Journal Publications

Selected Papers in Refereed Journals

  • Li, M., Shi, W., Zhu, F. and Tian, Z., Shafiq, M, Luo, Z., Large-capacity Local Multi-dimensional Information Hiding Method for 6G Networks. IEEE Network. Accepted. IF: 10.294

  • Zhang, D., Shi, W., St-Hilaire, M. and Yang, R., Blockchain-based Internet of Intelligence with Connected and Autonomous Vehicles: A Deep Cooperative Learning Approach. IEEE Internet of Things. Accepted. IF: 9.471

  • Tan, Q., Wang, X., and Shi, W., Tang, J., Tian, Z., An Anonymity Vulnerability in Tor. IEEE/ACM Transactions on Networking. pp 1-14. IF: 4.371 (pdf)(BibTex)

  • Croft, W., Sack J.-R., Shi, W., Differentially private facial obfuscation via generative adversarial networks. Future Generation Computer Systems Volume: 129, pp 358-379. 2022. IF: 7.187. (pdf)(BibTex)

  • Abada, A., St-Hilaire, M., and Shi, W., Auction-Based Scheduling of Excess Energy Consumption to Enhance Grid Upward Flexibility. IEEE Access. Volume: 10, pp 5944-5956. 2022. IF: 3.367. (pdf)(BibTex)

  • Ahsan, R., Shi, W. Ma, X. and Croft, W. L., A Comparative Analysis of CGAN-based Oversampling for Anomaly Detection. IET Cyber-Physical Systems: Theory & Applications. October 2021. DOI: 10.1049/cps2.12019. (pdf)(BibTex)

  • Yang, D., Zhou, Y., Shi, W., Wu, D., Ma, C., Yang, F., Wang, W., RD-IOD: Two-Level Residual Distillation based Triple Network for Incremental Object Detection. ACM Transactions on Multimedia Computing, Communications, and Applications. Accepted. IF: 5.47. (BibTex)(pdf)

  • Ahsan, R, Shi, W., Ma, X., Croft, W., GAN-based Oversampling for Anomaly Detection. IET Cyber-Physical Systems: Theory & Applications. CiteScore: 3.3. (BibTex)

  • Ahsan, R, Shi, W., Corriveau, J. -P., Network Intrusion Detection Using Machine Learning Approaches: Addressing Data Imbalance. IET Cyber-Physical Systems: Theory & Applications. Accepted. CiteScore: 3.3. (BibTex)

  • Croft, W., Sack J.-R., Shi, W., The Impact of Range Constraints on Utility in the Design of Differentially Private Mechanisms. Transactions on Data Privacy. Accepted. IF: 1.24. (pdf)(BibTex)

  • Xu, D., Shi, W., Zhai, W., Tian, Z., Multi-candidate voting model based on blockchain. IEEE/CAA Journal of Automatica Sinica.  IF: 5.730   (pdf)(BibTex)

  • Luo, C., Tan, Z., Min G., Shi, W., Gan J., Tian Z., A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics. In press. DOI: 10.1109/TII.2020.3038761.  IF: 9.112  (pdf)(BibTex)

  • Wang, Z., Ji, T., Tian, Z., Fang, B., Ruan, Q., Wang, H., Shi, W., AFLPro: Direction Sensitive Fuzzing. Elsevier’s Journal of Information Security and Applications. Volume 54, October 2020, 102497. DOI: https://doi.org/10.1016/j.jisa.2020.102497. IF: 2.327. (pdf)(BibTex)

  • Wu, D., Shi, W. and Ma, X., A Novel Real-time Anti-Spam Framework. ACM Transactions on Internet Technology (ACM-TOIT). IF: 3.75.

  • Croft, W. L., Sack, J. -R. and Shi, W., Differential Privacy via a Truncated and Normalized Laplace Mechanism. Journal of Computer Science and Technology (Springer). DOI: 10.1007/s11390-020-0193-z. IF: 1.513. (pdf)(BibTex)

  • Ma, X., Shi, W., AESMOTE: Adversarial Reinforcement Learning with SMOTE for Anomaly Detection. IEEE Transactions on Network Science and Engineering. June 2021. 8(2):943 – 956. Doi: 10.1109/TNSE.2020.3004312. IF: 5.213. (pdf)(BibTex)

  • Xu, D., Tian, Z., Lai, R., Kong, X., Tan, Z. and Shi, W., Deep Learning Based Emotional Analysis of Microblog Texts. Information Fusion. Volume 64, Pages 1-11. Doi: https://doi.org/10.1016/j.inffus.2020.06.002.  IF: 13.2. (pdf)(BibTex)

  • Yu, K., Shi, W., Santoro N., Designing a Streaming Algorithm for Outlier Detection in Data Mining: An Incremental Approach. Journal of Sensors. 2020 Mar; 20(5): 1261. Doi: 10.3390/s20051261 (pdf)(BibTex)

  • Wang, Z., Zhang, Y., Tian, Z., Ruan, Q., Liu, T., Wang, H., Liu, Z., Lin, J., Fang, B., Shi, W., Automated Vulnerability Discovery and Exploitation in the Internet of Things. 2019. Journal of Sensors, Special Issue on Advanced Intrusion Detection & Mitigation Systems in Wireless Sensor Networks, (IF: 3.031). 19(15). pii: E3362. doi: 10.3390/s19153362. (pdf)(BibTex)

  • Tian, Z., Shi, W., Real Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. July 2019. IEEE Transactions on Industrial Informatics. (IF: 7.377). Volume: 15, Issue:7, pp. 4285-4294, Print ISSN: 1551-3203, Online ISSN: 1941-0050, DOI: 10.1109/TII.2019.2907754 (pdf)(BibTex)

  • Han, W., Tian, Z., Shi, W., Huang, Z., Li, S., Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. 2019. Journal of Sensors (Special Issue on Intelligent Systems in Sensor Networks and Internet of Things), 19(12), 2804; https://doi.org/10.3390/s19122804 (registering DOI). (IF: 3.031) (pdf)(BibTex)

  • Elhabyan, R., Shi, W. and St-Hilaire, M., A Coverage and Obstacle-aware Clustering Protocol for Wireless Sensor Networks in 3D Terrain. Elsevier’s Journal of Computer Communications. 2019. In press. (pdf)(BibTex)

  • Sun, Y., Li, M., Su, S., Tian, Z., Shi, W., Han, M., Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. ACM/Springer Mobile Networks and Applications. (IF: 2.39). (pdf)(BibTex)

  • Tian, Z., Shi, W., Tan, Z., Qiu J., Sun Y. and Jiang F., Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. 2019. ACM/Springer Journal of Mobile Networks and Applications. (IF: 2.39). In press. (pdf)(BibTex)

  • Gu, Z., Wang, Y., Shi, W., Tian, Z., Ren, K., Lau, F.C.M., A Practical Neighbor Discovery Framework for Wireless Sensor Networks. 2019. Journal of Sensors, 19(8), 1887; DOI: https://doi.org/10.3390/s19081887. (IF: 3.031). (pdf)(BibTex)

  • Su, S., Guizani, M., Shi, W., Yu, X., Du, X., Tian, Z., A Data-driven Method for Future Internet Route Decision Modeling. Elsevier’s Future Generation Computer Systems. (IF: 5.768). 2018. Vol.95 pp. 212- 220.(pdf)(BibTex)

  • Elhabyan, R., Shi, W. and St-Hilaire, M., A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks. Journal of Network and Computer Applications. 2018. DOI information: 10.1016/j.jnca.2018.04.005.(pdf)(BibTex)

  • Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W., A Privacy Preserving Scheme for Nearest Neighbor Query. July 2018. Journal of Sensors, 18(8), 2440; doi: 10.3390/s18082440. (IF: 3.031).(pdf)(BibTex)

  • Elhabyan, R., Shi, W. and St-Hilaire, M., Coverage Protocols for Wireless Sensor Networks: Review and Future Directions. December 2018. Journal of Communications and Networks 21(1), 45-60.(pdf)(BibTex)

  • Croft, W. L., Shi, W., Sack, J. -R. and Corriveau, J.-P., Comparison of Approaches of Geographic Partitioning for Data Anonymization. Journal of Geographical Systems. July 2017, Volume 19, Issue 3, pp 221–248(pdf)(BibTex)

  • Peng, M., Shi, W., Corriveau, J.-P., Pazzi, R. and Wang, Y., Black Hole Search in Computer Networks: State-of-the-Art, Challenges and Future Directions. Elsevier’s Journal of Parallel and Distributed Computing (JPDC), Vol. 88, pp 1-15, 2016.(pdf)(BibTex)

  • Croft, W. L., Shi, W., Sack, J. -R. and Corriveau, J.-P., Geographic Partitioning Techniques for the Anonymization of Health Care Data. International Journal of Geographical Information Science. April 2016. doi: http://www.tandfonline.com/doi/pdf/10.1080/13658816.2016.1172314.(pdf)(BibTex)

  • Wang, Y. and Shi, W., On Optimal Scheduling Algorithms for Well-Structured Workflows in the Cloud with Budget and Deadline Constraints. Parallel Processing Letters, Vol. 26, No.02, 1650009 (2016).(pdf)(BibTex)

  • Wang, Y. and Shi, W., Hu, M., Virtual Services Co-Migration for Mobile Accesses: Online vs. Offline. IEEE Transactions on Mobile Computing, Volume: 14, Issue: 12, pp. 2576-2859, 2015. doi:10.1109/TMC.2015.2404791. IF: 4.474. (pdf)(BibTex)

  • Wang, Y. and Shi, W., Budget Driven Scheduling of MapReduce Jobs in Heterogeneous Clouds, IEEE Transactions on Cloud Computing, Vol. 2, No. 3, pp.306-319. 2014. doi: 10.1109/TCC.2014.2316812 (pdf)(BibTex)

  • Wang, Y. and Shi, W., Dataflow-based Scheduling for Scientific Workflows in HPC with Storage Constraints, The Computer Journal, Volume: 58, Issue: 7, pp. 1628 – 1644, July 2015. DOI: 10.1093/comjnl/bxu109. IF: 0.98. (pdf)(BibTex)

  • Shi, W., Corriveau, J.-P. and Agar, J., Dead Reckoning Using Play Patterns in a Simple 2D Multiplayer Online Game, International Journal of Computer Games Technology, vol. 2014, Article ID 138596, 18 pages, 2014. doi:10.1155/2014/138596. IF: 1.35. (pdf)(BibTex)

  • Shi, W., Barbeau, M., Garcia-Alfaro, J., and Corriveau, J.-P., Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Journal of Ad Hoc & Sensor Wireless (AHSWN), Vol. 17, No. 1-2(2013) 87-102. IF: 0.948. (pdf)(BibTex)

  • Shi, W., Garcia-Alfaro, J. and Corriveau, J.-P., Searching for a Black Hole in an Interconnected Network Topology using Mobile Agents in Token Model. Journal of Parallel and Distributed Computing, Vol. 74, No. 1, (2014) 1945-1958. (pdf)(BibTex)

  • Shi, W., Garcia-Alfaro, J., Corriveau, J.-P., Barbeau, M. and Yao, M., Secure Localization in the presence of Colluding Attackers in WSNs, Journal of Sensors, Aug 2017, 17(8), 1892 (doi: 10.3390/s17081892).(pdf)(BibTex)

  • Dobrev, S., Santoro, N. and Shi, W., Scattered Mobile Agents Searching for a Black Hole in an Unoriented Ring Using Tokens. International Journal of Foundations of Computer Science (IJFCS), Vol. 19, No. 6 (2008) 1355-1372. IF: 0.73. (pdf)(BibTex)

Master’s Thesis: System Family Engineering for Leader Election in Ring (pdf)

Ph. D Thesis: Using Mobile Agents for Black Hole Search with Tokens in Multi Networks (pdf)