Zhixin Shi

According to our database1, Zhixin Shi authored at least 42 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine.
Proceedings of the Knowledge Science, Engineering and Management, 2019

The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios.
Proceedings of the 17th IEEE International Conference On Trust, 2018

BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Comprehensive Behavior Profiling Model for Malware Classification.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2017
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches.
Comput. Sci. Inf. Syst., 2017

Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

User Intention Classification in an Entities Missed In-vehicle Dialog System.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds.
Proceedings of the Knowledge Science, Engineering and Management, 2017

A New Mimicking Attack by LSGAN.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Could we beat a new mimicking attack?
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Botnet Detection Method Analysis on the Effect of Feature Extraction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Asian Character Recognition.
Proceedings of the Handbook of Document Image Processing and Recognition, 2014

A Two Level Algorithm for Text Detection in Natural Scene Images.
Proceedings of the 11th IAPR International Workshop on Document Analysis Systems, 2014

2013
A Model Based Framework for Table Processing in Degraded Document Images.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

2012
Model based table cell detection and content extraction from degraded document images.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

Keyword Spotting Framework Using Dynamic Background Model.
Proceedings of the 2012 International Conference on Frontiers in Handwriting Recognition, 2012

2011
Image Enhancement for Degraded Binary Document Images.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

2010
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Segmentation of Arabic Handwriting Based on both Contour and Skeleton Segmentation.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

A Steerable Directional Local Profile Technique for Extraction of Handwritten Arabic Text Lines.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Robust Fingerprint Matching Using Spiral Partitioning Scheme.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Line removal and handwritten word recognition of police accident report forms.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

2007
PDE-Based Enhancement of Low Quality Documents.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

2006
A chaincode based scheme for fingerprint feature extraction.
Pattern Recognition Letters, 2006

Fingerprint Image Enhancement Based on Skin Profile Approximation.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

2005
Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005

Multi-scale Techniques for Document Page Segmentation.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005

Historical document image segmentation using background light intensity normalization.
Proceedings of the Document Recognition and Retrieval XII, 2005

2004
Historical Document Image Enhancement Using Background Light Intensity Normalization.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Forensic Handwritten Document Retrieval System.
Proceedings of the 1st International Workshop on Document Image Analysis for Libraries (DIAL 2004), 2004

Line Separation for Complex Document Images Using Fuzzy Runlength.
Proceedings of the 1st International Workshop on Document Image Analysis for Libraries (DIAL 2004), 2004

2003
Skew Detection for Complex Document Images Using Fuzzy Runlength.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

A Format-Driven Handwritten Word Recognition System.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

2001
Secondary classification using key features.
Proceedings of the Document Recognition and Retrieval VIII, 2001

1997
Segmentation and recognition of connected handwritten numeral strings.
Pattern Recognition, 1997

1996
Character image enhancement by selective region-growing.
Pattern Recognition Letters, 1996

Document image-processing system for name and address recognition.
Int. J. Imaging Systems and Technology, 1996


  Loading...