Shi Dong (董仕) [中文]

Professor and Graduate Supervisor
School of Computer Science and Technology
Zhoukou Normal University

Email: dongshi AT zknu DOT edu DOT cn
Address: Research Building Room 431
East Wenchang Street, Chuanhui District, Zhoukou City, China

Graduate Areas: Computer Network, Network Security, Pattern Recognition and Intelligent Systems, Wireless Sensor networks, Edge Computing

Biography

I am currently a Professor (Graduate Supervisor) at School of Computer Science and Technology, Zhoukou Normal University, Zhoukou, China. Professor, Master's advisor, postdoctoral fellow, Huazhong University of Science and Technology, Washington University, St. Louis, USA. Visiting scholar, the melbourne university, melbourne, AUS. My current research focuses on network security, pattern recognition, deep learning, blockchain, Internet of things, edge computing, including network measurement, network behavior analysis, network traffic identification, etc. , deep learning in the field of network security applications, as well as the privacy protection of edge computing. I has published more than 60 papers in related academic journals and conferences (about 35 papers by first author or correspondence author, and about 20 papers by top SCI journals and top international conferences in JCR I) , and granted 9 patents for invention, I am a reviewer of IEEE Transactions on Parallel and Distributed Systems, IEEE/ACM Transactions on Networking(SCI journal); IEEE ACCESS (SCI journal); Computer Networks(SCI journal); IEEE Transactions on Network Science and Engineering(SCI journal); IEEE Transactions on Industrial Informatics(SCI journal);IEEE Internet of Things Journal(SCI journal);Journal of Internet Technology (SCI journal); Computers & Electrical Engineering (SCI journal); KSII Transactions on Internet and Information Systems (SCI journal); Journal of Xi'an Jiaotong University and Journal of Beijing University of Posts and Telecommunications. I am an associate Editor for IEEE Systems Journal(SCI index), Physical Communication(SCI index), PeerJ Computer Science(SCI index), IET Wireless Sensor Systems(EI index), IET Networks(EI index), IEICE Transactions on Communications(SCI index), Journal of Artificial Intelligence and Soft Computing Research(SCI index) and International Journal on Artificial Intelligence Tools(SCI index) and member of the Editorial Board for International Journal of Information and Communication Technology, Progress in Human Computer Interaction, Journal of Modern Mechanical Engineering and Technology, Journal of Cyber Security Technology, Acta Scientific Computer Sciences, Digital Technologies Research and Applications, International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP). I was awarded the Third Prize of Henan Science and Technology Progress Award (2018) and the academic technology leader of Henan Education Department (2019) . I am currently the leader of the innovative network and Information Security Science and technology team of Henan Province, the leader of the provincial key discipline of computer application technology of Henan Province, a senior member of the Wuhan Textile University, and a supervisor of the master's degree students of the Hubei University of Technology. Selected as one of the top 2% of scientists in the world in terms of 2023.

I received the M.S. degrees in Computer Application Technology from University of Electronic Science and Technology of China, Chengdu, China, in 2009, mentor Prof. Guangchun Luo; and the Ph.D. degree in Computer Application Technology from School of Computere Science and Engineering, Southeast University, Nanjing, China, in 2013. From July 2014 to April 2017, I was also a Postdoctoral fellow (advised by Prof. Ruixuan Li) at State Key Laboratory of intelligent and Distribution System, Huazhong University of Science and Technology, Wuhan, China. I am a visiting scholar (advised by Prof. Rajkumar Buyya) at Professor Buyya's Cyberhome, the University of Melbourne, Melbourne, Austrilia.

For more details, please refer to: https://jkx.zknu.edu.cn/2013/0308/c2104a28420/page.htm

Project Experiences

1. National Natural Science Foundation of China, General Project, No.U1504602,Flow behavior analysis and multi-classifier model based on flow records in sampling environment, 2016/01-2018/12, PI;
2. China Postdoctoral Fund, General Project, No.2015M572141,Research on key technologies of traffic identification based on cloud computing, 2016/01-2017/12, PI;
3. Project of Science and technology tackling key problems in Henan Province, No.162102310147, Research on network anomaly detection based on behavior correlation feature, 2016/01-2017/09, PI;
4. Project of Science and technology tackling key problems in Henan Province, No.192102210125, Research on detection methods of DDOS attack traffic in SDN environment, 2019/01-2021/06, PI;
5. Henan Province high-level talent internationalization funding project, Research on security key technologies of Internet of things based on blockchain, 2019/12-2022/12, PI;
6. Study Abroad Science and technology activity project in Henan Province, Research on key technologies of network traffic identification based on flow recording in high-speed network environment, 2019/12-2022/12, PI;
7. Key scientific research projects of colleges and universities in Henan Province, Research on malware detection algorithm based on deep reinforcement learning, 2023/1-2024/12, PI;
8. Henan Provincial Science and Technology Research and Development Program Joint Fund (Application Research), 232103810045, Research on Malicious Encrypted Traffic Identification Method Based on Multi Agent Deep Reinforcement Learning, March 2028-2025.8, PI;
9. Henan Province High end Foreign Expert Introduction Program Project, HNGD2024034, Research on Key Technologies of Encrypted Network Traffic Identification Based on Deep Learning, March 2024-2025.8, PI;

Publications

Improved PBFT Consensus Mechanism Based on Voting Sort Clustering Partition with Group Signature for IoT
Shi Dong, Huadong Su, Ruizhe Hou, Joarder Kamruzzaman,
IEEE Transactions on Intelligent Transportation Systems: 2024
[Project page] [DOI]
The Metaverse Review: Exploring the Boundless Ream of Digital Reality
Shi Dong, Mengke Liu, Khushnood Abbas
Computers, Materials & Continua: 2024
[Project page] [DOI]
Device Identification Method for Internet of Things Based on Spatial-Temporal Feature Residuals
Shi Dong, Longhui Shu, Qinyu Xia, Joarder Kamruzzaman, YUanjun Xia, Tao Peng,
IEEE Transactions on Services Computing: 2024
[Project page] [DOI]
A hybrid blockchain-based privacy-preserving authentication scheme for Vehicular Ad Hoc Networks
Huadong Su, Shi Dong, Ting Zhang,
IEEE Transactions on Vehicular Technology: 2024
[Project page] [DOI]
Network Abnormal Traffic Detection Framework Based on Deep Reinforcement Learning
Shi Dong, Yuanjun Xia, Tao Wang,
IEEE Wireless Communications: 2024
[Project page] [DOI]
Android Malware Detection Method Based on CNN and DNN Bybrid Mechanism
Shi Dong, Longhui Shu, Shan Nie,
IEEE Transactions on Industrial Informatics: 2024
[Project page] [DOI]
An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs
Huadong Su, Shi Dong, Ning Wang, Ting Zhang,
Vehicular Communications: 2024
[Project page] [DOI]
Image steganalysis algorithm based on deep learning and attention mechanism for computer communication
Huan Li, Shi Dong,
Journal of Electronic Imaging: 2024
[Project page] [DOI]
A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks
Shi Dong, Huadong Su, Yuanjun Xia, Fei Zhu, Xinrong Hu, Bangchao Wang,
IEEE Transactions on Intelligent Transportation Systems: 2023
[Project page] [DOI]
Android Malware Detection Methods Based on Convolutional Neural Network: A Survey
Longhui Shu, Shi Dong, Huadong Su, Junjie Huang,
IEEE Transactions on Emerging Topics in Computational Intelligence: 2023
[Project page] [DOI]
Blockchain technology and application: an overview
Shi Dong, Abbas K, Joarder Kamruzzaman,
PeerJ Computer Science: 2023
[Project page] [DOI]
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
Qiao rui, Shi Dong
Computers, Materials & Continua: 2023
[Project page] [DOI]
Quantum Particle Swarm Optimization for Task Offloading in Mobile Edge Computing
Shi Dong, Yuanjun Xia, Joarder Kamruzzaman,
IEEE Transactions on Industrial Informatics: 2022
[Project page] [DOI]
A-CAVE: Network abnormal traffic detection algorithm based on variational autoencoder
Shi Dong, Huadong Su, Yue Liu,
ICT Express: 2022
[Project page] [DOI]
An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural Networks
Qinyu Xia, Shi Dong, Tao Peng
IPCCC2022: 2022
[Project page] [DOI]
NOCD: a new overlapping community detection algorithm based on improved KNN
Shi Dong, Mudar Sarem,
Journal of Ambient Intelligence and Humanized Computing: 2022
[Project page] [DOI]
Network traffic identification in packet sampling environment
Shi Dong, Yuanjun Xia,
Digital Communications and Networks: 2022
[Project page] [DOI]
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning
Shi Dong, Yuanjun Xia, Tao Peng,
IEEE Transactions on Network and Service Management: 2021
[Project page] [DOI]
Multi Class SVM Algorithm with Active Learning for Network Traffic Classification
Shi Dong,
Expert Systems with Applications: 2021
[Project page] [DOI]
Distributed Data Gathering Algorithm Based on Spanning Tree
Shi Dong, Mudar Sarem, Wengang Zhou
IEEE Systems Journal: 2021
[Project page] [DOI]
Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning
Yuanjun Xia, Shi Dong, Tao Peng
MSN2021: 2021
[Project page] [DOI]
Improved influential nodes identification in complex networks
Shi Dong,
Journal of Intelligent & Fuzzy Systems: 2021
[Project page] [DOI]
Traffic identification model based on generative adversarial deep convolutional network
Shi Dong, Yuanjun Xia, Tao Peng,
Annals of Telecommunications: 2021
[Project page] [DOI]
A survey on deep learning and its applications
Shi Dong, Ping Wang, KhushnoodAbbas
Computer Science Review: 2021
[Project page] [DOI]
Improved label propagation algorithm for overlapping community detection
Shi Dong,
Computing: 2020
[Project page] [DOI]
A security localization algorithm based on DV-hop against sybil attack in wireless sensor networks
Shi Dong, Xingang Zhang, Wengang Zhou,
Journal of Electrical Engineering & Technology : 2020
[Project page] [DOI]
Improving positioning algorithm based on RSSI
Xinhui Ding Shi Dong(corresponding author),
Wireless Personal Communications:2020
[Project page] [DOI]
DDoS attack detection method based on improved KNN with the degree of DDoS attack in softwaredefined networks
Shi Dong, Mudar Sarem
IEEE Access: 2019, 8:5039-5048
[Project page] [DOI]
Energy-efficient scheme based on user task characteristic in virtual cloud platform
Shi Dong
Cluster Computing: 2020, 23(2):1125-1135
[Project page] [DOI]
Entropy-based outlier detection using spark
Guilan Feng, Shi Dong (Corresponding author),
Cluster Computing: 2020, 23(2):409-419
[Project page] [DOI]
A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments
Shi Dong, Khushnood Abbas
IEEE Access: 2019, 7:80813-80828,
[Project page] [Code coming soon] [DOI]
Traffic Identification Method Based on Multiple Probabilistic Neural Network Model
Shi Dong, Ruixuan Li
Neural Computing & Applications : 2019, 31(2):473-487
[Project page] [DOI]
Flow online identification method for the encrypted Skype
Shi Dong and Xiaopeng Zhang (Corresponding author)
Journal of Network and Computer Applications: 2019
Microblog sentiment analysis method based on spectral clustering
Shi Dong, Xingang Zhang, Ya Li
Journal of Information Processing Systems: 2018
A new routing algorithm based on opportunistic networks
Shi Dong Yingchun Qi
International Journal of Information and Communication Technology : 2017
Application of network link prediction in drug discovery
Khushnood Abbas, Alireza Abbasi, Shi Dong, Ling Niu, Laihang Yu, Bolun Chen, Shi-Min Cai, Qambar Hasan
BMC bioinformatics: 2021
Weber’s law based multi-level convolution correlation features for image retrieval
LaiHang Yu, NingZhong Liu, WenGang Zhou, Shi Dong, Yu Fan, Khushnood Abbas
Multimedia Tools and Applications: 2021
Feature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features.
Yongfeng Cui, Shi Dong and Wei Liu
International Arab Journal of Information Technology: 2018
Research on efficient-efficient routing protocol for WSNs based on improved artificial bee colony algorithm
Huadong Wang, Ying Chen Shi Dong(Corresponding author)
IET Wireless Sensor Systems: 2017,7(1):15-20
A time-slice optimization based weak feature association algorithm for video condensation
Yongfeng Cui, Wei Liu, Shi Dong,
Multimedia Tools and Applications: 2016 ,75(24):17515-17530
Effective energy-based multi-view piecewise planar stereo
Yiran Wang, Wei Wang, Hai Zhu, Shi Dong(Corresponding Author),
Pattern Recognition and Image Analysis: 2016, 26(4):726-733
Adaptive fusion design using multiscale unscented Kalman filter approach for multisensor data fusion
Huadong Wang Shi Dong(Corresponding Author),
Mathematical Problems in Engineering: 2015
NSVM: A New SVM Algorithm Based on Traffic Flow Metric
Shi Dong, Wei Liu, Dingding Zhou, Yingchun Qi
Journal of Internet Technology: 2015, 14(7):542-550
Auto Adaptive Identification Algorithm Based on Network Traffic Flow
Shi Dong, Xingang Zhang, Dingding Zhou
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL: 2015, 9(6):672-685
Research on network traffic identification based on multi layer perceptron
Dingding Zhou, Wei Liu, Wengang Zhou, Shi Dong(Corresponding Author),
Telkomnika: 2014, 12(1):109-116
Flow cluster algorithm based on improved K-means method
Shi Dong, Dingding Zhou, Wei Ding, Jian Gong
IETE Journal of Research: 2013, 59(4):326-333
Research on network traffic identification based on improved BP neural network
Shi Dong, Dingding Zhou, Wengang Zhou, Wei Ding, Jian Gong
Appl. Math: 2013 ,7(1):389-398
Measure correlation analysis of network flow based on symmetric uncertainty
Shi Dong, Wei Ding, Liang Chen
KSII Transactions on Internet and Information Systems (TIIS) : 2012 ,6(6):1649-1667