default search action
Shigen Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j92]Guowen Wu, Yanchun Zhang, Hong Zhang, Shoujian Yu, Shui Yu, Shigen Shen:
SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network. Ad Hoc Networks 160: 103504 (2024) - [j91]Shigen Shen, Chenpeng Cai, Zhenwei Li, Yizhou Shen, Guowen Wu, Shui Yu:
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks. Appl. Soft Comput. 150: 111080 (2024) - [j90]Guoqing Zhai, Qiaoyu Chen, Dongbing Tong, Wuneng Zhou, Shigen Shen:
Dissipative Filtering of Markovian Jumping Systems via Adaptive Sliding Mode Control. Circuits Syst. Signal Process. 43(2): 865-894 (2024) - [j89]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen, Xiaoping Wu, Wenlong Ke, Shui Yu:
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 133: 108449 (2024) - [j88]Shoujian Yu, Rong Zhai, Yizhou Shen, Guowen Wu, Hong Zhang, Shui Yu, Shigen Shen:
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things. IEEE Internet Things J. 11(7): 12536-12550 (2024) - [j87]Guowen Wu, Xihang Chen, Yizhou Shen, Zhiqi Xu, Hong Zhang, Shigen Shen, Shui Yu:
Combining Lyapunov Optimization With Actor-Critic Networks for Privacy-Aware IIoT Computation Offloading. IEEE Internet Things J. 11(10): 17437-17452 (2024) - [j86]Shigen Shen, Chenpeng Cai, Yizhou Shen, Xiaoping Wu, Wenlong Ke, Shui Yu:
MFGD3QN: Enhancing Edge Intelligence Defense Against DDoS With Mean-Field Games and Dueling Double Deep Q-Network. IEEE Internet Things J. 11(13): 23931-23945 (2024) - [j85]Shoujian Yu, Xuan Wang, Yizhou Shen, Guowen Wu, Shui Yu, Shigen Shen:
Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based on Stochastic Games and Double Deep Q-Networks. IEEE Internet Things J. 11(17): 29132-29145 (2024) - [j84]Guowen Wu, Xihang Chen, Zhengjun Gao, Hong Zhang, Shui Yu, Shigen Shen:
Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL. J. Parallel Distributed Comput. 183: 104775 (2024) - [j83]Peiying Zhang, Ning Chen, Shigen Shen, Shui Yu, Neeraj Kumar, Ching-Hsien Hsu:
AI-Enabled Space-Air-Ground Integrated Networks: Management and Optimization. IEEE Netw. 38(2): 186-192 (2024) - [j82]Hanwen Liu, Lianyong Qi, Shigen Shen, Arif Ali Khan, Shunmei Meng, Qianmu Li:
Microservice-driven privacy-aware cross-platform social relationship prediction based on sequential information. Softw. Pract. Exp. 54(1): 85-105 (2024) - [j81]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen, Shui Yu:
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 6978-6990 (2024) - [j80]Peiying Zhang, Ning Chen, Shigen Shen, Shui Yu, Sheng Wu, Neeraj Kumar:
Future Quantum Communications and Networking: A Review and Vision. IEEE Wirel. Commun. 31(1): 141-148 (2024) - 2023
- [j79]Sheng Feng, Liping Zhao, Haiyan Shi, Mengfei Wang, Shigen Shen, Weixing Wang:
One-dimensional VGGNet for high-dimensional data. Appl. Soft Comput. 135: 110035 (2023) - [j78]Wenjun Hu, Chenglong Fu, Runlong Cao, Ying Zang, Xiao-Jun Wu, Shigen Shen, Xiao-Zhi Gao:
Joint dual-stream interaction and multi-scale feature extraction network for multi-spectral pedestrian detection. Appl. Soft Comput. 147: 110768 (2023) - [j77]Yizhou Shen, Shigen Shen, Qi Li, Haiping Zhou, Zongda Wu, Youyang Qu:
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. Digit. Commun. Networks 9(4): 906-919 (2023) - [j76]Zehong Wang, Donghua Yu, Qi Li, Shigen Shen, Shuang Yao:
SR-HGN: Semantic- and Relation-Aware Heterogeneous Graph Neural Network. Expert Syst. Appl. 224: 119982 (2023) - [j75]Shigen Shen, Xiaoping Wu, Pan Jun Sun, Haiping Zhou, Zongda Wu, Shui Yu:
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems. Expert Syst. Appl. 225: 120192 (2023) - [j74]Chao Wang, Chunxiao Jiang, Jingjing Wang, Shigen Shen, Song Guo, Peiying Zhang:
Blockchain-Aided Network Resource Orchestration in Intelligent Internet of Things. IEEE Internet Things J. 10(7): 6151-6163 (2023) - [j73]Guowen Wu, Hui Wang, Hong Zhang, Yuhan Zhao, Shui Yu, Shigen Shen:
Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing. IEEE Internet Things J. 10(20): 17620-17634 (2023) - [j72]Guowen Wu, Lanlan Xie, Hong Zhang, Jianhua Wang, Shigen Shen, Shui Yu:
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things. J. Netw. Comput. Appl. 214: 103608 (2023) - [j71]Guowen Wu, Zhiqi Xu, Hong Zhang, Shigen Shen, Shui Yu:
Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT. J. Parallel Distributed Comput. 176: 80-94 (2023) - [j70]Yuqing Wang, Lianyong Qi, Ruihan Dou, Shigen Shen, Linlin Hou, Yuwen Liu, Yihong Yang, Lingzhen Kong:
An accuracy-enhanced group recommendation approach based on DEMATEL. Pattern Recognit. Lett. 167: 171-180 (2023) - [j69]Junsan Zhang, Li Zhao, Hongzhao Jiang, Shigen Shen, Jian Wang, Peiying Zhang, Wei Zhang, Leiquan Wang:
Hyperspectral Image Classification Based on Dense Pyramidal Convolution and Multi-Feature Fusion. Remote. Sens. 15(12): 2990 (2023) - [j68]Zongda Wu, Jian Xie, Shigen Shen, Chongze Lin, Guandong Xu, Enhong Chen:
A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(5): 146:1-146:19 (2023) - [j67]Shengqi Wu, Shigen Shen, Xiaolong Xu, Ying Chen, Xiaokang Zhou, Dongning Liu, Xiao Xue, Lianyong Qi:
Popularity-Aware and Diverse Web APIs Recommendation Based on Correlation Graph. IEEE Trans. Comput. Soc. Syst. 10(2): 771-782 (2023) - [j66]Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. IEEE Trans. Dependable Secur. Comput. 20(1): 242-255 (2023) - [j65]Shigen Shen, Lanlan Xie, Yanchun Zhang, Guowen Wu, Hong Zhang, Shui Yu:
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 5302-5315 (2023) - [j64]Yuanchao Dai, Jing Wu, Yuanzhao Fan, Jin Wang, Jianwei Niu, Fei Gu, Shigen Shen:
MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG Signals. ACM Trans. Sens. Networks 19(1): 6:1-6:23 (2023) - [j63]Youxiang Duan, Yuxi Lu, Shigen Shen, Shui Yu, Peiying Zhang, Wei Zhang, Kostromitin Konstantin Igorevich:
NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering. IEEE Trans. Veh. Technol. 72(8): 10813-10825 (2023) - [c7]Haotong Cao, Shigen Shen, Yongan Guo, Sheng Wu, Hongxia Zhang, Peiying Zhang:
Resource Allocation and Orchestration of Slicing Services in Softwarized Space-Aerial-Ground Integrated Networks. IWCMC 2023: 769-774 - [c6]Zehong Wang, Qi Li, Donghua Yu, Xiaolong Han, Xiao-Zhi Gao, Shigen Shen:
Heterogeneous Graph Contrastive Multi-view Learning. SDM 2023: 136-144 - [i4]Ailing Xiao, Ning Chen, Sheng Wu, Shigen Shen, Weiping Ding, Peiying Zhang:
DNFS-VNE: Deep Neuro-Fuzzy System-Driven Virtual Network Embedding Algorithm. CoRR abs/2310.09078 (2023) - 2022
- [j62]Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Cheng-Zhong Xu:
PECCO: A profit and cost-oriented computation offloading scheme in edge-cloud environment with improved Moth-flame optimization. Concurr. Comput. Pract. Exp. 34(22) (2022) - [j61]Pan Jun Sun, Shigen Shen, Zongda Wu, Haiping Zhou, Xiao-Zhi Gao:
Stimulating trust cooperation in edge services: An evolutionary tripartite game. Eng. Appl. Artif. Intell. 116: 105465 (2022) - [j60]Peiying Zhang, Peng Gan, Neeraj Kumar, Ching-Hsien Hsu, Shigen Shen, Shibao Li:
RKD-VNE: Virtual network embedding algorithm assisted by resource knowledge description and deep reinforcement learning in IIoT scenario. Future Gener. Comput. Syst. 135: 426-437 (2022) - [j59]Jianhua Liu, Xin Wang, Shigen Shen, Zhaoxi Fang, Shui Yu, Guangxue Yue, Minglu Li:
Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud. IEEE Internet Things J. 9(6): 4356-4370 (2022) - [j58]Yizhou Shen, Shigen Shen, Zongda Wu, Haiping Zhou, Shui Yu:
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination. J. Inf. Secur. Appl. 66: 103140 (2022) - [j57]Chao Wang, Lei Liu, Chunxiao Jiang, Shangguang Wang, Peiying Zhang, Shigen Shen:
Incorporating Distributed DRL Into Storage Resource Optimization of Space-Air-Ground Integrated Wireless Communication Network. IEEE J. Sel. Top. Signal Process. 16(3): 434-446 (2022) - [j56]Zongda Wu, Shigen Shen, Chenglang Lu, Huxiong Li, Xinning Su:
How to protect reader lending privacy under a cloud environment: a technical method. Libr. Hi Tech 40(6): 1746-1765 (2022) - [j55]Zongda Wu, Shigen Shen, Huxiong Li, Haiping Zhou, Dongdong Zou:
A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment. Libr. Hi Tech 40(6): 1930-1953 (2022) - [j54]Youyang Qu, Longxiang Gao, Yong Xiang, Shigen Shen, Shui Yu:
FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks. IEEE Netw. 36(6): 183-190 (2022) - [j53]Xiang Liu, Dongbing Tong, Qiaoyu Chen, Wuneng Zhou, Shigen Shen:
Observer-based Adaptive Funnel Dynamic Surface Control for Nonlinear Systems with Unknown Control Coefficients and Hysteresis Input. Neural Process. Lett. 54(6): 4681-4710 (2022) - [j52]Zihao Cheng, Dong Yue, Shigen Shen, Songlin Hu, Lei Chen:
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra. IEEE Trans. Inf. Forensics Secur. 17: 1172-1184 (2022) - [j51]Lei Cui, Youyang Qu, Gang Xie, Deze Zeng, Ruidong Li, Shigen Shen, Shui Yu:
Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures. IEEE Trans. Ind. Informatics 18(5): 3492-3500 (2022) - [j50]Tian Wang, Yilin Zhang, Neal N. Xiong, Shaohua Wan, Shigen Shen, Shuqiang Huang:
An Effective Edge-Intelligent Service Placement Technology for 5G-and-Beyond Industrial IoT. IEEE Trans. Ind. Informatics 18(6): 4148-4157 (2022) - [j49]Peiying Zhang, Yu Su, Jingjing Wang, Chunxiao Jiang, Ching-Hsien Hsu, Shigen Shen:
Reinforcement Learning Assisted Bandwidth Aware Virtual Network Resource Allocation. IEEE Trans. Netw. Serv. Manag. 19(4): 4111-4123 (2022) - [j48]Zihao Cheng, Songlin Hu, Dong Yue, Chunxia Dou, Shigen Shen:
Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks. IEEE Trans. Syst. Man Cybern. Syst. 52(1): 7-18 (2022) - [j47]Youxiang Duan, Ning Chen, Shigen Shen, Peiying Zhang, Youyang Qu, Shui Yu:
FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow Prediction. IEEE Trans. Veh. Technol. 71(9): 9250-9260 (2022) - [c5]Guowen Wu, Zhenwei Li, Yizhou Shen, Hong Zhang, Shigen Shen, Shui Yu:
A Deep Reinforcement Learning Approach to Edge-based IDS Packets Sampling. DSIT 2022: 1-6 - [c4]Zhengjun Gao, Guowen Wu, Yizhou Shen, Hong Zhang, Shigen Shen, Qiying Cao:
DRL-based Optimization of Privacy Protection and Computation Performance in MEC Computation Offloading. INFOCOM Workshops 2022: 1-6 - [c3]Guowen Wu, Yuhan Zhao, Yizhou Shen, Hong Zhang, Shigen Shen, Shui Yu:
DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing. INFOCOM Workshops 2022: 1-6 - [c2]Zhen Jia, Lisheng Ma, Shigen Shen, Xiaohong Jiang:
Capacity Analysis of Diffusive Molecular Communication System with an Interfering Receiver. NaNA 2022: 23-28 - [i3]Chao Wang, Lei Liu, Chunxiao Jiang, Shangguang Wang, Peiying Zhang, Shigen Shen:
Incorporating Distributed DRL into Storage Resource Optimization of Space-Air-Ground Integrated Wireless Communication Network. CoRR abs/2202.02141 (2022) - [i2]Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Chengzhong Xu:
PECCO: A Profit and Cost-oriented Computation Offloading Scheme in Edge-Cloud Environment with Improved Moth-flame Optimisation. CoRR abs/2208.05074 (2022) - [i1]Zehong Wang, Qi Li, Donghua Yu, Xiaolong Han, Xiao Zhi Gao, Shigen Shen:
Heterogeneous Graph Contrastive Multi-view Learning. CoRR abs/2210.00248 (2022) - 2021
- [j46]Xiaotong Ye, Sisi Xie, Shigen Shen:
SIR1R2: Characterizing Malware Propagation in WSNs With Second Immunization. IEEE Access 9: 82083-82093 (2021) - [j45]Zehong Wang, Jianhua Liu, Shigen Shen, Minglu Li:
Restaurant Recommendation in Vehicle Context Based on Prediction of Traffic Conditions. Int. J. Pattern Recognit. Artif. Intell. 35(10): 2159044:1-2159044:21 (2021) - [j44]Jianhua Liu, Xin Wang, Shigen Shen, Guangxue Yue, Shui Yu, Minglu Li:
A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud. IEEE Internet Things J. 8(9): 7546-7561 (2021) - [j43]Sheng Feng, Haiyan Shi, Longjun Huang, Shigen Shen, Shui Yu, Hua Peng, Chengdong Wu:
Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot. J. Netw. Comput. Appl. 182: 103053 (2021) - [j42]Zongda Wu, Shigen Shen, Huxiong Li, Haiping Zhou, Chenglang Lu:
A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection. J. Organ. End User Comput. 33(6): 1-26 (2021) - [j41]Zongda Wu, Shigen Shen, Haiping Zhou, Huxiong Li, Chenglang Lu, Dongdong Zou:
An effective approach for the protection of user commodity viewing privacy in e-commerce website. Knowl. Based Syst. 220: 106952 (2021) - [j40]Danni Lu, Dongbing Tong, Qiaoyu Chen, Wuneng Zhou, Jun Zhou, Shigen Shen:
Exponential Synchronization of Stochastic Neural Networks with Time-Varying Delays and Lévy Noises via Event-Triggered Control. Neural Process. Lett. 53(3): 2175-2196 (2021) - [j39]Zongda Wu, Guiling Li, Shigen Shen, Xinze Lian, Enhong Chen, Guandong Xu:
Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web 24(1): 25-49 (2021) - 2020
- [j38]Shigen Shen, Haiping Zhou, Sheng Feng, Jianhua Liu, Hong Zhang, Qiying Cao:
An Epidemiology-Based Model for Disclosing Dynamics of Malware Propagation in Heterogeneous and Mobile WSNs. IEEE Access 8: 43876-43887 (2020) - [j37]Haiping Zhou, Shigen Shen, Jianhua Liu:
Malware propagation model in wireless sensor networks under attack-defense confrontation. Comput. Commun. 162: 51-58 (2020) - [j36]Hong Zhang, Shigen Shen, Qiying Cao, Xiaojun Wu, Shaofeng Liu:
Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton. Int. J. Distributed Sens. Networks 16(11): 155014772097294 (2020) - [j35]Zongda Wu, Shigen Shen, Xinze Lian, Xinning Su, Enhong Chen:
A dummy-based user privacy protection approach for text information retrieval. Knowl. Based Syst. 195: 105679 (2020) - [j34]Zhaoxi Fang, Shigen Shen, Jianhua Liu, Wei Ni, Abbas Jamalipour:
New NOMA-Based Two-Way Relay Networks. IEEE Trans. Veh. Technol. 69(12): 15314-15324 (2020)
2010 – 2019
- 2019
- [j33]Shigen Shen, Haiping Zhou, Sheng Feng, Jianhua Liu, Qiying Cao:
SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks. IEEE Access 7: 92881-92892 (2019) - [j32]Sheng Feng, Shigen Shen, Longjun Huang, Adam C. Champion, Shui Yu, Chengdong Wu, Yunzhou Zhang:
Three-dimensional robot localization using cameras in wireless multimedia sensor networks. J. Netw. Comput. Appl. 146 (2019) - [j31]Shigen Shen, Haiping Zhou, Sheng Feng, Longjun Huang, Jianhua Liu, Shui Yu, Qiying Cao:
HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs. J. Netw. Comput. Appl. 146 (2019) - [j30]Haiping Ma, Shigen Shen, Mei Yu, Zhile Yang, Minrui Fei, Huiyu Zhou:
Multi-population techniques in nature inspired optimization algorithms: A comprehensive survey. Swarm Evol. Comput. 44: 365-387 (2019) - 2018
- [j29]Jianhua Liu, Mengda Xu, Xin Wang, Shigen Shen, Minglu Li:
A Markov Detection Tree-Based Centralized Scheme to Automatically Identify Malicious Webpages on Cloud Platforms. IEEE Access 6: 74025-74038 (2018) - [j28]Jianhua Liu, Xin Wang, Guangxue Yue, Shigen Shen:
Data sharing in VANETs based on evolutionary fuzzy game. Future Gener. Comput. Syst. 81: 141-155 (2018) - [j27]Keli Hu, En Fan, Jun Ye, Jiatian Pi, Liping Zhao, Shigen Shen:
Element-Weighted Neutrosophic Correlation Coefficient and Its Application in Improving CAMShift Tracker in RGBD Video. Inf. 9(5): 126 (2018) - [j26]Shigen Shen, Longjun Huang, Haiping Zhou, Shui Yu, En Fan, Qiying Cao:
Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks. IEEE Internet Things J. 5(2): 1043-1054 (2018) - [j25]Jianhua Liu, Jiadi Yu, Shigen Shen:
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds. IEEE Trans. Inf. Forensics Secur. 13(2): 408-420 (2018) - 2017
- [j24]Longjun Huang, Xin-Wei Yao, Wan-Liang Wang, Shigen Shen:
EOC: Energy Optimization Coding for Wireless Nanosensor Networks in the Terahertz Band. IEEE Access 5: 2583-2590 (2017) - [j23]Jianhua Liu, Jiadi Yu, Minglu Li, Luqun Li, Dazhi Li, Shigen Shen:
Evolutionary game-based cooperative strategy for effective capacity of multiple-input-multiple-output communications. Int. J. Distributed Sens. Networks 13(10) (2017) - [j22]Hongjie Li, Yinglian Zhu, Jietai Wang, Jianhua Liu, Shigen Shen, Huimin Gao, Yaxin Sun:
Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications. Neurocomputing 251: 115-126 (2017) - [j21]Keli Hu, En Fan, Jun Ye, Changxing Fan, Shigen Shen, Yuzhang Gu:
Neutrosophic Similarity Score Based Weighted Histogram for Robust Mean-Shift Tracking. Inf. 8(4): 122 (2017) - [j20]Keli Hu, Jun Ye, En Fan, Shigen Shen, Longjun Huang, Jiatian Pi:
A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropy. J. Intell. Fuzzy Syst. 32(3): 1775-1786 (2017) - [j19]Shigen Shen, Haiping Ma, En Fan, Keli Hu, Shui Yu, Jianhua Liu, Qiying Cao:
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion. J. Netw. Comput. Appl. 91: 26-35 (2017) - 2016
- [j18]Longjun Huang, Wanliang Wang, Shigen Shen:
Energy-efficient coding for electromagnetic nanonetworks in the Terahertz band. Ad Hoc Networks 40: 15-25 (2016) - [j17]Xiaobin Li, En Fan, Shigen Shen, Keli Hu, Pengfei Li:
Fuzzy probabilistic data association filter and its application to single maneuvering target. EURASIP J. Adv. Signal Process. 2016: 102 (2016) - [j16]Hongyun Xu, Ding Wang, Shigen Shen, Youqun Shi, Qiying Cao:
An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(5): 2873439:1-2873439:13 (2016) - [j15]Shigen Shen, Longjun Huang, En Fan, Keli Hu, Jianhua Liu, Qiying Cao:
Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach. J. Sensors 2016: 4254701:1-4254701:10 (2016) - [j14]Shigen Shen, Longjun Huang, Jianhua Liu, Adam C. Champion, Shui Yu, Qiying Cao:
Reliability Evaluation for Clustered WSNs under Malware Propagation. Sensors 16(6): 855 (2016) - 2015
- [j13]Jianhua Liu, Shigen Shen, Guangxue Yue, Risheng Han, Hongjie Li:
A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud. Appl. Soft Comput. 30: 123-135 (2015) - [j12]Shigen Shen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han, Qiying Cao:
Optimal Report Strategies for WBANs Using a Cloud-Assisted IDS. Int. J. Distributed Sens. Networks 11: 184239:1-184239:14 (2015) - [j11]Yuanjie Li, Hongyun Xu, Qiying Cao, Zichuan Li, Shigen Shen:
Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 818903:1-818903:12 (2015) - [j10]Guanxiong Jiang, Shigen Shen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han:
Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 975454:1-975454:13 (2015) - [j9]Shigen Shen, Keli Hu, Longjun Huang, Hongjie Li, Risheng Han, Qiying Cao:
Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs. Mob. Inf. Syst. 2015: 179839:1-179839:10 (2015) - 2014
- [j8]Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li:
Coverage Capacity Optimization for Mobile Sensor Networks Based on Evolutionary Games. Int. J. Distributed Sens. Networks 10 (2014) - [j7]Hongjie Li, Chen Ming, Shigen Shen, Wai Keung Wong:
Event-triggered control for multi-agent systems with randomly occurring nonlinear dynamics and time-varying delay. J. Frankl. Inst. 351(5): 2582-2599 (2014) - [j6]Shigen Shen, Hongjie Li, Risheng Han, Athanasios V. Vasilakos, Yihan Wang, Qiying Cao:
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 9(11): 1962-1973 (2014) - 2012
- [j5]Shigen Shen, Risheng Han, Lizheng Guo, Wei Li, Qiying Cao:
Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain. Appl. Soft Comput. 12(5): 1467-1476 (2012) - [j4]Lizheng Guo, Shuguang Zhao, Shigen Shen, Changyuan Jiang:
Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm. J. Networks 7(3): 547-553 (2012) - 2011
- [j3]Shigen Shen, Yuanjie Li, Hongyun Xu, Qiying Cao:
Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 62(6): 2404-2416 (2011) - [j2]Shigen Shen, Guangxue Yue, Qiying Cao, Fei Yu:
A Survey of Game Theory in Wireless Sensor Networks Security. J. Networks 6(3): 521-532 (2011)
2000 – 2009
- 2009
- [j1]Shigen Shen, Lihua Ye, Guangxue Yue, Fei Yu:
Research of Secure Intranet/Internet Access Platform Based on Ontology. J. Networks 4(10): 1009-1016 (2009) - 2008
- [c1]Shigen Shen, Guangxue Yue:
Unified Certificate Validation System DNS-OCSP. ISECS 2008: 394-397
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint