研究领域:人工智能与安全;机器视觉与智能计算;边缘计算与工业物联网。
科研项目:人作为主持人或主要研究者承担国家自然科学基金、国家863、陕西省自然科学基金、陕西省科技攻关及企业委托和科研项目20余项。
代表性的科研项目有:
| 项目名称 | 起止年月 | 项目来源 | 项目经费(万元) | 完成情况 | 本人角色 |
|---|---|---|---|---|---|
| 中小企业数字化智能管控平台AI软件 |
2024.12~2026.4 | 西安华西联创软件有限公司 | 75 | 在研 | 主持 |
| 变配电室智能监测软件优化升级 | 2022.9~2023.8 | 山东海瑞智慧数据科技有限公司 | 35 | ||
| 胜智云平台-西安交大边缘计算项目 | 2020.3~2021.1 | 联通数字科技有限公司 | 172 | 在研 | 主持 |
| 集团总部大数据机器学习与模型孵化平台 合同关键信息抽取系统 |
2019.7~2020.6 | 联通系统集成有限公司 | 30 | 结题 | 主持 |
| 用于脱发临床诊断的图像分割算法软件 | 2019.6~2020.1 | 陕西科迈绿洲信息技术有限公司 | 10 | 结题 | 主持 |
| 云计算环境下数据中心的power capping关键问题研究 | 2013.1~2016.12 | 国家自然基金面上项目 | 82 | 结题 | 参与 |
| 面向桌面环境的用户隐私数据安全问题研究 | 2014.1~2016.12 | 中央高校基本科研业务费专项资金项目 | 5 | 结题 | 主持 |
| 网络环境下软件老化模式及再生方法研究 | 2010.1~2013.12 | 国家自然基金重点项目 | 210 | 结题 | 参与 |
| 微内核集成框架虚拟化与性能优化平台参考实现 | 2009.1~2010.12 | 国家核高基重大专项——“国产中间件参考实现及平台”子课题 | 384 | 结题 | 参与 |
| 能量感知多核操作系统关键问题研究 | 2008.11~2009.12 | 微软亚洲研究院横向课题 | 5 | 结题 | 参与 |
| 面向水利的高性能计算研究 | 2008.3~ 2009.9 | IBM西安交大联合实验室项目 | 25 | 结题 | 参与 |
| 榆林市财政综合信息管理支撑平台 | 2007.9~2008.3 | 榆林市财政局 | 16 | 结题 | 主持 |
| 无线传感器网络节点的研究与实现 | 2007.1~2008.12 | 陕西省科技攻关 | 3 | 结题 | 主持 |
| 基于网络流量的SYN Flood攻击检测、跟踪及防御研究 | 2005.1~2006.12 | 陕西省自然科学基金 | 1.5 | 结题 | 主持 |
| 基于下一代互联网的DoS/DDoS防御关键技术研究 | 2005.11~2006.12 | 微软亚洲研究院 | 8 | 结题 | 参与 |
| 基于网络流量的DDoS安全防御体系于关键技术研究 | 2004.1~2007.12 | 国家自然科学基金面上项目 | 26 | 结题 | 参与 |
| 陕西省扶贫办公室电子政务系统 | 2003.9~2004.3 | 陕西省扶贫办公室 | 10 | 结题 | 参与 |
指导学生获得2023亚太数模竞赛研究生组三等奖、2024亚太数模竞赛研究生组二等奖、2024“华为杯”第二十一届中国研究生数学建模竞赛研究生组一等奖。
[1] Yang XY, Zeng M, Zhao R, Shi Y, A Novel LMS Method for Real-time Network Traffic Prediction, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, ISSN: 0302-9743, Volume 3046 / 2004, April 2004, Pages: 127 – 136, Computational Science and Its Applications - ICCSA 2004: International Conference
[2] Yang XY, Yang WJ, Zeng M, Shi Y, A Novel Network Traffic Analysis Method based on Fuzzy Association Rules, MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 3131: 81-91 2004
[3] Yang XY, Liu Y, Zeng M, Shi Y, A Novel DDoS attack Detecting Algorithm based on the Continuous Wavelet Transform, CONTENT COMPUTING, PROCEEDINGS LECTURE NOTES IN COMPUTER SCIENCE 3309: 173-181 2004
[4] Shi Y, Yang XY, A Novel Architecture for Detecting and Defending against Flooding-based DDoS Attacks[C/J]. International Conference on Computational Intelligence and Security (CIS) 2005, LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, 2005, 3802: 364-374
[5] Yang XY, Shi Y, A Novel Mechanism Based on Artificial Logical Spider Web for Rerouting in MPLS Networks, International Journal of Computational Intelligence and Applications (IJCIA), Volume 5, Number2, June 2005, Page:119-139
[6] Yang XY, Shi Y, Zeng M, Zhao R, A Novel Method of Network Burst Traffic Real-Time Prediction Based on Decomposition, ICN 2005, LNCS 3420, pp. 784–793, 2005
[7] Shi Y, Yang XY, Zhu HJ. A Flooding-based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction[C/J]. International Workshop on Security (IWSEC) 2006, LECTURE NOTES IN COMPUTER SCIENCE, 2006, 4266:252-267
[8] Shi Y, Yang XY, Li N, Qi Y. Deterministic Packet Marking with Link Signatures for IP Traceback[C/J]. SKLOIS Conference on Information Security and Cryptology (CISC) 2006. LECTURE NOTES IN COMPUTER SCIENCE, 2006, 4318:144-152
[9] Shi Y, Qi Y, Deterministic link signature based IP traceback algorithm under IPv6[C]. International Conference on Advanced Communication Technology (ICACT), 2008: 1010-1014
[10] 史椸,齐勇,一种基于子网保护的蠕虫传播模型及其应用 [J]. 西安交通大学学报. 2008,42(6):788-790
[11] Yang XY, Shi Y, Zhu HJ. Local Network Based Worm Detection Algorithm. Science in China Series E: Technological Sciences,2008, 38(12):2099-2111
[12] Yang Xin-yu, Wang Xiang-hua, Shi Yi, Du Jing, MPLS Router and Re-router Model Based on Artifical Spider. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY 2008, 30(7) :1619-1624
[13] Qiao Yanan, Qi Yong, Shi Yi, Hou Di, Wang Xiao, Weigh Matrix Based Solution Framework for Term Proximity Information Retrieval. COMPUTER SCIENCE, 2009, 36(7): 197-201
[14] LUO Yuan-Sheng, QI Yong, HOU Di, SHI Yi, CHEN Ying, SHEN Lin-Feng. Generalized Decision Logic Based and End-User Oriented Service Composition Formal Model. JOURNAL OF SOFTERWARE 2009, 20:138-143.
