董仕 (Shi Dong) [English]

特聘教授,硕士生导师
计算机科学与技术学院
周口师范学院

邮箱: dongshi AT zknu DOT edu DOT cn
通信地址: 河南省周口市川汇区文昌大道中段6号(466001),综合实验楼431室

招生方向: 网络安全,模式识别与智能系统,恶意软件检测,计算机应用技术

个人介绍

现任周口师范学院, 计算机科学与技术学院,教授,硕士生导师,华中科技大学博士后,美国圣路易斯华盛顿大学访问学者。 目前主要研究方向集中在网络安全、模式识别、深度学习、区块链、物联网、边缘计算,具体包括网络测量、网络行为特征分析、网络流量识别等,深度学习在网络安全领域的应用等,以及边缘计算的隐私保护等。 在相关领域学术期刊和会议上共发表论文60余篇(第一作者或通信作者论文约35篇,JCR I区顶级SCI国际期刊及顶级国际会议论文约20篇),授权发明专利9项, 为IEEE Transactions on Parallel and Distributed Systems(CCF推荐TOP期刊A类,SCI期刊)、IEEE/ACM Transactions on Networking(CCF推荐TOP期刊A类,SCI期刊); IEEE ACCESS (SCI期刊); Computer Networks(CCF推荐B类,SCI期刊); IEEE Transactions on Network Science and Engineering(SCI期刊); IEEE Transactions on Industrial Informatics(SCI一区TOP期刊);IEEE Internet of Things Journal(SCI一区TOP期刊);Journal of Internet Technology(SCI期刊)、 Computers & Electrical Engineering(SCI期刊)、KSII Transactions on Internet and Information Systems(SCI期刊)、《西安交通大学学报》、《北京邮电大学学报》等国内外期刊审稿人。 目前是国际期刊IEEE Systems Journal(SCI期刊), Physical Communication(SCI期刊), PeerJ Computer Science(SCI期刊), IET Wireless Sensor Systems(EI期刊), IET Networks(EI期刊), IEICE Transactions on Communications(SCI期刊), Journal of Artificial Intelligence and Soft Computing Research(SCI期刊)和International Journal on Artificial Intelligence Tools(SCI期刊)的副主编,国际期刊International Journal of Information and Communication Technology(EI期刊), Progress in Human Computer Interaction, Journal of Modern Mechanical Engineering and Technology, Journal of Cyber Security Technology, Acta Scientific Computer Sciences, Digital Technologies Research and Applications, International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP)的编委,武汉大学学报理学版青年编委和计算机应用研究编委;获河南省科学技术进步奖三等奖(2018)及河南省教育厅学术技术带头人(2019)。 主持或实际负责国家自然科学基金国际合作重点项目、工信部和应急管理部重大项目课题、国家自然科学基金面上项目多项;现为河南省网络与信息安全创新型科技团队带头人、 河南省计算机应用技术省级重点学科带头人、中国计算机学会杰出会员、IEEE高级会员、CCF互联网专委会执行委员、CCF服务计算专委会执行委员、武汉纺织大学和湖北工业大学硕士生导师。入选2023年度全球前2%顶尖科学家。

2009年6月,硕士毕业于电子科技大学计算机应用技术专业, 导师 罗光春教授;2013年10月, 博士毕业于东南大学计算机应用专业,导师 丁伟教授。 2014年7月至2016年4月,在华中科技大学智能与分布计算实验室,从事博士后研究工作, 合作导师李瑞轩教授。

更多最新信息,请参见: https://jkx.zknu.edu.cn/2013/0308/c2104a28420/page.htm

项目经历

1.国家自然科学基金联合基金项目,U1504602,抽样环境下基于流记录的流量行为特征分析与多分类器模型研究,2016.01-2018.12,负责人;
2.中国博士后基金面上项目,2015M572141,基于云计算的流量识别关键技术研究,2016.01-2017.12,负责人;
3.河南省科技攻关项目,162102310147,基于行为关联特征的网络异常检测研究,2016.01-2017.09,负责人;
4.河南省科技攻关项目,192102210125,SDN环境下DDoS攻击流量检测方法研究,2019.01-2021.06,负责人
5.河南省高层次人才国际化资助项目,基于区块链的物联网安全关键技术研究,2019.12-2022.12,负责人;
6.河南省留学人员科技活动项目择优资助,高速网络环境下基于流记录的网络流量识别关键技术研究,2019.12-2022.12,负责人;
7.河南省高等学校重点科研项目,23A520054,基于深度强化学习的恶意软件检测算法研究,2023.1-2024.12,负责人;
8.河南省省级科技研发计划联合基金(应用攻关类),232103810045,基于多智能体深度强化学习的恶意加密流量识别方法研究,2023.8-2025.8,负责人;
9.河南省高端外国专家引进计划项目,HNGD2024034,基于深度学习的加密网络流量识别关键技术研究,2024.1-2025.12,负责人;

发表论文

Network Abnormal Traffic Detection Framework Based on Deep Reinforcement Learning
Shi Dong, Yuanjun Xia, Tao Wang,
IEEE Wireless Communications: 2024
[Project page] [DOI]
Android Malware Detection Method Based on CNN and DNN Bybrid Mechanism
Shi Dong, Longhui Shu, Shan Nie,
IEEE Transactions on Industrial Informatics: 2024
[Project page] [DOI]
An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs
Huadong Su, Shi Dong, Ning Wang, Ting Zhang,
Vehicular Communications: 2024
[Project page] [DOI]
Image steganalysis algorithm based on deep learning and attention mechanism for computer communication
Huan Li, Shi Dong,
Journal of Electronic Imaging: 2024
[Project page] [DOI]
A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks
Shi Dong, Huadong Su, Yuanjun Xia, Fei Zhu, Xinrong Hu, Bangchao Wang,
IEEE Transactions on Intelligent Transportation Systems: 2023
[Project page] [DOI]
Android Malware Detection Methods Based on Convolutional Neural Network: A Survey
Longhui Shu, Shi Dong, Huadong Su, Junjie Huang,
IEEE Transactions on Emerging Topics in Computational Intelligence: 2023
[Project page] [DOI]
Blockchain technology and application: an overview
Shi Dong, Abbas K, Joarder Kamruzzaman,
PeerJ Computer Science: 2023
[Project page] [DOI]
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
Qiao rui, Shi Dong
Computers, Materials & Continua: 2023
[Project page] [DOI]
Quantum Particle Swarm Optimization for Task Offloading in Mobile Edge Computing
Shi Dong, Yuanjun Xia, Joarder Kamruzzaman,
IEEE Transactions on Industrial Informatics: 2022
[Project page] [DOI]
A-CAVE: Network abnormal traffic detection algorithm based on variational autoencoder
Shi Dong, Huadong Su, Yue Liu,
ICT Express: 2022
[Project page] [DOI]
An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural Networks
Qinyu Xia, Shi Dong, Tao Peng
IPCCC2022: 2022
[Project page] [DOI]
NOCD: a new overlapping community detection algorithm based on improved KNN
Shi Dong, Mudar Sarem,
Journal of Ambient Intelligence and Humanized Computing: 2022
[Project page] [DOI]
Network traffic identification in packet sampling environment
Shi Dong, Yuanjun Xia,
Digital Communications and Networks: 2022
[Project page] [DOI]
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning
Shi Dong, Yuanjun Xia, Tao Peng,
IEEE Transactions on Network and Service Management: 2021
[Project page] [DOI]
Multi Class SVM Algorithm with Active Learning for Network Traffic Classification
Shi Dong,
Expert Systems with Applications: 2021
[Project page] [DOI]
Distributed Data Gathering Algorithm Based on Spanning Tree
Shi Dong, Mudar Sarem, Wengang Zhou
IEEE Systems Journal: 2021
[Project page] [DOI]
Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning
Yuanjun Xia, Shi Dong, Tao Peng
MSN2021: 2021
[Project page] [DOI]
Improved influential nodes identification in complex networks
Shi Dong,
Journal of Intelligent & Fuzzy Systems: 2021
[Project page] [DOI]
Traffic identification model based on generative adversarial deep convolutional network
Shi Dong, Yuanjun Xia, Tao Peng,
Annals of Telecommunications: 2021
[Project page] [DOI]
A survey on deep learning and its applications
Shi Dong, Ping Wang, KhushnoodAbbas
Computer Science Review: 2021
[Project page] [DOI]
Improved label propagation algorithm for overlapping community detection
Shi Dong,
Computing: 2020
[Project page] [DOI]
A security localization algorithm based on DV-hop against sybil attack in wireless sensor networks
Shi Dong, Xingang Zhang, Wengang Zhou,
Journal of Electrical Engineering & Technology : 2020
[Project page] [DOI]
Improving positioning algorithm based on RSSI
Xinhui Ding Shi Dong(corresponding author),
Wireless Personal Communications:2020
[Project page] [DOI]
DDoS attack detection method based on improved KNN with the degree of DDoS attack in softwaredefined networks
Shi Dong, Mudar Sarem
IEEE Access: 2019, 8:5039-5048
[Project page] [DOI]
Energy-efficient scheme based on user task characteristic in virtual cloud platform
Shi Dong
Cluster Computing: 2020, 23(2):1125-1135
[Project page] [DOI]
Entropy-based outlier detection using spark
Guilan Feng, Shi Dong (Corresponding author),
Cluster Computing: 2020, 23(2):409-419
[Project page] [DOI]
A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments
Shi Dong, Khushnood Abbas
IEEE Access: 2019, 7:80813-80828,
[Project page] [Code coming soon] [DOI]
Traffic Identification Method Based on Multiple Probabilistic Neural Network Model
Shi Dong, Ruixuan Li
Neural Computing & Applications : 2019, 31(2):473-487
[Project page] [DOI]
Flow online identification method for the encrypted Skype
Shi Dong and Xiaopeng Zhang (Corresponding author)
Journal of Network and Computer Applications: 2019
Microblog sentiment analysis method based on spectral clustering
Shi Dong, Xingang Zhang, Ya Li
Journal of Information Processing Systems: 2018
A new routing algorithm based on opportunistic networks
Shi Dong Yingchun Qi
International Journal of Information and Communication Technology : 2017
Application of network link prediction in drug discovery
Khushnood Abbas, Alireza Abbasi, Shi Dong, Ling Niu, Laihang Yu, Bolun Chen, Shi-Min Cai, Qambar Hasan
BMC bioinformatics: 2021
Weber’s law based multi-level convolution correlation features for image retrieval
LaiHang Yu, NingZhong Liu, WenGang Zhou, Shi Dong, Yu Fan, Khushnood Abbas
Multimedia Tools and Applications: 2021
Feature Selection Algorithm Based on Correlation between Muti Metric Network Traffic Flow Features.
Yongfeng Cui, Shi Dong and Wei Liu
International Arab Journal of Information Technology: 2018
Research on efficient-efficient routing protocol for WSNs based on improved artificial bee colony algorithm
Huadong Wang, Ying Chen Shi Dong(Corresponding author)
IET Wireless Sensor Systems: 2017,7(1):15-20
A time-slice optimization based weak feature association algorithm for video condensation
Yongfeng Cui, Wei Liu, Shi Dong,
Multimedia Tools and Applications: 2016 ,75(24):17515-17530
Effective energy-based multi-view piecewise planar stereo
Yiran Wang, Wei Wang, Hai Zhu, Shi Dong(Corresponding Author),
Pattern Recognition and Image Analysis: 2016, 26(4):726-733
Adaptive fusion design using multiscale unscented Kalman filter approach for multisensor data fusion
Huadong Wang Shi Dong(Corresponding Author),
Mathematical Problems in Engineering: 2015
NSVM: A New SVM Algorithm Based on Traffic Flow Metric
Shi Dong, Wei Liu, Dingding Zhou, Yingchun Qi
Journal of Internet Technology: 2015, 14(7):542-550
Auto Adaptive Identification Algorithm Based on Network Traffic Flow
Shi Dong, Xingang Zhang, Dingding Zhou
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL: 2015, 9(6):672-685
Research on network traffic identification based on multi layer perceptron
Dingding Zhou, Wei Liu, Wengang Zhou, Shi Dong(Corresponding Author),
Telkomnika: 2014, 12(1):109-116
Flow cluster algorithm based on improved K-means method
Shi Dong, Dingding Zhou, Wei Ding, Jian Gong
IETE Journal of Research: 2013, 59(4):326-333
Research on network traffic identification based on improved BP neural network
Shi Dong, Dingding Zhou, Wengang Zhou, Wei Ding, Jian Gong
Appl. Math: 2013 ,7(1):389-398
Measure correlation analysis of network flow based on symmetric uncertainty
Shi Dong, Wei Ding, Liang Chen
KSII Transactions on Internet and Information Systems (TIIS) : 2012 ,6(6):1649-1667