
Heyuan Shi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j9]Heyuan Shi
, Runzhe Wang, Ying Fu, Yu Jiang
, Jian Dong
, Kun Tang, Jiaguang Sun:
Vulnerable Code Clone Detection for Operating System Through Correlation-Induced Learning. IEEE Trans. Ind. Informatics 15(12): 6551-6559 (2019) - [j8]Heyuan Shi
, Yubo Zhang, Zizhao Zhang
, Nan Ma
, Xibin Zhao, Yue Gao
, Jiaguang Sun:
Hypergraph-Induced Convolutional Networks for Visual Classification. IEEE Trans. Neural Networks Learn. Syst. 30(10): 2963-2972 (2019) - [c5]Yi Ye, Bo Xu, Li Ma, Jiayan Zhu, Heyuan Shi, Xiaohong Cai:
Research on treatment and medication rule of insomnia treated by TCM based on data mining. BIBM 2019: 2503-2508 - [c4]Heyuan Shi, Runzhe Wang, Ying Fu, Mingzhe Wang, Xiaohai Shi, Xun Jiao, Houbing Song, Yu Jiang, Jiaguang Sun:
Industry practice of coverage-guided enterprise Linux kernel fuzzing. ESEC/SIGSOFT FSE 2019: 986-995 - [c3]Ying Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, Xiang Shi:
EVMFuzzer: detect EVM vulnerabilities via fuzz testing. ESEC/SIGSOFT FSE 2019: 1110-1114 - [i1]Ying Fu, Meng Ren, Fuchen Ma, Yu Jiang, Heyuan Shi, Jiaguang Sun:
EVMFuzz: Differential Fuzz Testing of Ethereum Virtual Machine. CoRR abs/1903.08483 (2019) - 2018
- [j7]Chengbao Liu
, Jie Tan, Heyuan Shi, Xuelei Wang:
Lithium-Ion Cell Screening With Convolutional Neural Networks Based on Two-Step Time-Series Clustering and Hybrid Resampling for Imbalanced Data. IEEE Access 6: 59001-59014 (2018) - [j6]Kun Tang
, Ronghua Shi, Heyuan Shi, Md. Zakirul Alam Bhuiyan
, Entao Luo:
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting. Ad Hoc Networks 81: 174-182 (2018) - [j5]Heyuan Shi, Xibin Zhao, Hai Wan, Huihui Wang, Jian Dong, Kun Tang, Anfeng Liu:
Multi-model induced network for participatory-sensing-based classification tasks in intelligent and connected transportation systems. Comput. Networks 141: 157-165 (2018) - [j4]Kun Tang, Ronghua Shi, Jingchun Xi, Heyuan Shi, Wentai Lei:
Cooperative spectrum sharing in cognitive radio networks with energy accumulation: design and analysis. IET Commun. 12(15): 1788-1796 (2018) - [c2]Xibin Zhao, Nan Wang, Heyuan Shi, Hai Wan, Jin Huang, Yue Gao:
Hypergraph Learning With Cost Interval Optimization. AAAI 2018: 4522-4529 - [c1]Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Heyuan Shi, Jiaguang Sun:
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation. ESEC/SIGSOFT FSE 2018: 803-808 - 2017
- [j3]Heyuan Shi, Kun Tang, Chengbao Liu, Xiaoyu Song, Chao Hu, Jiaguang Sun:
Memetic-based schedule synthesis for communication on time-triggered embedded systems. Int. J. Distributed Sens. Networks 13(10) (2017) - [j2]Lei She, Xibin Zhao, Yu Chen, Heyuan Shi, Kang Wei:
轨道交通实时以太网交换机启动性能的分析与优化 (Analysis and Optimization of Boot-up Performance for Railway Real-time Ethernet Switch). 计算机科学 44(Z11): 276-280 (2017) - 2016
- [j1]Heyuan Shi, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks. Sensors 16(12): 2013 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-09-10 02:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint