Shudong Li

Orcid: 0000-0001-6381-1984

According to our database1, Shudong Li authored at least 73 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion.
IEEE Internet Things J., September, 2023

BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection.
World Wide Web (WWW), July, 2023

A Deceptive Reviews Detection Method Based on Multidimensional Feature Construction and Ensemble Feature Selection.
IEEE Trans. Comput. Soc. Syst., February, 2023

IR-Capsule: Two-Stream Network for Face Forgery Detection.
Cogn. Comput., January, 2023

Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control.
IEEE Trans. Netw. Sci. Eng., 2023

A Malicious Mining Code Detection Method Based on Multi-Features Fusion.
IEEE Trans. Netw. Sci. Eng., 2023

Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning.
IEEE Trans. Intell. Transp. Syst., 2023

Diffusion Posterior Sampling for Nonlinear CT Reconstruction.
CoRR, 2023

Influence maximization through exploring structural information.
Appl. Math. Comput., 2023

OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers.
Proceedings of the IEEE International Conference on Image Processing, 2023

A Review of User Identity Linkage Across Social Networks.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm.
IEEE Trans. Netw. Serv. Manag., December, 2022

False Alert Detection Based on Deep Learning and Machine Learning.
Int. J. Semantic Web Inf. Syst., 2022

Dimension-reduced spatiotemporal network for lameness detection in dairy cows.
Comput. Electron. Agric., 2022

A Multi-step Attack Detection Framework for the Power System Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Review of Attribution Technical for APT Attacks.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Review of Provenance Graph based APT Attack Detection: Applications and Developments.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021

Comparison of Muscle Activity and Ultrasound Response of Lower Extremity Muscles During Treadmill and Track Running.
J. Medical Imaging Health Informatics, 2021

The biomechanical characteristics of a feline distal forelimb: A finite element analysis study.
Comput. Biol. Medicine, 2021

A weighted network community detection algorithm based on deep learning.
Appl. Math. Comput., 2021

Detection method for individual pig based on improved YOLOv4 Convolutional Neural Network.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

Malware classification based on visualization and feature fusion.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

An android malware detection approach using multi-feature fusion and TF-IDF algorithm.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey of Advanced Persistent Threats Attack and Defense.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey of DeepFakes Generation and Detection.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Topic representation model based on microblogging behavior analysis.
World Wide Web, 2020

Investigating the co-evolution of node reputation and edge-strategy in prisoner's dilemma game.
Appl. Math. Comput., 2020

Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment.
IEEE Access, 2020

Framework Design of Environment Monitoring System Based on Machine Learning.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Resume Extraction and Validation from Public Information.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Malware Detection Framework Based on Weighted Heterograph.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

An APT Group Knowledge Model based on MDATA.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Building framework for selecting finite element models of complex large welded structure of railway vehicles.
Simul. Model. Pract. Theory, 2019

Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019

Bidirectional self-adaptive resampling in internet of things big data learning.
Multim. Tools Appl., 2019

Distribution-Sensitive Unbalanced Data Oversampling Method for Medical Diagnosis.
J. Medical Syst., 2019

Investigation of epidemic spreading process on multiplex networks by incorporating fatal properties.
Appl. Math. Comput., 2019

Coevolution of multi-game resolves social dilemma in network population.
Appl. Math. Comput., 2019

A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access, 2019

Review: Topic Model Application for Social Network Public Opinion Analysis.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

Trusted Component Decomposition Based on OR-Transition Colored Petri Net.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on Content Extraction of Rich Text Web Pages.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Calculation of Network Security Index Based on Convolution Neural Networks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
Simulation of Cell Dielectric Properties Based on COMSOL.
J. Robotics Netw. Artif. Life, 2018

Repost prediction incorporating time-sensitive mutual influence in social networks.
J. Comput. Sci., 2018

Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City.
IEEE Access, 2018

Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Approximation Algorithms for Controller Placement Problems in Software Defined Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Identity-Based Blind Proxy Re-Signature Scheme for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
An efficient quantum blind digital signature scheme.
Sci. China Inf. Sci., 2017

Stress distribution of metatarsals during forefoot strike versus rearfoot strike: A finite element study.
Comput. Biol. Medicine, 2017

A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Identifying users across social networks based on dynamic core interests.
Neurocomputing, 2016

2015
A Hybrid Model for Experts Finding in Community Question Answering.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

Answer Quality Assessment in CQA Based on Similar Support Sets.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2015

2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013

A MapReduce and Information Compression Based Social Community Structure Mining Method.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Modelling security message propagation in delay tolerant networks.
Secur. Commun. Networks, 2012

A Secure Message Transaction Protocol for Delay Tolerant Networks.
J. Commun., 2012

Inexact trust region PGC method for large sparse unconstrained optimization.
Comput. Optim. Appl., 2012

Measurement and analysis of torsional vibration signal for rotating shaft system.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Application of equipment maintenance vehicles based on entropy multi-objective decision.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...