Journal Publications
Home / Journal Publications
Selected Papers in Refereed Journals
-
Hashemi, A., Moosavi, M. R., Shi, W., Giachanou, A., Enhancing Fake News Detection through Estimating User Tendencies to Spread Fake News. Data and Information Management, Accepted, Oct. 2025.
-
Sherkati, M., Shi, W., Amini, M., A Comprehensive Evaluation of Metrics on their Ability to Capture the Degrees of Non-IIDness with Label Skew in Federated Learning. Journal of Computers and Electrical Engineering, special issue on Algorithms, Complexity, and Application Technologies in Parallel and Distributed Machine Learning. Accepted, Oct. 2025 (DOI: https://www.sciencedirect.com/science/article/pii/S004579062500686X?dgcid=author)
-
Dajun Zhang, W. Shi, and X. Jia, “Exploring Scientific Principles and Laws of Artificial Intelligence and Artificial General Intelligence (AGI) in Future Intelligence Networking: Paradigms, Architectures, and Innovations”. IEEE Commutations Surveys & Tutorials, Preprint. DOI: 10.36227/techrxiv.175393457.79277555/v1. IF: 33.84
-
Dajun Zhang, W. Shi, and Marc St-Hilaire, “The Permissioned Blockchain with Quantum-Inspired Intelligence Networking for the Services of Future Internet of Vehicles,” IEEE Transactions on Intelligent Transportation Systems, Accepted, Mar. 2025. DOI: https://dl.acm.org/doi/10.1109/TITS.2025.3553403. IF: 9.551
-
Hashemi, A., Shi, W., A Survey on Writing Style Change Detection: Current Literature and Future Directions. Machine Intelligence Research, 2025. DOI: https://dx.doi.org/10.1007/s11633-025-1544-6. IF: 6.4
-
Ma, X. and Shi, W. Wen, J., An Enhanced Combinatorial Contextual Neural Bandit Approach for Client Selection in Federated Learning. ACM Transactions on Modelling and Performance Evaluation of Computing Systems, 2025. DOI: https://doi.org/10.1145/3721480. IF: 1.22
-
Hashemi, A., Shi, W., Corriveau, J-P., AI Generated or AI Touch-Up? Identifying AI Contribution in Text Data. International Journal of Data Science and Analytics, 2024. DOI: https://doi.org/10.1007/s41060-024-00693-9. IF: 3.4
-
Abada, A., St-Hilaire, M., and Shi, W., Rebenue Maximization of Power-Grid Balancing Rebate Auctions Under Timeline Constraints. IEEE Access. Volume: 12, pp. 172969-172979. Nov. 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3493012. IF: 3.557
-
Nguyen, K., Shi, W., St-Hilaire, M., Dynamic Virtual Network Embedding Leveraging Neighborhood and Preceding Mappings Information. IEEE Transactions on Vehicular Technology. pp 1-13. Aug. 2024. DOI: https://doi.org/10.1109/TVT.2024.3443742. IF: 6.8
-
Gan, J., Lou, C., Shi, W., Liu, Y., Liu, X., Tian, Z., An Attack Exploiting Cyber-Arm Industry. IEEE Transactions on Dependable and Secure Computing.Volume 22, Issue 2, pp. 1686-1702. (eCF Paper Id: TDSC-2023-02-0126) Sept 2024. DOI: 10.1109/TDSC.2024.3451129. IF: 7
-
Zhang, D., Shi, W., St-Hilaire, M. and Yang, R., Multi-Access Edge Integrated Networking for Internet of Vehicles: Blockchain-Based Intelligence Networking for Cooperative Positioning Towards Future Internet of Vehicles. Transactions on Vehicular Technology. Volume: 73 Issue: 3, pp 3262 – 3276. March 2024. DOI: 10.1109/TVT.2023.3327926. IF: 6.8
-
Elbir, A., Shi, W., Papazafeiropoulos, A.K., Kourtessis, P., Chatzinotas, S., Near-Field Terahertz Communications: Model-Based and Model-Free Channel Estimation. IEEE Access. Volume: 11, Electronic ISSN: 2169-3536, pp 36409-36420. April 2023. DOI:10.1109/ACCESS.2023.3266297. IF: 3.367
-
Zhang, D., Shi, W., St-Hilaire, M. and Yang, R., Multi-Access Edge Integrated Networking for Internet of Vehicles: A Blockchain-Based Deep Compressed Cooperative Learning Approach. IEEE Transactions on Intelligent Transportation Systems. Volume: 23 Issue: 11, pp 21593 – 21607. June 2022. DOI: 10.1109/TITS.2022.3183927. IF: 6.492
-
Elbir, A., Shi, W., Papazafeiropoulos, A.K., Kourtessis, P., Chatzinotas, S., Terahertz-Band Channel and Beam Split Estimation via Array Perturbation Model. IEEE Open Journal of the Communications Society. Volume 4, pp. 892-907, March 2023.
