关注
He Shiming
He Shiming
Changsha University of Science and Technology
在 csust.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G
J Wang, H Han, H Li, S He, PK Sharma, L Chen
IEEE Transactions on Industrial Informatics 18 (3), 1939-1948, 2021
1192021
LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things
J Wang, Y Tang, S He, C Zhao, PK Sharma, O Alfarraj, A Tolba
Sensors 20 (9), 2451, 2020
1132020
An efficient privacy-preserving compressive data gathering scheme in WSNs
K Xie, X Ning, X Wang, S He, Z Ning, X Liu, J Wen, Z Qin
Information Sciences 390, 82-94, 2017
902017
Energy-aware routing for SWIPT in multi-hop energy-constrained wireless network
S He, K Xie, W Chen, D Zhang, J Wen
IEEE Access 6, 17996-18008, 2018
892018
Parameters compressing in deep learning
S He, Z Li, Y Tang, Z Liao, F Li, SJ Lim
Computers, Materials & Continua 62 (1), 321-336, 2020
862020
Interference-aware multisource transmission in multiradio and multichannel wireless network
S He, K Xie, K Xie, C Xu, J Wang
IEEE Systems Journal 13 (3), 2507-2518, 2019
732019
PPNC: privacy preserving scheme for random linear network coding in smart grid
S He, W Zeng, K Xie, H Yang, M Lai, X Su
KSII Transactions on Internet and Information Systems (TIIS) 11 (3), 1510-1532, 2017
612017
LogUAD: Log unsupervised anomaly detection based on Word2Vec
J Wang, C Zhao, S He, Y Gu, O Alfarraj, A Abugabah
Computer Systems Science and Engineering 41 (3), 1207, 2022
512022
Deep learning-based data storage for low latency in data center networks
Z Liao, R Zhang, S He, D Zeng, J Wang, HJ Kim
IEEE Access 7, 26411-26417, 2019
492019
Lightweight single image super-resolution convolution neural network in portable device
J Wang, Y Wu, S He, PK Sharma, X Yu, O Alfarraj, A Tolba
KSII Transactions on Internet and Information Systems (TIIS) 15 (11), 4065-4083, 2021
362021
Intelligent detection for key performance indicators in industrial-based cyber-physical systems
S He, Z Li, J Wang, NN Xiong
IEEE Transactions on Industrial Informatics 17 (8), 5799-5809, 2020
292020
Interference-aware routing for difficult wireless sensor network environment with SWIPT
S He, Y Tang, Z Li, F Li, K Xie, H Kim, G Kim
Sensors 19 (18), 3978, 2019
262019
Channel aware opportunistic routing in multi-radio multi-channel wireless mesh networks
SM He, DF Zhang, K Xie, H Qiao, J Zhang
Journal of Computer Science and Technology 29 (3), 487-501, 2014
192014
De-cloaking malicious activities in smartphones using HTTP flow mining
X Su, X Liu, J Lin, S He, Z Fu, W Li
KSII Transactions on Internet and Information Systems (TIIS) 11 (6), 3230-3253, 2017
182017
Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks.
W Zeng, Y Lin, J Yu, S He, L Wang
Ad Hoc Sens. Wirel. Networks 21 (1-2), 21-58, 2014
162014
Multi-source multicast routing with QoS constraints in network function virtualization
K Xie, X Zhou, T Semong, S He
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
152019
A VMIMO-based cooperative routing algorithm for maximizing network lifetime
J Zhang, D Zhang, K Xie, H Qiao, S He
China Communications 14 (4), 20-34, 2017
142017
Multi-source reliable multicast routing with QoS constraints of NFV in edge computing
S He, K Xie, X Zhou, T Semong, J Wang
Electronics 8 (10), 1106, 2019
112019
An efficient privacy-preserving compressive data gathering scheme in WSNs
K Xie, X Ning, X Wang, J Wen, X Liu, S He, D Zhang
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
112015
PAPG: Private aggregation scheme based on privacy-preserving gene in wireless sensor networks
W Zeng, P Chen, H Chen, S He
KSII Transactions on Internet and Information Systems (TIIS) 10 (9), 4442-4466, 2016
102016
系统目前无法执行此操作,请稍后再试。
文章 1–20