Generating solutions to far analogies makes individuals tend to categorize information based on thematic relations.
Cogn. Process., November, 2023

Shape perception of soft hand based on dual-signal comparison contact detection.
Ind. Robot, 2023

Monadic Deep Learning.
CoRR, 2023

Efficient Implementation for Composite CNN-Based HSI Classification Algorithm with Huawei Ascend Framework.
Proceedings of the 13th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, 2023

Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Stochastic Game Model for Cloud Platform Security.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Malicious Process Identification via System Audit Logs Analysis.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Constructing Weighted Host Communication Networks for Intrusion Detection based on Complex Network Theory.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Incentive Mechanism for Federated Learning Participants Based on Statistical Analysis Features.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Research on Network Traffic Feature Map Generation and Evaluation Methods.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

2022
The final security problem in IOT: Don't count on the canary!
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Renyi entropy-based detection method for low-rate interest flooding attacks.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

A cache replacement strategy based on content features in named data networking.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
Spatial-Temporal Variability of Land Surface Temperature Spatial Pattern: Multifractal Detrended Fluctuation Analysis.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

A Comprehensive Survey and Analysis on Path Planning Algorithms and Heuristic Functions.
Proceedings of the Intelligent Computing, 2020

2018
Virtual Inertia Control Strategy in Microgrid Based on Virtual Synchronous Generator Technology.
IEEE Access, 2018

2017
Rule-based back propagation neural networks for various precision rough set presented KANSEI knowledge prediction: a case study on shoe product form features extraction.
Neural Comput. Appl., 2017

基于多节点社团意识系统的属性图聚类算法 (Attributed Graph Clustering Algorithm Based on Cluster-aware Multiagent System).
计算机科学, 2017

Directional AF Cooperative Communication System Based on Outage Probability.
Int. J. Bus. Data Commun. Netw., 2017

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017

Wind turbine gearbox condition monitoring based on extreme gradient boosting.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Relative health index of wind turbines based on kernel density estimation.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Combining Evolutionary Algorithms with Constraint Solving for Configuration Optimization.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

A Novel File Carving Algorithm for EVTX Logs.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Anticipatory Runway Incursion Prevention Based on Inaccurate Position Surveillance Information.
Proceedings of the Intelligent Information and Database Systems - 9th Asian Conference, 2017

2016
Collaborative Contextual Anomaly Detection for Industrial Equipment Groups.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Wind Turbine Dynamic State Prediction Method Based on the Similarity of Historical Data.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Research on Directional AF Cooperative Communication System Based on Outage Probability.
Proceedings of the Advances on P2P, 2016

2013
TSBCC: Time Series-Based Congestion Control Algorithm for Wireless Network.
J. Networks, 2013

Anticipatory Runway Incursion Prevention Systems.
IEICE Trans. Inf. Syst., 2013

Finding Theorems in NBG Set Theory by Automated Forward Deduction Based on Strong Relevant Logic.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Anticipatory Emergency Elevator Evacuation Systems.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
Automated theorem finding by forward deduction based on strong relevant logic: A case study in NBG set theory.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

2011
A multi-GPU based semi-Lagrangian fluid solver.
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011



  Loading...