default search action
Shen Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j38]Lejun Zhang, Bo Zhang, Ran Guo, Zhujun Wang, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian, Sergey Gataullin:
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext. Frontiers Comput. Sci. 19(2): 192807 (2025) - [j37]Qunhong Sun, Chang Wang, Yifan Hu, Shen Su, Ting Cui:
LGTDA: Bandwidth exhaustion attack on Ethereum via dust transactions. Future Gener. Comput. Syst. 163: 107549 (2025) - 2024
- [j36]Yue Cong, Jing Qiu, Kun Zhang, Zhongyang Fang, Chengliang Gao, Shen Su, Zhihong Tian:
Ada-FFL: Adaptive computing fairness federated learning. CAAI Trans. Intell. Technol. 9(3): 573-584 (2024) - [j35]Mianjie Li, Qihan Pei, Chun Shan, Shen Su, Yuan Liu, Zhihong Tian:
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles. Comput. Networks 252: 110677 (2024) - [j34]Lejun Zhang, Chendong Zhu, Zhihong Tian, Yuan Liu, Jing Qiu, Shen Su, Guangxia Xu, Ran Guo:
ICRB: An improved consensus-based redactable blockchain considering contextual consistency. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j33]Lei Zhang, Shaoming Zhu, Shen Su, Xiaofeng Chen, Yan Yang, Bing Zhou:
Wind power prediction method based on cloud computing and data privacy protection. J. Cloud Comput. 13(1): 137 (2024) - [j32]Lingfeng Qu, Mohan Li, Yanbin Sun, Shen Su, Yuan Liu, Lejun Zhang:
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101914 (2024) - [j31]Yuan Liu, Yanan Zhang, Shen Su, Lejun Zhang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy. IEEE J. Sel. Areas Commun. 42(4): 880-892 (2024) - [j30]Yuntian Tan, Wenfeng Huang, Yang You, Shen Su, Hui Lu:
Recognizing BGP Communities Based on Graph Neural Network. IEEE Netw. 38(6): 282-288 (2024) - [j29]Lejun Zhang, Yuan Li, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen, Zhihong Tian:
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS. J. Signal Process. Syst. 96(3): 215-237 (2024) - 2023
- [j28]Zhujun Wang, Lejun Zhang, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian:
A covert channel over blockchain based on label tree without long waiting times. Comput. Networks 232: 109843 (2023) - [j27]Qiming Xu, Guohua Chen, Shen Su, Jinkun Men, Geliang Li:
Prediction of venting gas explosion overpressure based on a combination of explosive theory and machine learning. Expert Syst. Appl. 234: 121044 (2023) - [c29]Sheng Yun, Md. Zakirul Alam Bhuiyan, Md. Taufiq Al Hasib Sadi, Shen Su:
Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language Models. ISPA/BDCloud/SocialCom/SustainCom 2023: 531-538 - [c28]Kebin Li, Yang You, Yuntian Tan, Shen Su, Zhihong Tian:
C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion. CloudNet 2023: 316-324 - [c27]Shen Su, Yue Xue, Liansheng Lin, Chao Wang, Hui Lu, Jing Qiu, Yanbin Sun, Yuan Liu, Zhihong Tian:
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects. GLOBECOM 2023: 5122-5128 - [c26]Weicheng Li, Hui Lu, Yanbin Sun, Shen Su, Jing Qiu, Zhihong Tian:
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis. IWQoS 2023: 1-2 - [c25]Shen Su, Yuntian Tan, Yue Xue, Chao Wang, Hui Lu, Zhihong Tian, Chun Shan, Xiaojiang Du:
Detecting Smart Contract Project Anomalies in Metaverse. MetaCom 2023: 524-532 - 2022
- [c24]Yuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities. SmartCom 2022: 350-359 - [c23]Weijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
Smart Contract Vulnerability Detection Model Based on Siamese Network. SmartCom 2022: 639-648 - 2021
- [j26]Chunzhi Yi, Feng Jiang, Md. Zakirul Alam Bhuiyan, Chifu Yang, Xianzhong Gao, Hao Guo, Jiantao Ma, Shen Su:
Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding. Future Gener. Comput. Syst. 114: 96-105 (2021) - [j25]Shen Su, Zhihong Tian, Shuang Li, Jinxi Deng, Lihua Yin, Xiaojiang Du, Mohsen Guizani:
IoT root union: A decentralized name resolving system for IoT based on blockchain. Inf. Process. Manag. 58(3): 102553 (2021) - [j24]Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian, Wei Shi, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. Mob. Networks Appl. 26(2): 940-948 (2021) - [j23]Yanbin Sun, Zhihong Tian, Mohan Li, Shen Su, Xiaojiang Du, Mohsen Guizani:
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5542-5551 (2021) - 2020
- [j22]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. IEEE Internet Things J. 7(5): 3901-3909 (2020) - [j21]Jing Qiu, Zhihong Tian, Chunlai Du, Qi Zuo, Shen Su, Binxing Fang:
A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 7(6): 4682-4696 (2020) - [j20]Shuang Li, Sha-sha Du, Wenfeng Huang, Siyu Liang, Jinxi Deng, Le Wang, Huiwu Huang, Xinhai Liao, Shen Su:
A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range. KSII Trans. Internet Inf. Syst. 14(8): 3501-3518 (2020) - [j19]Zhihong Tian, Chaochao Luo, Hui Lu, Shen Su, Yanbin Sun, Man Zhang:
User and Entity Behavior Analysis under Urban Big Data. Trans. Data Sci. 1(3): 16:1-16:19 (2020) - [j18]Jing Qiu, Lei Du, Dongwen Zhang, Shen Su, Zhihong Tian:
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City. IEEE Trans. Ind. Informatics 16(4): 2659-2666 (2020) - [j17]Shen Su, Zhihong Tian, Siyu Liang, Shuang Li, Sha-sha Du, Nadra Guizani:
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks. IEEE Wirel. Commun. 27(3): 46-52 (2020) - [c22]Dongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang:
A defense scheme of voice control system against DolphinAttack. CIAT 2020: 136-142 - [c21]Yuhan Chai, Jing Qiu, Shen Su, Chunsheng Zhu, Lihua Yin, Zhihong Tian:
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection. IWCMC 2020: 463-468 - [c20]Ning Hu, Shen Su, Chang Tang, Lulu Wang:
Wearable-sensors Based Activity Recognition for Smart Human Healthcare Using Internet of Things. IWCMC 2020: 1909-1915
2010 – 2019
- 2019
- [j16]Yanbin Sun, Zhihong Tian, Yuhang Wang, Mohan Li, Shen Su, Xianzhi Wang, Dunqiu Fan:
Lightweight Anonymous Geometric Routing for Internet of Things. IEEE Access 7: 29754-29762 (2019) - [j15]Hui Lu, Man Zhang, Shen Su, Xiangsong Gao, Chaochao Luo:
Broken Bike Recycling Planning for Sharing Bikes System. IEEE Access 7: 177354-177361 (2019) - [j14]Zhihong Tian, Shen Su, Wei Shi, Xiaojiang Du, Mohsen Guizani, Xiang Yu:
A data-driven method for future Internet route decision modeling. Future Gener. Comput. Syst. 95: 212-220 (2019) - [j13]Juan Chen, Shen Su, Xianzhi Wang:
Towards Privacy-Preserving Location Sharing over Mobile Online Social Networks. IEICE Trans. Inf. Syst. 102-D(1): 133-146 (2019) - [j12]Zhihong Tian, Mohan Li, Meikang Qiu, Yanbin Sun, Shen Su:
Block-DEF: A secure digital evidence framework using blockchain. Inf. Sci. 491: 151-165 (2019) - [j11]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440. Sensors 19(14): 3187 (2019) - [j10]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Informatics 15(7): 4285-4294 (2019) - [j9]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu, Xiaojiang Du, Mohsen Guizani:
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory. IEEE Trans. Veh. Technol. 68(6): 5971-5980 (2019) - [c19]Yuhang Wang, Zhihong Tian, Shen Su, Yanbin Sun, Chunsheng Zhu:
Preserving Location Privacy in Mobile Edge Computing. ICC 2019: 1-6 - [i4]Zhihong Tian, Shen Su, Xiang Yu, Yuhang Wang, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. CoRR abs/1902.03994 (2019) - [i3]Zhihong Tian, Yanbin Sun, Shen Su, Mohan Li, Xiaojiang Du, Mohsen Guizani:
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers. CoRR abs/1902.04009 (2019) - [i2]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. CoRR abs/1902.04387 (2019) - [i1]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu, Xiaojiang Du, Mohsen Guizani:
Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game Theory. CoRR abs/1902.04667 (2019) - 2018
- [j8]Zhihong Tian, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui:
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus. IEEE Access 6: 35355-35364 (2018) - [j7]Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Xiaohong Li:
A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model. Int. J. Netw. Manag. 28(5) (2018) - [j6]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 18(8): 2440 (2018) - [j5]Zihan Wang, Chaoge Liu, Jing Qiu, Zhihong Tian, Xiang Cui, Shen Su:
Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wirel. Commun. Mob. Comput. 2018: 7943586:1-7943586:13 (2018) - [c18]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
Predicting the Popularity of Online Content Based on the Weak Ties Theory. DSC 2018: 386-391 - [c17]Xuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang:
Insider Threat Detection Using Characterizing User Behavior. DSC 2018: 476-482 - [c16]Yuhang Wang, Hongli Zhang, Shen Su, Zhihong Tian:
A Location Privacy-Aware Method for kNN Query in Location Based Services. DSC 2018: 537-541 - [c15]Yuhang Wang, Hongli Zhang, Shen Su:
VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching. ICCCS (2) 2018: 357-365 - [c14]Yuhang Wang, Hongli Zhang, Shen Su:
Enhancing Location Privacy for Geolocation Service Through Perturbation. ICCCS (1) 2018: 502-511 - 2017
- [j4]Yanbo Han, Chen Liu, Shen Su, Meiling Zhu, Zhongmei Zhang, Shouli Zhang:
A Proactive Service Model Facilitating Stream Data Fusion and Correlation. Int. J. Web Serv. Res. 14(3): 1-16 (2017) - [c13]Dandan Feng, Tongxun Wang, Chen Liu, Shen Su:
Extracting Log Patterns Based on Association Analysis for Power Quality Disturbance Detection. WISA 2017: 80-83 - [c12]Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Dandan Feng:
A Proactive Data Service Model to Encapsulating Stream Sensor Data into Service. WISA 2017: 84-89 - [c11]Shouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su:
Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment. CollaborateCom 2017: 253-263 - [c10]Meiling Zhu, Chen Liu, Jianwu Wang, Shen Su, Yanbo Han:
An Approach to Modeling and Discovering Event Correlation for Service Collaboration. ICSOC 2017: 191-205 - [c9]Zhongmei Zhang, Xiaohong Li, Chen Liu, Shen Su, Yanbo Han:
A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data. ICWS 2017: 572-579 - [c8]Meiling Zhu, Chen Liu, Jianwu Wang, Shen Su, Yanbo Han:
Service Hyperlink: Modeling and Reusing Partial Process Knowledge by Mining Event Dependencies among Sensor Data Services. ICWS 2017: 902-905 - 2016
- [j3]Shen Su, Binxing Fang:
Towards Route Dynamics in AS-Level Path Prediction. IEICE Trans. Commun. 99-B(2): 412-421 (2016) - [j2]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su:
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense. IEICE Trans. Inf. Syst. 99-D(8): 1991-2001 (2016) - [c7]Shen Su, Chen Liu, Zhongmei Zhang, Yanbo Han:
A Lightweight Model for Stream Sensor Data Service. APSCC 2016: 329-342 - [c6]Shen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan, Junxi Guo:
Shrinking the Sentiment Analysis for Signed Network Construction. DSC 2016: 353-357 - [c5]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Shen Su:
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI. ICC 2016: 1-6 - 2015
- [c4]Shen Su, Beichuan Zhang, Lin Ye, Hongli Zhang, Nathan Yee:
Towards real-time route leak events detection. ICC 2015: 7192-7197 - 2014
- [c3]Qiang Zhang, Hongli Zhang, Xiaojiang Du, Zhigang Zhou, Shen Su, Rui Jin:
Contention-based adaptive position update for intermittently connected VANETs. GLOBECOM 2014: 51-56 - [c2]Shen Su, Hongli Zhang, Binxing Fang, Lin Ye:
Quantifying AS-level routing policy changes. ICC 2014: 1148-1153 - [c1]Shen Su, Beichuan Zhang, Binxing Fang:
Online Detection of Concurrent Prefix Hijacks. SecureComm (2) 2014: 69-83 - 2011
- [j1]Yu Zhang, Ricardo V. Oliveira, Yangyang Wang, Shen Su, Baobao Zhang, Jun Bi, Hongli Zhang, Lixia Zhang:
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement. IEEE J. Sel. Areas Commun. 29(9): 1822-1836 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint