Sicong Shao

Orcid: 0000-0003-1205-3890

According to our database1, Sicong Shao authored at least 20 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Quantized Transformer Language Model Implementations on Edge Devices.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery.
Remote. Sens., 2022

An explainable and efficient deep learning framework for video anomaly detection.
Clust. Comput., 2022

AI-based Arabic Language and Speech Tutor.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

A BERT-based Deep Learning Approach for Reputation Analysis in Social Media.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
Multi-Layer Mapping of Cyberspace for Intrusion Detection.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics.
ACM Trans. Manag. Inf. Syst., 2020

Video Anomaly Detection using Pre-Trained Deep Convolutional Neural Nets and Context Mining.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Quasi-cliques Analysis for IRC Channel Thread Detection.
Proceedings of the Complex Networks and Their Applications VII, 2018

Autonomic Author Identification in Internet Relay Chat (IRC).
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Real-Time IRC Threat Detection Framework.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Real-Time Automatic Framework for IRC Threat Information Detection.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017


  Loading...