Shigen Shen

Orcid: 0000-0002-7558-5379

According to our database1, Shigen Shen authored at least 94 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things.
IEEE Internet Things J., April, 2024

Future Quantum Communications and Networking: A Review and Vision.
IEEE Wirel. Commun., February, 2024

Dissipative Filtering of Markovian Jumping Systems via Adaptive Sliding Mode Control.
Circuits Syst. Signal Process., February, 2024

Microservice-driven privacy-aware cross-platform social relationship prediction based on sequential information.
Softw. Pract. Exp., January, 2024

Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL.
J. Parallel Distributed Comput., January, 2024

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks.
Appl. Soft Comput., January, 2024

2023
Joint dual-stream interaction and multi-scale feature extraction network for multi-spectral pedestrian detection.
Appl. Soft Comput., November, 2023

Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing.
IEEE Internet Things J., October, 2023

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems.
Expert Syst. Appl., September, 2023

NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering.
IEEE Trans. Veh. Technol., August, 2023

SR-HGN: Semantic- and Relation-Aware Heterogeneous Graph Neural Network.
Expert Syst. Appl., August, 2023

Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes.
Digit. Commun. Networks, August, 2023

Hyperspectral Image Classification Based on Dense Pyramidal Convolution and Multi-Feature Fusion.
Remote. Sens., June, 2023

Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT.
J. Parallel Distributed Comput., June, 2023

A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval.
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2023

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things.
J. Netw. Comput. Appl., May, 2023

Popularity-Aware and Diverse Web APIs Recommendation Based on Correlation Graph.
IEEE Trans. Comput. Soc. Syst., April, 2023

Blockchain-Aided Network Resource Orchestration in Intelligent Internet of Things.
IEEE Internet Things J., April, 2023

An accuracy-enhanced group recommendation approach based on DEMATEL.
Pattern Recognit. Lett., March, 2023

One-dimensional VGGNet for high-dimensional data.
Appl. Soft Comput., March, 2023

MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG Signals.
ACM Trans. Sens. Networks, February, 2023

Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies.
IEEE Trans. Dependable Secur. Comput., 2023

DNFS-VNE: Deep Neuro-Fuzzy System-Driven Virtual Network Embedding Algorithm.
CoRR, 2023

Heterogeneous Graph Contrastive Multi-view Learning.
Proceedings of the 2023 SIAM International Conference on Data Mining, 2023

Resource Allocation and Orchestration of Slicing Services in Softwarized Space-Aerial-Ground Integrated Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
Reinforcement Learning Assisted Bandwidth Aware Virtual Network Resource Allocation.
IEEE Trans. Netw. Serv. Manag., December, 2022

FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow Prediction.
IEEE Trans. Veh. Technol., 2022

Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks.
IEEE Trans. Syst. Man Cybern. Syst., 2022

An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures.
IEEE Trans. Ind. Informatics, 2022

Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra.
IEEE Trans. Inf. Forensics Secur., 2022

Observer-based Adaptive Funnel Dynamic Surface Control for Nonlinear Systems with Unknown Control Coefficients and Hysteresis Input.
Neural Process. Lett., 2022

FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks.
IEEE Netw., 2022

A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment.
Libr. Hi Tech, 2022

How to protect reader lending privacy under a cloud environment: a technical method.
Libr. Hi Tech, 2022

Incorporating Distributed DRL Into Storage Resource Optimization of Space-Air-Ground Integrated Wireless Communication Network.
IEEE J. Sel. Top. Signal Process., 2022

Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination.
J. Inf. Secur. Appl., 2022

Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud.
IEEE Internet Things J., 2022

RKD-VNE: Virtual network embedding algorithm assisted by resource knowledge description and deep reinforcement learning in IIoT scenario.
Future Gener. Comput. Syst., 2022

Stimulating trust cooperation in edge services: An evolutionary tripartite game.
Eng. Appl. Artif. Intell., 2022

PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation.
CoRR, 2022

PECCO: A profit and cost-oriented computation offloading scheme in edge-cloud environment with improved Moth-flame optimization.
Concurr. Comput. Pract. Exp., 2022

Capacity Analysis of Diffusive Molecular Communication System with an Interfering Receiver.
Proceedings of the International Conference on Networking and Network Applications, 2022

DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing.
Proceedings of the IEEE INFOCOM 2022, 2022

DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation Offloading.
Proceedings of the IEEE INFOCOM 2022, 2022

A Deep Reinforcement Learning Approach to Edge-based IDS Packets Sampling.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

2021
Constructing dummy query sequences to protect location privacy and query privacy in location-based services.
World Wide Web, 2021

Exponential Synchronization of Stochastic Neural Networks with Time-Varying Delays and Lévy Noises via Event-Triggered Control.
Neural Process. Lett., 2021

An effective approach for the protection of user commodity viewing privacy in e-commerce website.
Knowl. Based Syst., 2021

A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection.
J. Organ. End User Comput., 2021

Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot.
J. Netw. Comput. Appl., 2021

A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud.
IEEE Internet Things J., 2021

Restaurant Recommendation in Vehicle Context Based on Prediction of Traffic Conditions.
Int. J. Pattern Recognit. Artif. Intell., 2021

SIR<sub>1</sub>R<sub>2</sub>: Characterizing Malware Propagation in WSNs With Second Immunization.
IEEE Access, 2021

2020
New NOMA-Based Two-Way Relay Networks.
IEEE Trans. Veh. Technol., 2020

A dummy-based user privacy protection approach for text information retrieval.
Knowl. Based Syst., 2020

Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton.
Int. J. Distributed Sens. Networks, 2020

Malware propagation model in wireless sensor networks under attack-defense confrontation.
Comput. Commun., 2020

An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs.
IEEE Access, 2020

2019
Multi-population techniques in nature inspired optimization algorithms: A comprehensive survey.
Swarm Evol. Comput., 2019

HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs.
J. Netw. Comput. Appl., 2019

Three-dimensional robot localization using cameras in wireless multimedia sensor networks.
J. Netw. Comput. Appl., 2019

SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks.
IEEE Access, 2019

2018
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds.
IEEE Trans. Inf. Forensics Secur., 2018

Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks.
IEEE Internet Things J., 2018

Element-Weighted Neutrosophic Correlation Coefficient and Its Application in Improving CAMShift Tracker in RGBD Video.
Inf., 2018

Data sharing in VANETs based on evolutionary fuzzy game.
Future Gener. Comput. Syst., 2018

A Markov Detection Tree-Based Centralized Scheme to Automatically Identify Malicious Webpages on Cloud Platforms.
IEEE Access, 2018

2017
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion.
J. Netw. Comput. Appl., 2017

A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropy.
J. Intell. Fuzzy Syst., 2017

Neutrosophic Similarity Score Based Weighted Histogram for Robust Mean-Shift Tracking.
Inf., 2017

Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications.
Neurocomputing, 2017

Evolutionary game-based cooperative strategy for effective capacity of multiple-input-multiple-output communications.
Int. J. Distributed Sens. Networks, 2017

EOC: Energy Optimization Coding for Wireless Nanosensor Networks in the Terahertz Band.
IEEE Access, 2017

2016
Reliability Evaluation for Clustered WSNs under Malware Propagation.
Sensors, 2016

Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach.
J. Sensors, 2016

An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

Fuzzy probabilistic data association filter and its application to single maneuvering target.
EURASIP J. Adv. Signal Process., 2016

Energy-efficient coding for electromagnetic nanonetworks in the Terahertz band.
Ad Hoc Networks, 2016

2015
Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs.
Mob. Inf. Syst., 2015

Optimal Report Strategies for WBANs Using a Cloud-Assisted IDS.
Int. J. Distributed Sens. Networks, 2015

Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud.
Appl. Soft Comput., 2015

2014
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2014

Event-triggered control for multi-agent systems with randomly occurring nonlinear dynamics and time-varying delay.
J. Frankl. Inst., 2014

Coverage Capacity Optimization for Mobile Sensor Networks Based on Evolutionary Games.
Int. J. Distributed Sens. Networks, 2014

2012
Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm.
J. Networks, 2012

Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain.
Appl. Soft Comput., 2012

2011
A Survey of Game Theory in Wireless Sensor Networks Security.
J. Networks, 2011

Signaling game based strategy of intrusion detection in wireless sensor networks.
Comput. Math. Appl., 2011

2009
Research of Secure Intranet/Internet Access Platform Based on Ontology.
J. Networks, 2009

2008
Unified Certificate Validation System DNS-OCSP.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008


  Loading...