Shoufeng Cao

Orcid: 0000-0001-5178-7454

According to our database1, Shoufeng Cao authored at least 19 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An asset-backed decentralised finance instrument for food supply chains - A case study from the livestock export industry.
Comput. Ind., May, 2023

Exploring blockchain-based Traceability for Food Supply Chain Sustainability: Towards a Better Way of Sustainability Communication with Consumers.
Proceedings of the 4th International Conference on Industry 4.0 and Smart Manufacturing (ISM 2023), 2023

2022
Garbage in garbage out: The precarious link between IoT and blockchain in food supply chains.
J. Ind. Inf. Integr., 2022

Blockchain smart contracts for supply chain finance: Mapping the innovation potential in Australia-China beef supply chains.
J. Ind. Inf. Integr., 2022

A novel model for voice command fingerprinting using deep learning.
J. Inf. Secur. Appl., 2022

Boosting the Robustness of Neural Networks with M-PGD.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

2021
Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity.
CoRR, 2021

SELF: A method of searching for library functions in stripped binary code.
Comput. Secur., 2021

From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains.
Comput. Networks, 2021

Strengthening consumer trust in beef supply chain traceability with a blockchain-based human-machine reconcile mechanism.
Comput. Electron. Agric., 2021

2020
Active Measurement of Open Resolver Service Nodes.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
An Ontology-based Bayesian network modelling for supply chain risk propagation.
Ind. Manag. Data Syst., 2019

Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices.
IEEE Access, 2019

2018
WLRRS: A new recommendation system based on weighted linear regression models.
Comput. Electr. Eng., 2018

2017
Web Anomaly Detection Based on Frequent Closed Episode Rules.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Matching Similar Functions in Different Versions of a Malware.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
NNSDS: Network Nodes' Social Attributes Discovery System Based on Netflow.
Proceedings of the Web Technologies and Applications, 2014

2012
Progress in Study of Encrypted Traffic Classification.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research and implementation on an admission control policy for temporally correlated workloads in virtual application environments.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012


  Loading...