


default search action
Shan Ai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Yilei Wang, Zhaojie Wang
, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen
, Minghao Zhao
:
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems. Digit. Commun. Networks 9(5): 1053-1060 (2023) - [j15]Arthur Sandor Voundi Koe, Shan Ai
, Qi Chen, Juan Tang, Kongyang Chen
, Shiwen Zhang
, Xiehua Li
:
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT. Inf. Sci. 632: 87-104 (2023) - [j14]Shan Ai, Chang Chen
, Juan Tang, Pengfei Huang, Yanli Liu:
B2IPTS: A blockchain-based intellectual property transaction framework. J. Ambient Intell. Humaniz. Comput. 14(6): 7663-7678 (2023) - [j13]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Shan Ai
, Jun Zheng:
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration. J. Ambient Intell. Humaniz. Comput. 14(10): 13661-13672 (2023) - [c2]Yipeng Wang, Peixian Chen, Shan Ai, Weipeng Liang, Binjie Liao, Weichuan Mo, Heng Wang:
Two-Stage Anomaly Detection in LEO Satellite Network. SciSec 2023: 423-438 - 2022
- [j12]Qikun Zhang
, Liang Zhu
, Yongjiao Li
, Zhaorui Ma
, Junling Yuan
, Jun Zheng
, Shan Ai
:
A group key agreement protocol for intelligent internet of things system. Int. J. Intell. Syst. 37(1): 699-722 (2022) - [j11]Lang Li, Tiancai Liang, Shan Ai, Xiangyan Tang:
Erratum to: An improved random forest algorithm and its application to wind pressure prediction. Int. J. Intell. Syst. 37(2): 1802 (2022) - [j10]Haojun Ai
, Jingjie Tao
, Shan Ai, Tianshui Xu, Ning Li
, Kaifeng Tang, Sheng Zhang, Yuhong Yang, Shengchen Li:
Error model and simulation for multisource fusion indoor positioning. Int. J. Intell. Syst. 37(3): 2219-2241 (2022) - [j9]Yan Pang
, Teng Huang, Zhen Wang
, Jianwei Li
, Poorya Hosseini
, Ji Zhang
, Chao Liu
, Shan Ai:
Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification. Int. J. Intell. Syst. 37(11): 8747-8769 (2022) - [j8]Arthur Sandor Voundi Koe
, Qi Chen, Juan Tang, Shan Ai
, Hongyang Yan, Shiwen Zhang, Duncan S. Wong:
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int. J. Intell. Syst. 37(11): 9774-9797 (2022) - [j7]Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, Kongyang Chen
:
Similarity-based integrity protection for deep learning systems. Inf. Sci. 601: 255-267 (2022) - [j6]Arthur Sandor Voundi Koe, Shan Ai, Pengfei Huang, Anli Yan, Juan Tang, Qi Chen, Kanghua Mo, Wanqing Jie, Shiwen Zhang:
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough. Inf. Sci. 606: 60-71 (2022) - [j5]Shan Ai, Guoyu Yang, Chang Chen
, Kanghua Mo, Wangyong Lv, Arthur Sandor Voundi Koe:
ESM: Selfish mining under ecological footprint. Inf. Sci. 606: 601-613 (2022) - 2021
- [j4]Shan Ai, Arthur Sandor Voundi Koe
, Teng Huang
:
Adversarial perturbation in remote sensing image recognition. Appl. Soft Comput. 105: 107252 (2021) - [j3]Shan Ai, Sheng Hong
, Xinyang Zheng
, Yue Wang
, Xiaozhang Liu
:
CSRT rumor spreading model based on complex network. Int. J. Intell. Syst. 36(5): 1903-1913 (2021) - [j2]Lang Li
, Tiancai Liang
, Shan Ai
, Xiangyan Tang
:
An improved random forest algorithm and its application to wind pressure prediction. Int. J. Intell. Syst. 36(8): 4016-4032 (2021) - [c1]Arthur Sandor Voundi Koe, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang:
Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 338-345
2010 – 2019
- 2019
- [j1]Sha Huan
, Gane Dai
, Gaoyong Luo, Shan Ai:
Bayesian Compress Sensing Based Countermeasure Scheme Against the Interrupted Sampling Repeater Jamming. Sensors 19(15): 3279 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint