Limin Shen

Orcid: 0000-0002-9325-2279

According to our database1, Limin Shen authored at least 72 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Poisoning QoS-aware cloud API recommender system with generative adversarial network attack.
Expert Syst. Appl., March, 2024

2023
Online Learning From Incomplete and Imbalanced Data Streams.
IEEE Trans. Knowl. Data Eng., October, 2023

Counterfactual explanation generation with minimal feature boundary.
Inf. Sci., May, 2023

Online Causal Feature Selection for Streaming Features.
IEEE Trans. Neural Networks Learn. Syst., March, 2023

Online Multi-Label Streaming Feature Selection With Label Correlation.
IEEE Trans. Knowl. Data Eng., March, 2023

Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image.
Appl. Intell., 2023

BAT: Mining Binary-API Topic for Multi-service Application Development.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
New repetitive motion planning scheme with cube end-effector planning precision for redundant robotic manipulators.
Robotica, 2022

Online feature selection for multi-source streaming features.
Inf. Sci., 2022

Context and auto-interaction are all you need: Towards context embedding based QoS prediction via automatic feature interaction for high quality cloud API delivery.
Future Gener. Comput. Syst., 2022

A Formal Method for Description and Decision of Android Apps Behavior Based on Process Algebra.
IEEE Access, 2022

Few-Shot Relation Classification Research Based on Prototypical Network and Causal Intervention.
IEEE Access, 2022

Seizing the Long Tail: Neural Complementary Recommendation for Cloud API Delivery.
Proceedings of the IEEE Smartworld, 2022

Knowledge Graph Enhanced Web API Recommendation via Neighbor Information Propagation for Multi-service Application Development.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Association Rule Guided Web API Complementary Function Recommendation for Mashup Creation: An Explainable Perspective.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2022

2021
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination.
Secur. Commun. Networks, 2021

Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks.
Sci. China Inf. Sci., 2021

2020
Web service QoS prediction: when collaborative filtering meets data fluctuating in big-range.
World Wide Web, 2020

Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications.
Mob. Inf. Syst., 2020

Certificateless aggregate signature scheme secure against fully chosen-key attacks.
Inf. Sci., 2020

Risk Measurement Method for Privilege Escalation Attacks on Android Apps Based on Process Algebra.
Inf., 2020

An accurate and efficient web service QoS prediction model with wide-range awareness.
Future Gener. Comput. Syst., 2020

Investigation on the Discretization of a Repetitive Path Planning Scheme for Redundant Robot Manipulators.
IEEE Access, 2020

Contexts Enhance Accuracy: On Modeling Context Aware Deep Factorization Machine for Web API QoS Prediction.
IEEE Access, 2020

A Two-Layer Deep Learning Method for Android Malware Detection Using Network Traffic.
IEEE Access, 2020

2019
Modelling geographical effect of user neighbourhood on collaborative web service QoS prediction.
Int. J. High Perform. Comput. Netw., 2019

Pairing-free certificateless signature with revocation.
Int. J. Comput. Sci. Eng., 2019

A location-aware matrix factorisation approach for collaborative web service QoS prediction.
Int. J. Comput. Sci. Eng., 2019

Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model.
IET Inf. Secur., 2019

Your neighbors are misunderstood: On modeling accurate similarity driven by data range to collaborative web service QoS prediction.
Future Gener. Comput. Syst., 2019

Online Feature Selection for Streaming Features Using Self-Adaption Sliding-Window Sampling.
IEEE Access, 2019

Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019

2018
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Netw. Appl., 2018

A revocable certificateless encryption scheme with high performance.
Int. J. High Perform. Comput. Netw., 2018

Online Feature Selection for Streaming Features with High Redundancy Using Sliding-Window Sampling.
Proceedings of the 2018 IEEE International Conference on Big Knowledge, 2018

2017
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks.
Secur. Commun. Networks, 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017

Your neighbors alleviate cold-start: On geographical neighborhood influence to collaborative web service QoS prediction.
Knowl. Based Syst., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017

An efficient revocable ID-based encryption scheme in the standard model.
Int. J. Embed. Syst., 2017

Exploiting Web service geographical neighborhood for collaborative QoS prediction.
Future Gener. Comput. Syst., 2017

2016
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016

A Revocable Certificateless Signature Scheme Without Pairing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

A user dependent Web service QoS collaborative prediction approach using neighborhood regularized matrix factorization.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Alleviating Data Sparsity in Web Service QoS Prediction by Capturing Region Context Influence.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
Efficient revocable certificateless encryption against decryption key exposure.
IET Inf. Secur., 2015

2014
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Secur. Commun. Networks, 2014

Determination Method of Evolution Type of Service-oriented Entity.
J. Softw., 2014

A Revocable Certificateless Signature Scheme.
J. Comput., 2014

A Process Algebra-Based Detection Model for Multithreaded Programs in Communication System.
KSII Trans. Internet Inf. Syst., 2014

Notes on the security of certificateless aggregate signature schemes.
Inf. Sci., 2014

Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
Int. J. Inf. Comput. Secur., 2014

Efficient Revocable Certificateless Encryption Secure in the Standard Model.
Comput. J., 2014

2013
A revocable certificateless signature scheme.
IACR Cryptol. ePrint Arch., 2013

Efficient leakage-resilient public key encryption from DDH assumption.
Clust. Comput., 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
On security of a Certificateless Aggregate Signature Scheme.
IACR Cryptol. ePrint Arch., 2012

Practical Certificateless Public Key Encryption in the Standard Model.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Flexible Collaborative Learning Model in E-Learning with Personalized Teaching Materials.
Proceedings of the Advances in Computer Science, 2011

A Measurement Method of Software Flexibility Based on SOCP.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2009
A Method to Enhance SCADA Systems Survivability with Exogenous Monitors.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Algorithm of Rule Generation from Flexible Information System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

User-Oriented Measurement of Software Flexibility.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2007
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Evaluation of Flexible Points on User Interface for Information System.
Proceedings of the ICEIS 2007, 2007

A Time and Interaction Model for Open Distributed Timing Computation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Setting and Evaluation of Flexible Points on Software User Interface.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Dynamic Composition of Web Service Based on Coordination Model.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Actors, Roles and Coordinators - A Coordination Model for Open Distributed and Embedded Systems.
Proceedings of the Coordination Models and Languages, 8th International Conference, 2006


  Loading...