default search action
Sicong Shao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Murad Mehrab Abrar, Raian Islam, Shalaka Satam, Sicong Shao, Salim Hariri, Pratik Satam:
GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles. CoRR abs/2405.08359 (2024) - [i5]Likai Yao, Qinxuan Shi, Zhanglong Yang, Sicong Shao, Salim Hariri:
Development of an Edge Resilient ML Ensemble to Tolerate ICS Adversarial Attacks. CoRR abs/2409.18244 (2024) - 2023
- [c17]Ibrahim Almazyad, Sicong Shao, Salim Hariri, Hisham A. Kholidy:
Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation. AICCSA 2023: 1-7 - [c16]Theodore Ha, Sicong Shao, Salim Hariri:
An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection. AICCSA 2023: 1-8 - [c15]Likai Yao, Sicong Shao, Salim Hariri:
Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems. AICCSA 2023: 1-8 - [c14]Martin Manuel Lopez, Sicong Shao, Salim Hariri, Soheil Salehi:
Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT. ACM Great Lakes Symposium on VLSI 2023: 691-696 - [c13]Mohammad Wali Ur Rahman, Murad Mehrab Abrar, Hunter Gibbons Copening, Salim Hariri, Sicong Shao, Pratik Satam, Soheil Salehi:
Quantized Transformer Language Model Implementations on Edge Devices. ICMLA 2023: 709-716 - [c12]Yu-Zheng Lin, Sicong Shao, Md Habibor Rahman, Mohammed Shafae, Pratik Satam:
DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security. UEMCON 2023: 200-209 - [i4]Mohammad Wali Ur Rahman, Murad Mehrab Abrar, Hunter Gibbons Copening, Salim Hariri, Sicong Shao, Pratik Satam, Soheil Salehi:
Quantized Transformer Language Model Implementations on Edge Devices. CoRR abs/2310.03971 (2023) - 2022
- [j3]Chongke Wu, Sicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri:
An explainable and efficient deep learning framework for video anomaly detection. Clust. Comput. 25(4): 2715-2737 (2022) - [j2]Xin Gao, Sundaresh Ram, Rohit C. Philip, Jeffrey J. Rodríguez, Jeno Szep, Sicong Shao, Pratik Satam, Jesús Pacheco, Salim Hariri:
Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery. Remote. Sens. 14(2): 255 (2022) - [c11]Safwan Elmadani, Salim Hariri, Sicong Shao:
Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks. AICCSA 2022: 1-9 - [c10]Mohammad Wali Ur Rahman, Sicong Shao, Pratik Satam, Salim Hariri, Chris Padilla, Zoe Taylor, Carlos Nevarez:
A BERT-based Deep Learning Approach for Reputation Analysis in Social Media. AICCSA 2022: 1-8 - [c9]Sicong Shao, Saleem Alharir, Salim Hariri, Pratik Satam, Sonia Shiri, Abdessamad Mbarki:
AI-based Arabic Language and Speech Tutor. AICCSA 2022: 1-8 - [i3]Sicong Shao, Saleem Alharir, Salim Hariri, Pratik Satam, Sonia Shiri, Abdessamad Mbarki:
AI-based Arabic Language and Speech Tutor. CoRR abs/2210.12346 (2022) - [i2]Mohammad Wali Ur Rahman, Sicong Shao, Pratik Satam, Salim Hariri, Chris Padilla, Zoe Taylor, Carlos Nevarez:
A BERT-based Deep Learning Approach for Reputation Analysis in Social Media. CoRR abs/2211.01954 (2022) - 2021
- [b1]Sicong Shao:
Machine Learning-based Author Identification for Social Media Forensics. University of Arizona, Tucson, USA, 2021 - [c8]Sicong Shao, Pratik Satam, Shalaka Satam, Khalid Al-Awady, Gregory Ditzler, Salim Hariri, Cihan Tunc:
Multi-Layer Mapping of Cyberspace for Intrusion Detection. AICCSA 2021: 1-8 - 2020
- [j1]Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri:
An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics. ACM Trans. Manag. Inf. Syst. 11(4): 24:1-24:25 (2020) - [c7]Chongke Wu, Sicong Shao, Cihan Tunc, Salim Hariri:
Video Anomaly Detection using Pre-Trained Deep Convolutional Neural Nets and Context Mining. AICCSA 2020: 1-8 - [i1]Chongke Wu, Sicong Shao, Cihan Tunc, Salim Hariri:
Video Anomaly Detection Using Pre-Trained Deep Convolutional Neural Nets and Context Mining. CoRR abs/2010.02406 (2020)
2010 – 2019
- 2019
- [c6]Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri:
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat. AICCSA 2019: 1-8 - [c5]Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri:
Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics. AICCSA 2019: 1-8 - 2018
- [c4]Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri:
Autonomic Author Identification in Internet Relay Chat (IRC). AICCSA 2018: 1-8 - [c3]Jocelyn Bernard, Sicong Shao, Cihan Tunc, Hamamache Kheddouci, Salim Hariri:
Quasi-cliques Analysis for IRC Channel Thread Detection. COMPLEX NETWORKS (1) 2018: 578-589 - 2017
- [c2]Sicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri:
Real-Time IRC Threat Detection Framework. FAS*W@SASO/ICCAC 2017: 318-323 - [c1]Sicong Shao:
Real-Time Automatic Framework for IRC Threat Information Detection. FAS*W@SASO/ICCAC 2017: 382-384
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint