| Constructing dummy query sequences to protect location privacy and query privacy in location-based services | Wu, Zongda[1];Li, Guiling[2,3] | WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS | 168 | |
| Multi-population techniques in nature inspired optimization algorithms: A comprehensive survey | Ma, Haiping[1];Shen, Shigen[1] | SWARM AND EVOLUTIONARY COMPUTATION | 139 | |
| A dummy-based user privacy protection approach for text information retrieval | Wu, Zongda[1,3];Shen, Shigen[1 | KNOWLEDGE-BASED SYSTEMS | 134 | |
| An effective approach for the protection of user commodity viewing privacy in e-commerce website | Wu, Zongda[1];Shen, Shigen[1]; | KNOWLEDGE-BASED SYSTEMS | 132 | |
| Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures | Cui, Lei[1,2];Qu, Youyang[3];X | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS | 86 | |
| Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks | Shen, Shigen[1];Huang, Longjun | IEEE INTERNET OF THINGS JOURNAL | 86 | |
| Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks | Shen, Shigen[1,2];Li, Hongjie[ | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 69 | |
| A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropy | Hu, Keli[1];Ye, Jun[1];Fan, En | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS | 62 | |
| Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks | Cheng, Zihao[1];Hu, Songlin[2] | IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 58 | |
| Popularity-Aware and Diverse Web APIs Recommendation Based on Correlation Graph | Wu, Shengqi[1];Shen, Shigen[2] | IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS | 51 | |
| Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT | Wu, Guowen[1];Xu, Zhiqi[1];Zha | JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING | 43 | |
| Time-Aware Missing Healthcare Data Prediction Based on ARIMA Model | Kong, Lingzhen[1];Li, Guangshu | IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS | 42 | |
| A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud | Liu, Jianhua[1];Shen, Shigen[1 | APPLIED SOFT COMPUTING | 38 | |
| Malware propagation model in wireless sensor networks under attack-defense confrontation | Zhou, Haiping[1];Shen, Shigen[ | COMPUTER COMMUNICATIONS | 36 | |
| Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds | Liu, Jianhua[1,2,3];Yu, Jiadi[ | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 34 | |
| HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs | Shen, Shigen[1];Zhou, Haiping[ | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 32 | |
| FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks | Qu, Youyang[1];Gao, Longxiang[ | IEEE NETWORK | 32 | |
| FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow Prediction | Duan, Youxiang[1,2];Chen, Ning | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY | 31 | |
| Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge Cloud | Liu, Jianhua[1];Wang, Xin[2];S | IEEE INTERNET OF THINGS JOURNAL | 31 | |
| A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion | Shen, Shigen[1];Ma, Haiping[2] | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 31 | |
| Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination | Shen, Yizhou[1,2];Shen, Shigen | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | 31 | |
| STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things | Wu, Guowen[1];Xie, Lanlan[1];Z | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 30 | |
| Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra | Cheng, Zihao[1];Yue, Dong[2];S | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 27 | |
| Incorporating Distributed DRL Into Storage Resource Optimization of Space-Air-Ground Integrated Wireless Communication Network | Wang, Chao[1];Liu, Lei[2,3];Ji | IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING | 26 | |
| Data sharing in VANETs based on evolutionary fuzzy game | Liu, Jianhua[1,3];Wang, Xin[2] | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 25 | |
| SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks | Shen, Shigen[1];Zhou, Haiping[ | IEEE ACCESS | 24 | |
| Reliability Evaluation for Clustered WSNs under Malware Propagation | Shen, Shigen[1,2];Huang, Longj | SENSORS | 22 | |
| Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot | Feng, Sheng[1];Shi, Haiyan[1]; | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 21 | |
| Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks | Jiang, Guanxiong[1];Shen, Shig | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 20 | |
| Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communications | Li, Hongjie[1];Zhu, Yinglian[1 | NEUROCOMPUTING | 19 | |