[1] Yang XY, Zeng M, Zhao R, Shi Y, A Novel LMS Method for Real-time Network Traffic Prediction, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, ISSN: 0302-9743, Volume 3046 / 2004, April 2004, Pages: 127 – 136, Computational Science and Its Applications - ICCSA 2004: International Conference
[2] Yang XY, Yang WJ, Zeng M, Shi Y, A Novel Network Traffic Analysis Method based on Fuzzy Association Rules, MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS LECTURE NOTES IN ARTIFICIAL INTELLIGENCE 3131: 81-91 2004
[3] Yang XY, Liu Y, Zeng M, Shi Y, A Novel DDoS attack Detecting Algorithm based on the Continuous Wavelet Transform, CONTENT COMPUTING, PROCEEDINGS LECTURE NOTES IN COMPUTER SCIENCE 3309: 173-181 2004
[4] Shi Y, Yang XY, A Novel Architecture for Detecting and Defending against Flooding-based DDoS Attacks[C/J]. International Conference on Computational Intelligence and Security (CIS) 2005, LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, 2005, 3802: 364-374
[5] Yang XY, Shi Y, A Novel Mechanism Based on Artificial Logical Spider Web for Rerouting in MPLS Networks, International Journal of Computational Intelligence and Applications (IJCIA), Volume 5, Number2, June 2005, Page:119-139
[6] Yang XY, Shi Y, Zeng M, Zhao R, A Novel Method of Network Burst Traffic Real-Time Prediction Based on Decomposition, ICN 2005, LNCS 3420, pp. 784–793, 2005
[7] Shi Y, Yang XY, Zhu HJ. A Flooding-based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction[C/J]. International Workshop on Security (IWSEC) 2006, LECTURE NOTES IN COMPUTER SCIENCE, 2006, 4266:252-267
[8] Shi Y, Yang XY, Li N, Qi Y. Deterministic Packet Marking with Link Signatures for IP Traceback[C/J]. SKLOIS Conference on Information Security and Cryptology (CISC) 2006. LECTURE NOTES IN COMPUTER SCIENCE, 2006, 4318:144-152
[9] Shi Y, Qi Y, Deterministic link signature based IP traceback algorithm under IPv6[C]. International Conference on Advanced Communication Technology (ICACT), 2008: 1010-1014
[10] 史椸,齐勇,一种基于子网保护的蠕虫传播模型及其应用 [J]. 西安交通大学学报. 2008,42(6):788-790
[11] Yang XY, Shi Y, Zhu HJ. Local Network Based Worm Detection Algorithm. Science in China Series E: Technological Sciences,2008, 38(12):2099-2111
[12] Yang Xin-yu, Wang Xiang-hua, Shi Yi, Du Jing, MPLS Router and Re-router Model Based on Artifical Spider. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY 2008, 30(7) :1619-1624
[13] Qiao Yanan, Qi Yong, Shi Yi, Hou Di, Wang Xiao, Weigh Matrix Based Solution Framework for Term Proximity Information Retrieval. COMPUTER SCIENCE, 2009, 36(7): 197-201
[14] LUO Yuan-Sheng, QI Yong, HOU Di, SHI Yi, CHEN Ying, SHEN Lin-Feng. Generalized Decision Logic Based and End-User Oriented Service Composition Formal Model. JOURNAL OF SOFTERWARE 2009, 20:138-143.
[15] 史椸,戴月华,任建宝,齐勇,多核平台应用程序能耗分析,计算机与数字工程,2010,38(8):38-41
[16] 戴月华,史椸,谢锋涛,冯雨声,齐勇,基于cc-NUMA多核处理器构架的虚拟机监控器原型设计与实现, 计算机与数字工程,2010,38(8):46-51
[17] 史椸,赵静,鲍军鹏,齐勇,林秦颖,基于方差聚类的时序数据野值识别算法,计算机应用,2012,32(s2): 22-25
[18] Yuehua Dai, Yi Shi, Yong Qi, Jianbao Ren Peijian Wang, Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture, Frontiers of Computer Science, 2013, 7(1): 34-43
[19] 史椸,邱劲锋,侯迪,齐勇,林秦颖,一种敏捷服务组合方法模型的研究与设计,西安交通大学学报,2013,47(2): 1-6。
[20] 史椸,耿晨,齐勇,一种具有容错机制的MapReduce模型研究与实现,西安交通大学学报,2014,48(2): 1-7
[21] Xiaoguang Wang, Yi Shi*, Yuehua Dai, Yong Qi, Jianbao Ren, Yu Xuan, TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud, Journal of Computers, 2014, 9(10) : 2303-2314
[22] 史椸,冯雨声,齐勇,多用户服务器程序自恢复系统,软件学报, 2015,26(8):1907-1924
[23] 任建宝,史椸,齐勇,戴月华,王晓光,宣宇,基于虚拟机监控器的隐私透明保护,软件学报,2015,26(8): 2124-2137
[24] Jianbao Ren, Yong Qi, Yuehua Dai, Xiaoguang Wang, Yi Shi, AppSec: A Safe Execution Environment for Security Sensitive Applications, International Conference on Virtual Execution Environment (VEE'15), 2015.3
[25] 谈博,蔡远利,史椸,采用变时域监督预测控制的机炉协调控制方法,西安交通大学学报,2016 , 50 (12) :92-98
[26] Jialu Guo, Yi Shi, Peng Liu, et al, Resting-state EEG Phase Synchronization Predicts Cognitive Control. International Behavioral Safety Management Conference, Xi’an, China, 2016: 66-71
[27] Jing Yang, Yi Shi, Haijun Rong, Random neural Q-learning for obstacle avoidance of a mobile robot in unknown environments, Advances in Mechanical Engineering, 2016 , 8 (7)
[28] Jianbao Ren, Yong Qi, Yuehua Dai,Xiaoguang Wang, Yi Shi,nOSV: ALightweight Nested-Virtualization VMM for Hosting High Performance Computing onCloud , Journal of Systems and Software , Vol. 124, Feb. 2017, Pages 137-152
[29] 史椸,买彩凤,黄晶晶,蔡远利.考虑滤波器性能的并网逆变器事件触发模型预测控制[A].第22届中国系统仿真技术及其应用学术年会(CCSSTA2021)[C],2021(会议优秀论文)
[30] Zhang Pengyuan, Shi Yi, Pedestrian attribute recognition in elevator, 2022 IEEE International Conference on Artificial Intelligence and Computer Applications, Dalian, China, 2022:59-63
[31] D. Li, Q. Yang, C. Li, D. An and Y. Shi, Bayesian-Based Inference Attack Method and Individual Differential Privacy-Based Auction Mechanism for Double Auction Market, IEEE Transactions on Automation Science and Engineering, April 2023, 20(2):950-968