Остановите войну!
for scientists:
default search action
Zhixin Shi
- > Home > Persons > Zhixin Shi
Publications
- 2023
- [c56]Zhixin Shi, Hao Wu, Jing Zhang, Meng Zhang, Weiqing Huang:
FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. ISCC 2023: 816-822 - [c55]Weiqing Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu:
MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. ISCC 2023: 1274-1279 - [c54]Zhixin Shi, Mengyan Xing, Jing Zhang, B. Hao Wu:
Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with L2F Method. WCNC 2023: 1-6 - 2022
- [c53]Zhixin Shi, Xiangyu Wang, Pengcheng Liu:
NBP-MS: Malware Signature Generation Based on Network Behavior Profiling. ICPR 2022: 1865-1870 - [c52]Weiqing Huang, Yangyang Zong, Zhixin Shi, Leiqi Wang, Pengcheng Liu:
PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection. IJCNN 2022: 1-8 - [c51]Xiaoyan Yu, Qilei Yin, Zhixin Shi, Yuru Ma:
Improving the Semantic Consistency of Textual Adversarial Attacks via Prompt. IJCNN 2022: 1-8 - [c50]Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu:
Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. ISCC 2022: 1-8 - [c49]Jing Zhang, Zhixin Shi, Hao Wu, Mengyan Xing:
A Novel Self-supervised Few-shot Network Intrusion Detection Method. WASA (1) 2022: 513-525 - 2021
- [c48]Degang Sun, Meichen Liu, Meimei Li, Zhixin Shi, Pengcheng Liu, Xu Wang:
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. CSCWD 2021: 335-341 - [c47]Pengcheng Liu, Zhen Han, Zhixin Shi, Meichen Liu:
Recognition of Overlapped Frequency Hopping Signals Based on Fully Convolutional Networks. ICT 2021: 1-5 - [c46]Zhixin Shi, Yuru Ma, Xiaoyan Yu:
An Effective and Efficient Method for Word-Level Textual Adversarial Attack. ISCC 2021: 1-6 - 2020
- [c45]Meichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu:
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention. CF 2020: 142-149 - [c44]Weiqing Huang, Xiao Peng, Zhixin Shi, Yuru Ma:
Adversarial Attack against LSTM-based DDoS Intrusion Detection System. ICTAI 2020: 686-693 - 2019
- [c43]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. CF 2019: 24-31 - [c42]Weiqing Huang, Xiao Peng, Zhixin Shi:
A SeqGAN-Based Method for Mimicking Attack. Inscrypt 2019: 118-133 - [c41]Jianguo Jiang, Qilei Yin, Zhixin Shi, Qiwen Wang, Wei Zhou:
A New Hybrid Approach for C&C Channel Detection. HPCC/SmartCity/DSS 2019: 583-590 - [c40]Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu, Xiaoyu Kang:
A Behavior-Based Method for Distinguishing the Type of C&C Channel. ICA3PP (1) 2019: 624-636 - [c39]Degang Sun, Yulan Hu, Zhixin Shi, Guokun Xu, Wei Zhou:
An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data. ICBDC 2019: 151-155 - [c38]Xiao Peng, Weiqing Huang, Zhixin Shi:
Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method. ICTAI 2019: 1288-1295 - [c37]Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li, Bin Lv:
A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning. IPCCC 2019: 1-9 - [c36]Biao Qi, Jianguo Jiang, Zhixin Shi, Meimei Li, Wei Fan:
A Novel Method for Highly Imbalanced Classification with Weighted Support Vector Machine. KSEM (1) 2019: 275-286 - 2018
- [c35]Bin Lv, Xuemin Yu, Guokun Xu, Qilei Yin, Zhixin Shi:
Network Traffic Monitoring System Based on Big Data Technology. ICBDC 2018: 27-32 - [c34]Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Biao Qi:
RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection. ICCSP 2018: 77-81 - [c33]Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li:
Comprehensive Behavior Profiling Model for Malware Classification. ISCC 2018: 129-135 - [c32]Qiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin:
A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios. TrustCom/BigDataSE 2018: 727-736 - [c31]Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang:
BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection. TrustCom/BigDataSE 2018: 754-762 - 2017
- [j5]Bin Kong, Kun Yang, Degang Sun, Meimei Li, Zhixin Shi:
Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches. Comput. Sci. Inf. Syst. 14(3): 839-856 (2017) - [c30]Degang Sun, Kun Yang, Bin Lv, Zhixin Shi:
Could we beat a new mimicking attack? APNOMS 2017: 247-250 - [c29]Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. Inscrypt 2017: 383-403 - [c28]Degang Sun, Kun Yang, Zhixin Shi, Chao Chen:
A New Mimicking Attack by LSGAN. ICTAI 2017: 441-447 - [c27]Degang Sun, Kun Yang, Zhixin Shi, Bin Lv:
A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds. KSEM 2017: 129-136 - [c26]Ke Zhang, Qingjie Zhu, Naiqian Zhang, Zhixin Shi, Yongsong Zhan:
User Intention Classification in an Entities Missed In-vehicle Dialog System. ICSI (2) 2017: 529-537 - [c25]Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior. TrustCom/BigDataSE/ICESS 2017: 65-72 - [c24]Degang Sun, Kun Yang, Zhixin Shi, Yan Wang:
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. WASA 2017: 729-740 - 2016
- [c23]Jianguo Jiang, Biao Qi, Zhixin Shi, Yan Wang, Bin Lv:
Botnet Detection Method Analysis on the Effect of Feature Extraction. Trustcom/BigDataSE/ISPA 2016: 1882-1888 - 2014
- [c22]Li Rong, Suyu Wang, Zhixin Shi:
A Two Level Algorithm for Text Detection in Natural Scene Images. Document Analysis Systems 2014: 329-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint