default search action
Shengwei Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Junfeng Xu, Weiguo Lin, Wenqing Fan, Jia Chen, Keqiu Li, Xiulong Liu, Guangquan Xu, Shengwei Yi, Jie Gan:
A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems. IEEE Internet Things J. 11(15): 25720-25730 (2024) - [j5]Lifu Wang, Tianyu Wang, Shengwei Yi, Bo Shen, Bo Hu, Xing Cao:
Linear RNNs Provably Learn Linear Dynamical Systems. J. Optim. Theory Appl. 203(1): 488-528 (2024) - 2023
- [c13]Kaiqi Lv, Weiguo Lin, Junfeng Xu, Wanshan Xu, Shuren Chen, Shengwei Yi:
Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake. TrustCom 2023: 1586-1591 - 2021
- [j4]Lin Liu, Wang Ren, Feng Xie, Shengwei Yi, Junkai Yi, Peng Jia:
Learning-Based Detection for Malicious Android Application Using Code Vectorization. Secur. Commun. Networks 2021: 9964224:1-9964224:11 (2021) - 2020
- [j3]Weiwei Yan, Qian Liu, Ruoyu Chen, Shengwei Yi:
Social networks formed by follower-followee relationships on academic social networking sites: an examination of corporation users. Scientometrics 124(3): 2083-2101 (2020)
2010 – 2019
- 2019
- [j2]Xiaofeng Lu, Fangshuo Jiang, Xiao Zhou, Shengwei Yi, Jing Sha, Pietro Liò:
ASSCA: API sequence and statistics features combined architecture for malware detection. Comput. Networks 157: 99-111 (2019) - [c12]Di Luo, Hao Wang, Shengwei Yi, Qiao Wang:
Design and Implementation of Security System for IPv6 Sensor Networks. CISIS 2019: 257-268 - 2018
- [c11]Shengwei Yi, Hongwei Wang, Yangyang Ma, Feng Xie, Puhan Zhang, Liqing Di:
A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree. ICCCN 2018: 1-5 - [c10]Shengwei Yi, Qian Liu, Weiwei Yan:
How Corporations Utilize Academic Social Networking Website?: A Case Study of Health & Biomedicine Corporations. ICSH 2018: 325-331 - [c9]Xiaofeng Lu, Shengfei Zhang, Shengwei Yi:
Continuous authentication by free-text keystroke based on CNN plus RNN. IIKI 2018: 314-318 - 2017
- [c8]Xiaofeng Lu, Xiao Zhou, Fangshuo Jiang, Shengwei Yi, Jing Sha:
ASSCA: API based Sequence and Statistics features Combined malware detection Architecture. IIKI 2017: 248-256 - 2016
- [c7]Yunpeng Gao, Yao Wang, Shengwei Yi:
Preference-Aware Top-k Spatio-Textual Queries. WAIM Workshops 2016: 186-197 - 2015
- [c6]Yuqing Lan, Yang Wang, Yanni Wang, Shengwei Yi, Dan Yu:
Mining High Utility Itemsets over Uncertain Databases. CyberC 2015: 235-238 - [c5]Qi Xiong, Hui Liu, Yuan Xu, Huayi Rao, Shengwei Yi, Baofeng Zhang, Wei Jia, Hui Deng:
A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism. EIT 2015: 404-409 - 2013
- [c4]Shengwei Yi, Jize Xu, Yong Peng, Qi Xiong, Ting Wang, Shilong Ma:
Mining Frequent Rooted Ordered Tree Generators Efficiently. CyberC 2013: 132-139 - [c3]Junfeng Xu, Tao Zhang, Dong Lin, Ye Mao, Xiaonan Liu, Shiwu Chen, Shuai Shao, Bin Tian, Shengwei Yi:
Pairing and Authentication Security Technologies in Low-Power Bluetooth. GreenCom/iThings/CPScom 2013: 1081-1085 - [c2]Ting Wang, Qi Xiong, Haihui Gao, Yong Peng, Zhonghua Dai, Shengwei Yi:
Design and Implementation of Fuzzing Technology for OPC Protocol. IIH-MSP 2013: 424-428 - 2012
- [j1]Feng Liang, Haoming Guo, Shengwei Yi, Shilong Ma:
A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems. J. Networks 7(3): 524-531 (2012) - 2011
- [c1]Bing Yu, Jing Tian, Shilong Ma, Shengwei Yi, Dan Yu:
Gird or cloud? Survey on scientific computing infrastructure. CCIS 2011: 244-249
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint