Wei Shi

Orcid: 0000-0002-3071-8350

Affiliations:
  • Carleton University, School of Infermation Technology, Faculty of Engineering and Design, Ottawa, ON, Canada
  • University of Ontario Institute of Technology, Oshawa, ON, Canada (2008 - 2016)
  • Algonquin College of Applied Arts and Technology, Ottawa, ON, Canada (2007 - 2008)
  • Carleton University, School of Computer Science, Ottawa, ON, Canada (PhD 2007)


According to our database1, Wei Shi authored at least 97 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Intelligence Networking for Cooperative Positioning Towards Future Internet of Vehicles.
IEEE Trans. Veh. Technol., March, 2024

2023
Terahertz-Band Channel and Beam Split Estimation via Array Perturbation Model.
IEEE Open J. Commun. Soc., 2023

Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023

Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation.
IEEE Access, 2023

Implicit Channel Learning For Machine Learning Applications In 6G Wireless Networks.
Proceedings of the IEEE International Conference on Acoustics, 2023

Federated Multi-Task Learning For THZ Wideband Channel And DOA Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
An Anonymity Vulnerability in Tor.
IEEE/ACM Trans. Netw., 2022

RD-IOD: Two-Level Residual-Distillation-Based Triple-Network for Incremental Object Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Multiaccess Edge Integrated Networking for Internet of Vehicles: A Blockchain-Based Deep Compressed Cooperative Learning Approach.
IEEE Trans. Intell. Transp. Syst., 2022

Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks.
IEEE Netw., 2022

Differential Privacy via a Truncated and Normalized Laplace Mechanism.
J. Comput. Sci. Technol., 2022

A comparative analysis of CGAN-based oversampling for anomaly detection.
IET Cyper-Phys. Syst.: Theory & Appl., 2022

Network intrusion detection using machine learning approaches: Addressing data imbalance.
IET Cyper-Phys. Syst.: Theory & Appl., 2022

Differentially private facial obfuscation via generative adversarial networks.
Future Gener. Comput. Syst., 2022

Federated Learning for THz Channel Estimation.
CoRR, 2022

Rebate Auction Mechanisms for Bidirectional Grid Balancing Using Cloud Workload Migrations.
IEEE Access, 2022

Auction-Based Scheduling of Excess Energy Consumption to Enhance Grid Upward Flexibility.
IEEE Access, 2022

A Blockchain-Based Distributed Pruning Deep Compression Approach for Cooperative Positioning in Internet of Vehicles.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

A Dynamic Vehicle-Ranking Approach for Online Virtual Network Embedding in Internet of Vehicles.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

A Blockchain-Based Distributed Machine Learning (BDML) Approach for Resource Allocation in Vehicular Ad-Hoc Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 17th International Conference, 2022

2021
A Novel Real-time Anti-spam Framework.
ACM Trans. Internet Techn., 2021

AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection.
IEEE Trans. Netw. Sci. Eng., 2021

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021

Obfuscation of images via differential privacy: From facial images to general images.
Peer-to-Peer Netw. Appl., 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

Multi-Candidate Voting Model Based on Blockchain.
IEEE CAA J. Autom. Sinica, 2021

Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
Frontiers Neurorobotics, 2021

Non-Intrusive Load Monitoring based Demand Prediction for Smart Meter Attack Detection.
Proceedings of the 2021 International Conference on Control, 2021

2020
The Impact of Range Constraints on Utility in the Design of Differentially Private Mechanisms.
Trans. Data Priv., 2020

Designing a Streaming Algorithm for Outlier Detection in Data Mining - An Incrementa Approach.
Sensors, 2020

AFLPro: Direction sensitive fuzzing.
J. Inf. Secur. Appl., 2020

Deep learning based emotion analysis of microblog texts.
Inf. Fusion, 2020

An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

Storage and Rack Sensitive Replica Placement Algorithm for Distributed Platform with Data as Files.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
Dangerous Graphs.
Proceedings of the Distributed Computing by Mobile Entities, 2019

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019

Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Sensors, 2019

Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019

Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019

A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019

Coverage protocols for wireless sensor networks: Review and future directions.
J. Commun. Networks, 2019

A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019

A coverage and obstacle-aware clustering protocol for wireless sensor networks in 3D terrain.
Comput. Commun., 2019

Real-time Outlier Detection Over Streaming Data.
Proceedings of the 2019 IEEE SmartWorld, 2019

Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Differentially Private Obfuscation of Facial Images.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

2018
A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018

A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2018

Evolutionary-Based Coverage Control Mechanism for Clustered Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 2018

An Obstacle-Aware Clustering Protocol for Wireless Sensor Networks with Irregular Terrain.
Proceedings of the Wired/Wireless Internet Communications, 2018

SHAstor: A Scalable HDFS-Based Storage Framework for Small-Write Efficiency in Pervasive Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018

Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

A Full Area Coverage Guaranteed, Energy Efficient Network Configuration Strategy for 3D Wireless Sensor Networks.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

2017
Secure Localization in the Presence of Colluders in WSNs.
Sensors, 2017

Comparison of approaches of geographic partitioning for data anonymization.
J. Geogr. Syst., 2017

MCSA: A multi-criteria shuffling algorithm for the MapReduce framework.
Proceedings of the 2017 IEEE SmartWorld, 2017

2016
On Optimal Scheduling Algorithms for Well-Structured Workows in the Cloud with Budget and Deadline Constraints.
Parallel Process. Lett., 2016

Black hole search in computer networks: State-of-the-art, challenges and future directions.
J. Parallel Distributed Comput., 2016

Location-based anonymization: comparison and evaluation of the Voronoi-based aggregation system.
Int. J. Geogr. Inf. Sci., 2016

Faulty Node Repair and Dynamically Spawned Black Hole Search.
Proceedings of the Security and Privacy in Communication Networks, 2016

A Scheduling Algorithm for Hadoop MapReduce Workflows with Budget Constraints in the Heterogeneous Cloud.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

2015
Virtual Servers Co-Migration for Mobile Accesses: Online versus Off-Line.
IEEE Trans. Mob. Comput., 2015

A Novel Geographic Partitioning System for Anonymizing Health Care Data.
CoRR, 2015

Geographic Partitioning Techniques for the Anonymization of Health Care Data.
CoRR, 2015

Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints.
Comput. J., 2015

Smart Shuffling in MapReduce: A Solution to Balance Network Traffic and Workloads.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

On Performance Resilient Scheduling for Scientific Workflows in HPC Systems with Constrained Storage Resources.
Proceedings of the 6th Workshop on Scientific Cloud Computing, 2015

2014
Budget-Driven Scheduling Algorithms for Batches of MapReduce Jobs in Heterogeneous Clouds.
IEEE Trans. Cloud Comput., 2014

Searching for a black hole in interconnected networks using mobile agents and tokens.
J. Parallel Distributed Comput., 2014

Dead Reckoning Using Play Patterns in a Simple 2D Multiplayer Online Game.
Int. J. Comput. Games Technol., 2014

Möbius: A high performance transactional SSD with rich primitives.
Proceedings of the IEEE 30th Symposium on Mass Storage Systems and Technologies, 2014

Sensor deployment by a robot in an unknown orthogonal region: Achieving full coverage.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Adaptive Search-Based Service Migration with Virtual Moves in Clouds for Mobile Accesses.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

On Scheduling Algorithms for MapReduce Jobs in Heterogeneous Clouds with Budget Constraints.
Proceedings of the Principles of Distributed Systems - 17th International Conference, 2013

On Preventing Sequence Breaking in Video Games.
Proceedings of the Annual Workshop on Network and Systems Support for Games, 2013

LiU: Hiding Disk Access Latency for HPC Applications with a New SSD-Enabled Data Layout.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

Scheduling soft aperiodic messages on FlexRay in-vehicle networks.
Proceedings of the 19th IEEE International Conference on Networks, 2013

On service migration in the cloud to facilitate mobile accesses.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

Play patterns for path prediction in multiplayer online games.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Resilient Secure Localization and Detection of Colluding Attackers in WSNs.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Saga: A Cost Efficient File System Based on Cloud Storage Service.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2011

2010
Detection of the Evil ring attack in wireless sensor networks using cross verification.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Validation Against Actual Behavior: Still a Challenge for Testing Tools.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Modeling and Validating Requirements Using Executable Cotnracts and Scenarios.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Reconciling Offshore Outsourcing with Model Based Testing.
Proceedings of the Software Engineering Approaches for Offshore and Outsourced Development, 2010

A Comprehensive Review of Sensor Relocation.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Teaching strategies to millenial students.
Proceedings of the International Academic Conference on the Future of Game Design and Technology, Vancouver, BC, Canada, May 06, 2010

Scenario-Based Validation: Beyond the User Requirements Notation.
Proceedings of the 21st Australian Software Engineering Conference (ASWEC 2010), 2010

2009
Black Hole Search with Tokens in Interconnected Networks.
Proceedings of the Stabilization, 2009

2008
Using Scattered Mobile Agents to Locate a Black Hole in an un-Oriented Ring with Tokens.
Int. J. Found. Comput. Sci., 2008

2007
Scattered Black Hole Search in an Oriented Ring using Tokens.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents.
Proceedings of the Euro-Par 2007, 2007

2006
Black Hole Search in Asynchronous Rings Using Tokens.
Proceedings of the Algorithms and Complexity, 6th Italian Conference, 2006

2004
System family engineering for leader election in ring topology.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

An Executable Model for a Family of Election Algorithms.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004


  Loading...