default search action
Congcong Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Congcong Shi, Xiuli Huang, Pengfei Yu:
On the Security of Distributed Multi-Agent K-Means Clustering With Local Differential Privacy. IEEE Access 12: 124751-124763 (2024) - 2022
- [j4]Congcong Shi, Miao Du, Weidong Lu, Xiaoming He, Sanglu Lu:
Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals. Mob. Networks Appl. 27(1): 96-108 (2022) - [c8]Pengfei Yu, Congcong Shi:
Sensitive Data Comparison Algorithm Based Spatio-temporal Label Distribution Fusion. AHPCAI 2022: 85-91 - 2021
- [j3]Congcong Shi, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song, Sanglu Lu:
Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking. Wirel. Commun. Mob. Comput. 2021: 6668478:1-6668478:15 (2021) - [c7]Congcong Shi, Pengfei Yu, Xiuli Huang:
A Novel GAN based User Desensitization Data Generation Algorithm. EITCE 2021: 1068-1074 - 2020
- [j2]Congcong Shi, Jiaxuan Fei, Xiaojian Zhang, Qigui Yao, Jie Fan:
Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement. Sci. Program. 2020: 8895804:1-8895804:6 (2020) - [c6]Congcong Shi, Rui Song, Xinyu Qi, Yubo Song, Bin Xiao, Sanglu Lu:
ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis. ICC 2020: 1-6
2010 – 2019
- 2019
- [c5]Congcong Shi, Miao Du, Weidong Lu, Sanglu Lu:
An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals. GLOBECOM 2019: 1-6 - [c4]Congcong Shi, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song, Sanglu Lu:
iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking. ICPADS 2019: 655-662 - 2018
- [c3]Rui Zhang, Jiaxuan Fei, Congcong Shi, Xiaojian Zhang, Xiuli Huang, Ziang Lu:
A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System. CCIS 2018: 1101-1106 - 2017
- [j1]Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling, Junzhou Luo:
A novel attack to track users based on the behavior patterns. Concurr. Comput. Pract. Exp. 29(6) (2017) - [c2]Yijia Lu, Fei Han, Lei Xie, Yafeng Yin, Congcong Shi, Sanglu Lu:
I Am the UAV: A Wearable Approach for Manipulation of Unmanned Aerial Vehicle. SMARTCOMP 2017: 1-3 - 2010
- [c1]Jianhua Che, Congcong Shi, Yong Yu, Weimin Lin:
A Synthetical Performance Evaluation of OpenVZ, Xen and KVM. APSCC 2010: 587-594
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint