Follow
He Shiming
He Shiming
Changsha University of Science and Technology
Verified email at csust.edu.cn
Title
Cited by
Cited by
Year
Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G
J Wang, H Han, H Li, S He, PK Sharma, L Chen
IEEE Transactions on Industrial Informatics 18 (3), 1939-1948, 2021
1202021
LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things
J Wang, Y Tang, S He, C Zhao, PK Sharma, O Alfarraj, A Tolba
Sensors 20 (9), 2451, 2020
1172020
Energy-aware routing for SWIPT in multi-hop energy-constrained wireless network
S He, K Xie, W Chen, D Zhang, J Wen
IEEE Access 6, 17996-18008, 2018
902018
An efficient privacy-preserving compressive data gathering scheme in WSNs
K Xie, X Ning, X Wang, S He, Z Ning, X Liu, J Wen, Z Qin
Information Sciences 390, 82-94, 2017
902017
Parameters compressing in deep learning
S He, Z Li, Y Tang, Z Liao, F Li, SJ Lim
Computers, Materials & Continua 62 (1), 321-336, 2020
862020
Interference-aware multisource transmission in multiradio and multichannel wireless network
S He, K Xie, K Xie, C Xu, J Wang
IEEE Systems Journal 13 (3), 2507-2518, 2019
722019
PPNC: privacy preserving scheme for random linear network coding in smart grid
S He, W Zeng, K Xie, H Yang, M Lai, X Su
KSII Transactions on Internet and Information Systems (TIIS) 11 (3), 1510-1532, 2017
612017
LogUAD: Log unsupervised anomaly detection based on Word2Vec
J Wang, C Zhao, S He, Y Gu, O Alfarraj, A Abugabah
Computer Systems Science and Engineering 41 (3), 1207, 2022
532022
Deep learning-based data storage for low latency in data center networks
Z Liao, R Zhang, S He, D Zeng, J Wang, HJ Kim
IEEE Access 7, 26411-26417, 2019
502019
Lightweight single image super-resolution convolution neural network in portable device
J Wang, Y Wu, S He, PK Sharma, X Yu, O Alfarraj, A Tolba
KSII Transactions on Internet and Information Systems (TIIS) 15 (11), 4065-4083, 2021
362021
Intelligent detection for key performance indicators in industrial-based cyber-physical systems
S He, Z Li, J Wang, NN Xiong
IEEE Transactions on Industrial Informatics 17 (8), 5799-5809, 2020
292020
Interference-aware routing for difficult wireless sensor network environment with SWIPT
S He, Y Tang, Z Li, F Li, K Xie, H Kim, G Kim
Sensors 19 (18), 3978, 2019
262019
Channel aware opportunistic routing in multi-radio multi-channel wireless mesh networks
SM He, DF Zhang, K Xie, H Qiao, J Zhang
Journal of Computer Science and Technology 29 (3), 487-501, 2014
192014
De-cloaking malicious activities in smartphones using HTTP flow mining
X Su, X Liu, J Lin, S He, Z Fu, W Li
KSII Transactions on Internet and Information Systems (TIIS) 11 (6), 3230-3253, 2017
182017
Multi-source multicast routing with QoS constraints in network function virtualization
K Xie, X Zhou, T Semong, S He
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
162019
Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks.
W Zeng, Y Lin, J Yu, S He, L Wang
Ad Hoc Sens. Wirel. Networks 21 (1-2), 21-58, 2014
162014
A VMIMO-based cooperative routing algorithm for maximizing network lifetime
J Zhang, D Zhang, K Xie, H Qiao, S He
China Communications 14 (4), 20-34, 2017
142017
Multi-source reliable multicast routing with QoS constraints of NFV in edge computing
S He, K Xie, X Zhou, T Semong, J Wang
Electronics 8 (10), 1106, 2019
112019
An efficient privacy-preserving compressive data gathering scheme in WSNs
K Xie, X Ning, X Wang, J Wen, X Liu, S He, D Zhang
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
112015
PAPG: Private aggregation scheme based on privacy-preserving gene in wireless sensor networks
W Zeng, P Chen, H Chen, S He
KSII Transactions on Internet and Information Systems (TIIS) 10 (9), 4442-4466, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20