[15] 史椸,戴月华,任建宝,齐勇,多核平台应用程序能耗分析,计算机与数字工程,2010,38(8):38-41
[16] 戴月华,史椸,谢锋涛,冯雨声,齐勇,基于cc-NUMA多核处理器构架的虚拟机监控器原型设计与实现, 计算机与数字工程,2010,38(8):46-51
[17] 史椸,赵静,鲍军鹏,齐勇,林秦颖,基于方差聚类的时序数据野值识别算法,计算机应用,2012,32(s2): 22-25
[18] Yuehua Dai, Yi Shi, Yong Qi, Jianbao Ren Peijian Wang, Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture, Frontiers of Computer Science, 2013, 7(1): 34-43
[19] 史椸,邱劲锋,侯迪,齐勇,林秦颖,一种敏捷服务组合方法模型的研究与设计,西安交通大学学报,2013,47(2): 1-6。
[20] 史椸,耿晨,齐勇,一种具有容错机制的MapReduce模型研究与实现,西安交通大学学报,2014,48(2): 1-7
[21] Xiaoguang Wang, Yi Shi*, Yuehua Dai, Yong Qi, Jianbao Ren, Yu Xuan, TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud, Journal of Computers, 2014, 9(10) : 2303-2314
[22] 史椸,冯雨声,齐勇,多用户服务器程序自恢复系统,软件学报, 2015,26(8):1907-1924
[23] 任建宝,史椸,齐勇,戴月华,王晓光,宣宇,基于虚拟机监控器的隐私透明保护,软件学报,2015,26(8): 2124-2137
[24] Jianbao Ren, Yong Qi, Yuehua Dai, Xiaoguang Wang, Yi Shi, AppSec: A Safe Execution Environment for Security Sensitive Applications, International Conference on Virtual Execution Environment (VEE'15), 2015.3
[25] 谈博,蔡远利,史椸,采用变时域监督预测控制的机炉协调控制方法,西安交通大学学报,2016 , 50 (12) :92-98
[26] Jialu Guo, Yi Shi, Peng Liu, et al, Resting-state EEG Phase Synchronization Predicts Cognitive Control. International Behavioral Safety Management Conference, Xi’an, China, 2016: 66-71
[27] Jing Yang, Yi Shi, Haijun Rong, Random neural Q-learning for obstacle avoidance of a mobile robot in unknown environments, Advances in Mechanical Engineering, 2016 , 8 (7)
[28] Jianbao Ren, Yong Qi, Yuehua Dai,Xiaoguang Wang, Yi Shi,nOSV: ALightweight Nested-Virtualization VMM for Hosting High Performance Computing onCloud , Journal of Systems and Software , Vol. 124, Feb. 2017, Pages 137-152
[29] 史椸,买彩凤,黄晶晶,蔡远利.考虑滤波器性能的并网逆变器事件触发模型预测控制[A].第22届中国系统仿真技术及其应用学术年会(CCSSTA2021)[C],2021(会议优秀论文)
[30] Zhang Pengyuan, Shi Yi, Pedestrian attribute recognition in elevator, 2022 IEEE International Conference on Artificial Intelligence and Computer Applications, Dalian, China, 2022:59-63
[31] D. Li, Q. Yang, C. Li, D. An and Y. Shi, Bayesian-Based Inference Attack Method and Individual Differential Privacy-Based Auction Mechanism for Double Auction Market, IEEE Transactions on Automation Science and Engineering, April 2023, 20(2):950-968
[32] Xiao, X., Shi, Y., Chen, J. (2024). Towards Better Evaluations of Class Activation Mapping and Interpretability of CNNs. In: Luo, B., Cheng, L., Wu, ZG., Li, H., Li, C. (eds) Neural Information Processing. ICONIP 2023. Communications in Computer and Information Science, vol 1961. Springer, Singapore.
[33]Zhang J, Yang B, Zhao X, Shi Y. Correction Compensation and Adaptive Cost Aggregation for Deep Laparoscopic Stereo Matching. Applied Sciences. 2024; 14(14):6176. https://doi.org/10.3390/app14146176