Dongxian Shi

ORCID: 0000-0002-4507-4703
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Vehicular Ad Hoc Networks (VANETs)
  • Neural Networks and Applications
  • Autonomous Vehicle Technology and Safety
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Innovation Diffusion and Forecasting
  • Mining Techniques and Economics
  • Algorithms and Data Compression
  • IoT and GPS-based Vehicle Safety Systems
  • Peer-to-Peer Network Technologies
  • Cryptography and Data Security
  • Industrial Technology and Control Systems
  • Scientific Innovation and Industrial Efficiency
  • Vehicle License Plate Recognition
  • Molecular Communication and Nanonetworks
  • Context-Aware Activity Recognition Systems
  • Time Series Analysis and Forecasting
  • Stock Market Forecasting Methods
  • Collaboration in agile enterprises
  • Data Management and Algorithms
  • Security and Verification in Computing

Hangzhou Dianzi University
2021-2023

Institute of Economics
2021-2023

Zhejiang University of Technology
2009-2010

10.1007/s44443-025-00006-5 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2025-03-24

The Bitcoin system uses a fully replicated data storage mechanism in which each node keeps full copy of the blockchain. As number nodes increases and transactions get more complex, space are needed to store block data. scalability has become bottleneck, limiting practical application This paper proposes scheme, called RESS, integrate erasure coding technology into blockchain encode multiple blocks. Under proposed grouping method, can reduce times coded decoding. In addition, scheme based on...

10.23919/cje.2022.00.343 article EN Chinese Journal of Electronics 2023-05-01

In recent years, deep learning theories, such as Recurrent Neural Networks (RNN) and Convolutional (CNN), have been applied effective methods for intrusion detection in the vehicle CAN network. However, existing RNNs realize by establishing independent models each ID, which are unable to learn potential characteristics of different IDs well, relatively complicated model structure high calculation time cost. CNNs can achieve rapid normal attack ID sequences exhibit good performance, but...

10.1155/2021/1440259 article EN cc-by Mobile Information Systems 2021-09-23

The popularization of electronic devices and the enrichment external interfaces have increased attack surface automotive cyber-physical system (CPS). As a vital part CPS, controller area network (CAN) is more vulnerable to security threats due lack corresponding protection mechanisms. This kind problem has also attracted extensive attention from academia industry. Researchers proposed numerous intrusion detection models for in-vehicle CAN bus, solving some problems certain extent. However,...

10.1155/2022/7176194 article EN Wireless Communications and Mobile Computing 2022-08-12

In e-service environments, the delegation relationship is rarely considered as one of important factors trust models. Most work on focused permission delegatee, depth, constrain and so on. They ignored potential hazards brought from blind delegation, easily to form collusion attack. This paper defines concept trustworthiness firstly, then proposes a method for calculating based relationship. The enables involved delegator delegatee be responsible their actual behavior in process. delegate...

10.1109/icss.2010.56 article EN International Conference on Service Sciences 2010-01-01

Trust management is a common approach on access control in the distributed environment. RT one of frameworks for role-based trust management. However, has some faults, and main faults delegation control. To address this problem, paper proposes controllable authorization model supported by constraint. First, framework reasonable classification attributes are introduced. Second, to better spread permission, constraint source implemented formalization constraints described. Finally, usage...

10.1109/cyberc.2009.5342170 article EN 2009-10-01

This article will complex network theory is introduced to the world's leading technology innovation cooperation study, continue deepen theoretical by numerical simulation and empirical research on method of combining technical evolution mechanism its small world, scale-free characteristics were studied. First perfect modeling work decline period. Secondly, put forward strategy diffusion, namely random selection, target selection associated enterprises strategy, compares advantages...

10.25236/ijndes.19209 article EN International Journal of New Developments in Engineering and Society 2019-06-10
Coming Soon ...