Shengwei Yi

According to our database1, Shengwei Yi authored at least 15 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Social networks formed by follower-followee relationships on academic social networking sites: an examination of corporation users.
Scientometrics, 2020

2019
ASSCA: API sequence and statistics features combined architecture for malware detection.
Comput. Networks, 2019

Design and Implementation of Security System for IPv6 Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

2018
Continuous authentication by free-text keystroke based on CNN plus RNN.
Proceedings of the 2018 International Conference on Identification, 2018

How Corporations Utilize Academic Social Networking Website?: A Case Study of Health & Biomedicine Corporations.
Proceedings of the Smart Health - International Conference, 2018

A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
ASSCA: API based Sequence and Statistics features Combined malware detection Architecture.
Proceedings of the 2017 International Conference on Identification, 2017

2016
Preference-Aware Top-k Spatio-Textual Queries.
Proceedings of the Web-Age Information Management, 2016

2015
A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Mining High Utility Itemsets over Uncertain Databases.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2013
Design and Implementation of Fuzzing Technology for OPC Protocol.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Pairing and Authentication Security Technologies in Low-Power Bluetooth.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Mining Frequent Rooted Ordered Tree Generators Efficiently.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems.
J. Networks, 2012

2011
Gird or cloud? Survey on scientific computing infrastructure.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011


  Loading...