A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks

Jing He , Shouling Ji , Raheem Beyah , Yingshu Li
global communications conference 261 -266

2
2013
Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks

Zhipeng Cai , Shouling Ji , Jing He , A. G. Bourgeois
2012 IEEE 32nd International Conference on Distributed Computing Systems 245 -254

58
2012
H-Sim: A Concurrent Discrete-event Driven Sensor Network Simulation Platform

Jinbao Li , Di Xue , Shouling Ji , Hui Xu
international symposium on information science and engineering 2 375 -378

2008
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks

Shouling Ji , Raheem Beyah , Zhipeng Cai
IEEE Transactions on Mobile Computing 13 ( 3) 626 -637

59
2014
Towards Robust Reasoning over Knowledge Graphs

Xi , Zhaohan and Pang , Ren and Li , Changjiang and Ji
arXiv preprint arXiv:2110.14693

2021
Study on Channel Assignment Algorithm in Multi-Radio Sensor Networks

Shou Ling Ji , Jin Bao Li , Long Jiang Guo , Li Hui
Acta Electronica Sinica

2010
Adversarial example generation based on particle swarm optimization

Yaguan QIAN , Hongbo LU , Shouling JI , Wujie ZHOU
电子与信息学报 41 ( 7) 1658 -1665

7
2019
在线社交网络中的虚假流量服务挖掘

Ping HE , Xuhong ZHANG , Changting LIN , Ting WANG
Frontiers 25 ( 3) 415 -431

2024
Evaluating the security of anonymized big graph/structural data

Shouling Ji
Georgia Institute of Technology

2
2016
SmartSeed: Smart Seed Generation for Efficient Fuzzing.

Shouling Ji , Pan Zhou , Jing Chen , Jianhai Chen
arXiv: Cryptography and Security

32
2018
Adversarial CAPTCHAs

Kai Bu , Ting Wang , Shouling Ji , Raheem Beyah
arXiv: Cryptography and Security

42
2019
V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing.

Chunming Wu , Shouling Ji , Jianhai Chen , Qinchen Gu
arXiv: Cryptography and Security

53
2019
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study

Chunming Wu , Shouling Ji , Meng Han , Yushan Liu
arXiv: Computer Vision and Pattern Recognition

32
2019
Model-Reuse Attacks on Deep Learning Systems

Xiapu Luo , Ting Wang , Shouling Ji , Yujie Ji
arXiv: Cryptography and Security

135
2018