DOI: 10.1109/OJCOMS.2023.3263625 CiteScore: 4.5
-
Lv, Y., Shi, W., Zhang, W., Lu, H., and Tian, Z., Don’t trust the Clouds easily: The Insecurity of Content Security Policy based on Object Storage. IEEE Internet of Things. Volume 10, Issue 2. pp: 10462 – 10470, June 2023. DOI: 10.1109/JIOT.2023.3238658. IF: 10.238
-
Li, M., Shi, W., Zhu, F. and Tian, Z., Shafiq, M, Luo, Z., Large-capacity Local Multi-dimensional Information Hiding Method for 6G Networks. IEEE Network.Volume: 36, Issue: 4, pp. 160-165. October 2022. DOI: 10.1109/MNET.001.2100412. IF: 10.294
-
Tan, Q., Wang, X., and Shi, W., Tang, J., Tian, Z., An Anonymity Vulnerability in Tor. IEEE/ACM Transactions on Networking. pp 1-14. IF: 4.371 (pdf)(BibTex)
-
Croft, W., Sack J.-R., Shi, W., Differentially private facial obfuscation via generative adversarial networks. Future Generation Computer Systems Volume: 129, pp 358-379. 2022.IF: 7.187. (pdf)(BibTex)
-
Abada, A., St-Hilaire, M., and Shi, W., Auction-Based Scheduling of Excess Energy Consumption to Enhance Grid Upward Flexibility. IEEE Access. Volume: 10, pp 5944-5956. 2022. IF: 3.367. (pdf)(BibTex)
-
Ahsan, R., Shi, W. Ma, X. and Croft, W. L., A Comparative Analysis of CGAN-based Oversampling for Anomaly Detection. IET Cyber-Physical Systems: Theory & Applications. October 2021. DOI: 10.1049/cps2.12019. (pdf)(BibTex)
-
Yang, D., Zhou, Y., Shi, W., Wu, D., Ma, C., Yang, F., Wang, W., RD-IOD: Two-Level Residual Distillation based Triple Network for Incremental Object Detection. ACM Transactions on Multimedia Computing, Communications, and Applications. Accepted. IF: 5.47. (BibTex)(pdf)
-
Ahsan, R, Shi, W., Ma, X., Croft, W., GAN-based Oversampling for Anomaly Detection. IET Cyber-Physical Systems: Theory & Applications. CiteScore: 3.3. (BibTex)
-
Ahsan, R, Shi, W., Corriveau, J. -P., Network Intrusion Detection Using Machine Learning Approaches: Addressing Data Imbalance. IET Cyber-Physical Systems: Theory & Applications. Accepted. CiteScore: 3.3. (BibTex)
-
Croft, W., Sack J.-R., Shi, W., The Impact of Range Constraints on Utility in the Design of Differentially Private Mechanisms. Transactions on Data Privacy. Accepted. IF: 1.24. (pdf)(BibTex)
-
Xu, D., Shi, W., Zhai, W., Tian, Z., Multi-candidate voting model based on blockchain. IEEE/CAA Journal of Automatica Sinica. IF: 5.730 (pdf)(BibTex)
-
Luo, C., Tan, Z., Min G., Shi, W., Gan J., Tian Z., A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics. In press. DOI: 10.1109/TII.2020.3038761. IF: 9.112 (pdf)(BibTex)
-
Wang, Z., Ji, T., Tian, Z., Fang, B., Ruan, Q., Wang, H., Shi, W., AFLPro: Direction Sensitive Fuzzing. Elsevier’s Journal of Information Security and Applications. Volume 54, October 2020, 102497. DOI: https://doi.org/10.1016/j.jisa.2020.102497. IF: 2.327. (pdf)(BibTex)
-
Wu, D., Shi, W. and Ma, X., A Novel Real-time Anti-Spam Framework. ACM Transactions on Internet Technology (ACM-TOIT). IF: 3.75.
-
Croft, W. L., Sack, J. -R. and Shi, W., Differential Privacy via a Truncated and Normalized Laplace Mechanism. Journal of Computer Science and Technology (Springer). DOI: 10.1007/s11390-020-0193-z. IF: 1.513. (pdf)(BibTex)
-
Ma, X., Shi, W., AESMOTE: Adversarial Reinforcement Learning with SMOTE for Anomaly Detection. IEEE Transactions on Network Science and Engineering. June 2021. 8(2):943 – 956. Doi: 10.1109/TNSE.2020.3004312. IF: 5.213. (pdf)(BibTex)
-
Xu, D., Tian, Z., Lai, R., Kong, X., Tan, Z. and Shi, W., Deep Learning Based Emotional Analysis of Microblog Texts. Information Fusion. Volume 64, Pages 1-11. Doi: https://doi.org/10.1016/j.inffus.2020.06.002. IF: 13.2. (pdf)(BibTex)
-
Yu, K., Shi, W., Santoro N., Designing a Streaming Algorithm for Outlier Detection in Data Mining: An Incremental Approach. Journal of Sensors. 2020 Mar; 20(5): 1261. Doi: 10.3390/s20051261 (pdf)(BibTex)
-
Wang, Z., Zhang, Y., Tian, Z., Ruan, Q., Liu, T., Wang, H., Liu, Z., Lin, J., Fang, B., Shi, W., Automated Vulnerability Discovery and Exploitation in the Internet of Things. 2019. Journal of Sensors, Special Issue on Advanced Intrusion Detection & Mitigation Systems in Wireless Sensor Networks, (IF: 3.031). 19(15). pii: E3362. doi: 10.3390/s19153362. (pdf)(BibTex)
-
Tian, Z., Shi, W., Real Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. July 2019. IEEE Transactions on Industrial Informatics. (IF: 7.377). Volume: 15, Issue:7, pp. 4285-4294, Print ISSN: 1551-3203, Online ISSN: 1941-0050, DOI: 10.1109/TII.2019.2907754 (pdf)(BibTex)
-
Han, W., Tian, Z., Shi, W., Huang, Z., Li, S., Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. 2019. Journal of Sensors (Special Issue on Intelligent Systems in Sensor Networks and Internet of Things), 19(12), 2804; https://doi.org/10.3390/s19122804 (registering DOI). (IF: 3.031) (pdf)(BibTex)
-
Elhabyan, R., Shi, W. and St-Hilaire, M., A Coverage and Obstacle-aware Clustering Protocol for Wireless Sensor Networks in 3D Terrain. Elsevier’s Journal of Computer Communications. 2019. In press. (pdf)(BibTex)
-
Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M., Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. ACM/Springer Mobile Networks and Applications. (IF: 2.39). (pdf)(BibTex)
-
Tian, Z., Shi, W., Tan, Z., Qiu J., Sun Y. and Jiang F., Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. 2019. ACM/Springer Journal of Mobile Networks and Applications. (IF: 2.39). In press. (pdf)(BibTex)
-
Gu, Z., Wang, Y., Shi, W., Tian, Z., Ren, K., Lau, F.C.M., A Practical Neighbor Discovery Framework for Wireless Sensor Networks. 2019. Journal of Sensors, 19(8), 1887; DOI: https://doi.org/10.3390/s19081887. (IF: 3.031). (pdf)(BibTex)
-
Su, S., Guizani, M., Shi, W., Yu, X., Du, X., Tian, Z., A Data-driven Method for Future Internet Route Decision Modeling. Elsevier’s Future Generation Computer Systems. (IF: 5.768). 2018. Vol.95 pp. 212- 220.(pdf)(BibTex)
-
Elhabyan, R., Shi, W. and St-Hilaire, M., A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks. Journal of Network and Computer Applications. 2018. DOI information: 10.1016/j.jnca.2018.04.005.(pdf)(BibTex)
-
Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W., A Privacy Preserving Scheme for Nearest Neighbor Query. July 2018. Journal of Sensors, 18(8), 2440; doi: 10.3390/s18082440. (IF: 3.031).(pdf)(BibTex)
-
Elhabyan, R., Shi, W. and St-Hilaire, M., Coverage Protocols for Wireless Sensor Networks: Review and Future Directions. December 2018. Journal of Communications and Networks 21(1), 45-60.(pdf)(BibTex)
-
Croft, W. L., Shi, W., Sack, J. -R. and Corriveau, J.-P., Comparison of Approaches of Geographic Partitioning for Data Anonymization. Journal of Geographical Systems. July 2017, Volume 19, Issue 3, pp 221–248(pdf)(BibTex)
-
Peng, M., Shi, W., Corriveau, J.-P., Pazzi, R. and Wang, Y., Black Hole Search in Computer Networks: State-of-the-Art, Challenges and Future Directions. Elsevier’s Journal of Parallel and Distributed Computing (JPDC), Vol. 88, pp 1-15, 2016.(pdf)(BibTex)
-
Croft, W. L., Shi, W., Sack, J. -R. and Corriveau, J.-P., Geographic Partitioning Techniques for the Anonymization of Health Care Data. International Journal of Geographical Information Science. April 2016. doi: http://www.tandfonline.com/doi/pdf/10.1080/13658816.2016.1172314.(pdf)(BibTex)
-
Wang, Y. and Shi, W., On Optimal Scheduling Algorithms for Well-Structured Workflows in the Cloud with Budget and Deadline Constraints. Parallel Processing Letters, Vol. 26, No.02, 1650009 (2016).(pdf)(BibTex)
-
Wang, Y. and Shi, W., Hu, M., Virtual Services Co-Migration for Mobile Accesses: Online vs. Offline. IEEE Transactions on Mobile Computing, Volume: 14, Issue: 12, pp. 2576-2859, 2015. doi:10.1109/TMC.2015.2404791. IF: 4.474. (pdf)(BibTex)
-
Wang, Y. and Shi, W., Budget Driven Scheduling of MapReduce Jobs in Heterogeneous Clouds, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp.306-319. 2014. doi: 10.1109/TCC.2014.2316812 (pdf)(BibTex)
-
Wang, Y. and Shi, W., Dataflow-based Scheduling for Scientific Workflows in HPC with Storage Constraints, The Computer Journal, Volume: 58, Issue: 7, pp. 1628 – 1644, July 2015. DOI: 10.1093/comjnl/bxu109. IF: 0.98. (pdf)(BibTex)
-
Shi, W., Corriveau, J.-P. and Agar, J., Dead Reckoning Using Play Patterns in a Simple 2D Multiplayer Online Game, International Journal of Computer Games Technology, vol. 2014, Article ID 138596, 18 pages, 2014. doi:10.1155/2014/138596. IF: 1.35. (pdf)(BibTex)
-
Shi, W., Barbeau, M., Garcia-Alfaro, J., and Corriveau, J.-P., Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Journal of Ad Hoc & Sensor Wireless (AHSWN), Vol. 17, No. 1-2(2013) 87-102. IF: 0.948. (pdf)(BibTex)
-
Shi, W., Garcia-Alfaro, J. and Corriveau, J.-P., Searching for a Black Hole in an Interconnected Network Topology using Mobile Agents in Token Model. Journal of Parallel and Distributed Computing, Vol. 74, No. 1, (2014) 1945-1958. (pdf)(BibTex)
-
Shi, W., Garcia-Alfaro, J., Corriveau, J.-P., Barbeau, M. and Yao, M., Secure Localization in the presence of Colluding Attackers in WSNs, Journal of Sensors, Aug 2017, 17(8), 1892 (doi: 10.3390/s17081892).(pdf)(BibTex)
-
Dobrev, S., Santoro, N. and Shi, W., Scattered Mobile Agents Searching for a Black Hole in an Unoriented Ring Using Tokens. International Journal of Foundations of Computer Science (IJFCS), Vol. 19, No. 6 (2008) 1355-1372. IF: 0.73. (pdf)(BibTex)
Master’s Thesis: System Family Engineering for Leader Election in Ring (pdf)
Ph. D Thesis: Using Mobile Agents for Black Hole Search with Tokens in Multi Networks (pdf)