default search action
Shudong Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Shudong Li, Danna Lu, Qing Li, Xiaobo Wu, Shumei Li, Zhen Wang:
MFLink: User Identity Linkage Across Online Social Networks via Multimodal Fusion and Adversarial Learning. IEEE Trans. Emerg. Top. Comput. Intell. 8(5): 3716-3725 (2024) - [j39]Yangyang Mei, Weihong Han, Shudong Li, Kaihan Lin, Zhihong Tian, Shumei Li:
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning. IEEE Trans. Intell. Transp. Syst. 25(9): 12131-12140 (2024) - [j38]Kaihan Lin, Weihong Han, Shudong Li, Zhaoquan Gu, Huimin Zhao, Yangyang Mei:
Detecting Deepfake Videos using Spatiotemporal Trident Network. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 340:1-340:20 (2024) - 2023
- [j37]Qi Li, Le Cheng, Wei Wang, Xianghua Li, Shudong Li, Peican Zhu:
Influence maximization through exploring structural information. Appl. Math. Comput. 442: 127721 (2023) - [j36]Kaihan Lin, Weihong Han, Shudong Li, Zhaoquan Gu, Huimin Zhao, Jinchang Ren, Li Zhu, Jujian Lv:
IR-Capsule: Two-Stream Network for Face Forgery Detection. Cogn. Comput. 15(1): 13-22 (2023) - [j35]Zhuocheng Yu, Shudong Li, Youming Bai, Weihong Han, Xiaobo Wu, Zhihong Tian:
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion. IEEE Internet Things J. 10(18): 16134-16143 (2023) - [j34]Shudong Li, Guojin Zhong, Yanlin Jin, Xiaobo Wu, Peican Zhu, Zhen Wang:
A Deceptive Reviews Detection Method Based on Multidimensional Feature Construction and Ensemble Feature Selection. IEEE Trans. Comput. Soc. Syst. 10(1): 153-165 (2023) - [j33]Shudong Li, Yuan Li, Xiaobo Wu, Sattam Al Otaibi, Zhihong Tian:
Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning. IEEE Trans. Intell. Transp. Syst. 24(7): 7642-7652 (2023) - [j32]Dawei Zhao, Shudong Li, Zhen Wang, Haipeng Peng:
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control. IEEE Trans. Netw. Sci. Eng. 10(4): 2307-2318 (2023) - [j31]Shudong Li, Laiyuan Jiang, Qianqing Zhang, Zhen Wang, Zhihong Tian, Mohsen Guizani:
A Malicious Mining Code Detection Method Based on Multi-Features Fusion. IEEE Trans. Netw. Sci. Eng. 10(5): 2731-2739 (2023) - [j30]Shudong Li, Chuanyu Zhao, Qing Li, Jiuming Huang, Dawei Zhao, Peican Zhu:
BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection. World Wide Web (WWW) 26(4): 1793-1809 (2023) - [c35]Xiaohui Huang, Shudong Li, Weihong Han, Shumei Li, Yanchen Xu, Zikang Liu:
A Social Bot Detection Method Using Multi-features Fusion and Model Optimization Strategy. APWeb-WAIM (2) 2023: 347-362 - [c34]Danna Lu, Qing Li, Zikang Liu, Shumei Li, Xiaobo Wu, Shudong Li:
A Review of User Identity Linkage Across Social Networks. DSC 2023: 429-436 - [c33]Keke Tang, Xujian Cai, Weilong Peng, Shudong Li, Wenping Wang:
OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers. ICIP 2023: 1260-1264 - [i2]Shudong Li, Matthew Tivnan, Yuan Shen, J. Webster Stayman:
Diffusion Posterior Sampling for Nonlinear CT Reconstruction. CoRR abs/2312.01464 (2023) - 2022
- [j29]Xi Kang, Shudong Li, Qian Li, Gang Liu:
Dimension-reduced spatiotemporal network for lameness detection in dairy cows. Comput. Electron. Agric. 197: 106922 (2022) - [j28]Shudong Li, Danyi Qin, Xiaobo Wu, Juan Li, Baohui Li, Weihong Han:
False Alert Detection Based on Deep Learning and Machine Learning. Int. J. Semantic Web Inf. Syst. 18(1): 1-21 (2022) - [j27]Yangyang Mei, Weihong Han, Shudong Li, Kaihan Lin, Cui Luo:
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm. IEEE Trans. Netw. Serv. Manag. 19(4): 4262-4272 (2022) - [c32]Ju Yang, Liang Zhou, Le Wang, Shudong Li, Ziqing Lin, Zhaoquan Gu:
A Multi-step Attack Detection Framework for the Power System Network. DSC 2022: 1-8 - [c31]Yang Lv, Shaona Qin, Zifeng Zhu, Zhuocheng Yu, Shudong Li, Weihong Han:
A Review of Provenance Graph based APT Attack Detection: Applications and Developments. DSC 2022: 498-505 - [c30]Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu, Kaihan Lin, Yulu Qi:
A Review of Attribution Technical for APT Attacks. DSC 2022: 512-518 - 2021
- [j26]Shudong Li, Laiyuan Jiang, Xiaobo Wu, Weihong Han, Dawei Zhao, Zhen Wang:
A weighted network community detection algorithm based on deep learning. Appl. Math. Comput. 401: 126012 (2021) - [j25]Meizi Wang, Yang Song, Julien S. Baker, Gusztáv Fekete, Ukadike Chris Ugbolue, Shudong Li, Yaodong Gu:
The biomechanical characteristics of a feline distal forelimb: A finite element analysis study. Comput. Biol. Medicine 129: 104174 (2021) - [j24]Chenghui Lin, Shudong Li, Yining Lu, Huw Wiltshire:
Comparison of Muscle Activity and Ultrasound Response of Lower Extremity Muscles During Treadmill and Track Running. J. Medical Imaging Health Informatics 11(8): 2091-2096 (2021) - [j23]Shudong Li, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, Zhihong Tian:
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors. J. Sensors 2021: 8820413:1-8820413:12 (2021) - [j22]Shudong Li, Qianqing Zhang, Xiaobo Wu, Weihong Han, Zhihong Tian:
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. Secur. Commun. Networks 2021: 9396141:1-9396141:12 (2021) - [j21]Shudong Li, Yuan Li, Weihong Han, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Malicious mining code detection based on ensemble learning in cloud computing environment. Simul. Model. Pract. Theory 113: 102391 (2021) - [c29]Zilin Zhao, Dawei Zhao, Shudong Li, Shumian Yang:
Malware classification based on visualization and feature fusion. DSC 2021: 53-60 - [c28]Kaihan Lin, Weihong Han, Zhaoquan Gu, Shudong Li:
A Survey of DeepFakes Generation and Detection. DSC 2021: 474-478 - [c27]Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu:
A Survey of Advanced Persistent Threats Attack and Defense. DSC 2021: 608-613 - [c26]Chuanyu Zhao, Shudong Li, Xiaobo Wu, Weihong Han, Zhihong Tian, Maofei Chen:
A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning. DSC 2021: 614-620 - [c25]Haipeng Zhang, Shudong Li, Xiaobo Wu, Weihong Han, Laifu Wang:
An android malware detection approach using multi-feature fusion and TF-IDF algorithm. DSC 2021: 629-634 - [c24]Na Xu, Shudong Li, Xiaobo Wu, Weihong Han, Xiaojing Luo:
An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM. DSC 2021: 635-639 - [c23]Shudong Li, Xi Kang, Yankun Feng, Gang Liu:
Detection method for individual pig based on improved YOLOv4 Convolutional Neural Network. DSIT 2021: 231-235 - 2020
- [j20]Shuo Zhang, Yaping Liu, Shudong Li, Zhiyuan Tan, Xiaomeng Zhao, Junjie Zhou:
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access 8: 17356-17365 (2020) - [j19]Shudong Li, Dawei Zhao, Xiaobo Wu, Zhihong Tian, Aiping Li, Zhen Wang:
Functional immunization of networks based on message passing. Appl. Math. Comput. 366 (2020) - [j18]Peican Zhu, Xiaoyu Wang, Danyang Jia, Yangming Guo, Shudong Li, Chen Chu:
Investigating the co-evolution of node reputation and edge-strategy in prisoner's dilemma game. Appl. Math. Comput. 386: 125474 (2020) - [j17]Weihong Han, Zhihong Tian, Zizhong Huang, Shudong Li, Yan Jia:
Topic representation model based on microblogging behavior analysis. World Wide Web 23(6): 3083-3097 (2020) - [c22]Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. CIAT 2020: 39-43 - [c21]Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. CIAT 2020: 355-359 - [c20]Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:
An APT Group Knowledge Model based on MDATA. CIAT 2020: 374-378 - [c19]Lingxiao Meng, Shudong Li, Xiaobo Wu, Weihong Han:
Framework Design of Environment Monitoring System Based on Machine Learning. ICAIS (2) 2020: 380-392
2010 – 2019
- 2019
- [j16]Hangfeng Yang, Shudong Li, Xiaobo Wu, Hui Lu, Weihong Han:
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning. IEEE Access 7: 148853-148860 (2019) - [j15]Chen Liu, Hao Guo, Zhibin Li, Xiaoyuan Gao, Shudong Li:
Coevolution of multi-game resolves social dilemma in network population. Appl. Math. Comput. 341: 402-407 (2019) - [j14]Peican Zhu, Xinyu Wang, Shudong Li, Yangming Guo, Zhen Wang:
Investigation of epidemic spreading process on multiplex networks by incorporating fatal properties. Appl. Math. Comput. 359: 512-524 (2019) - [j13]Weihong Han, Zizhong Huang, Shudong Li, Yan Jia:
Distribution-Sensitive Unbalanced Data Oversampling Method for Medical Diagnosis. J. Medical Syst. 43(2): 39:1-39:10 (2019) - [j12]Weihong Han, Zhihong Tian, Zizhong Huang, Shudong Li, Yan Jia:
Bidirectional self-adaptive resampling in internet of things big data learning. Multim. Tools Appl. 78(21): 30111-30126 (2019) - [j11]Weihong Han, Zhihong Tian, Wei Shi, Zizhong Huang, Shudong Li:
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. Sensors 19(12): 2804 (2019) - [j10]Wenyong Zhao, Shudong Li, Jieqiong Ding, Yanhong Wei, Xiangbo Liu, Shuqi Song:
Building framework for selecting finite element models of complex large welded structure of railway vehicles. Simul. Model. Pract. Theory 97 (2019) - [c18]Minzhen Zheng, Shudong Li, Danna Lu, Wei Wang, Xiaobo Wu, Dawei Zhao:
Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks. DependSys 2019: 446-453 - [c17]Yixia Li, Shudong Li, Yanshan Chen, Peiyan He, Xiaobo Wu, Weihong Han:
Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks. DependSys 2019: 454-461 - [c16]Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. DSC 2019: 480-486 - [c15]Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun:
Research on Content Extraction of Rich Text Web Pages. ICAIS (4) 2019: 279-287 - [c14]Yong Yu, Ming Jing, Detao Ji, Yuanyuan Wang, Zhongwen Xie, Shudong Li:
Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net. ICAIS (4) 2019: 433-442 - [c13]Na Zhao, Min Cao, Chenming Song, Shuang Shi, Yong Yu, Shudong Li:
Trusted Component Decomposition Based on OR-Transition Colored Petri Net. ICAIS (4) 2019: 443-451 - [c12]Hang Yang, Yan Jia, Weihong Han, Yuan-Ping Nie, Shudong Li, Xiao-Juan Zhao:
Calculation of Network Security Index Based on Convolution Neural Networks. ICAIS (3) 2019: 530-540 - [c11]Yue Han, Weihong Han, Shudong Li:
Review: Topic Model Application for Social Network Public Opinion Analysis. ICITEE 2019: 22:1-22:9 - 2018
- [j9]Jing Qiu, Yuhan Chai, Yan Liu, Zhaoquan Gu, Shudong Li, Zhihong Tian:
Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City. IEEE Access 6: 74854-74864 (2018) - [j8]Yong Quan, Yan Jia, Bin Zhou, Weihong Han, Shudong Li:
Repost prediction incorporating time-sensitive mutual influence in social networks. J. Comput. Sci. 28: 217-227 (2018) - [j7]Shudong Li, Xiaoyan Chen, Fengze Han:
Simulation of Cell Dielectric Properties Based on COMSOL. J. Robotics Netw. Artif. Life 4(4): 330-333 (2018) - [c10]Xiaodong Yang, Likun Xiao, Yutong Li, Shudong Li, Jinli Wang, Chunlin Chen:
Identity-Based Blind Proxy Re-Signature Scheme for Data Security. DSC 2018: 28-32 - [c9]Tianshu Li, Zhaoquan Gu, Xiao Lin, Shudong Li, Qingfeng Tan:
Approximation Algorithms for Controller Placement Problems in Software Defined Networks. DSC 2018: 250-257 - [c8]Shudong Li, Xiaobo Wu, Aiping Li, Bin Zhou, Zhihong Tian, Dawei Zhao:
Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks. DSC 2018: 405-409 - 2017
- [j6]Shudong Li, Yan Zhang, Yaodong Gu, James Ren:
Stress distribution of metatarsals during forefoot strike versus rearfoot strike: A finite element study. Comput. Biol. Medicine 91: 38-46 (2017) - [j5]Hong Lai, Mingxing Luo, Josef Pieprzyk, Zhiguo Qu, Shudong Li, Mehmet A. Orgun:
An efficient quantum blind digital signature scheme. Sci. China Inf. Sci. 60(8): 082501:1-082501:14 (2017) - [c7]Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. Inscrypt 2017: 196-208 - [c6]Shudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, Bin Zhou:
A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN. DSC 2017: 156-161 - 2016
- [j4]Yuanping Nie, Yan Jia, Shudong Li, Xiang Zhu, Aiping Li, Bin Zhou:
Identifying users across social networks based on dynamic core interests. Neurocomputing 210: 107-115 (2016) - 2015
- [c5]Zongsheng Xie, Yuanping Nie, Songchang Jin, Shudong Li, Aiping Li:
Answer Quality Assessment in CQA Based on Similar Support Sets. CCL 2015: 309-325 - [c4]Hai Li, Songchang Jin, Shudong Li:
A Hybrid Model for Experts Finding in Community Question Answering. CyberC 2015: 176-185 - 2013
- [c3]Songchang Jin, Aiping Li, Shuqiang Yang, Wangqun Lin, Bo Deng, Shudong Li:
A MapReduce and Information Compression Based Social Community Structure Mining Method. CSE 2013: 971-980 - [i1]Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang:
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350 (2013) - 2012
- [j3]Junxiang Li, Limei Yan, Shudong Li, Jiazhen Huo:
Inexact trust region PGC method for large sparse unconstrained optimization. Comput. Optim. Appl. 51(3): 981-999 (2012) - [j2]Zhongtian Jia, Lixiang Li, Zhuoran Yu, Shudong Li, Yixian Yang:
A Secure Message Transaction Protocol for Delay Tolerant Networks. J. Commun. 7(8): 622-633 (2012) - [j1]Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang, Shize Guo:
Modelling security message propagation in delay tolerant networks. Secur. Commun. Networks 5(1): 51-58 (2012) - [c2]Ling Xiang, Shudong Li, Wei Cui:
Measurement and analysis of torsional vibration signal for rotating shaft system. FSKD 2012: 1851-1854 - 2011
- [c1]Jiansheng Hao, Qizhi Huang, Shudong Li:
Application of equipment maintenance vehicles based on entropy multi-objective decision. EMEIT 2011: 1849-1851
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint