Shi Jin

Shi Jin
  • Professor
  • Nanjing University

About

15
Publications
6,575
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
103
Citations
Introduction
Shi Jin currently works at the School of Information Management, Nanjing University. Shi does research in Computing in Social Science, Information Management and Computer Security and Reliability. Their most recent publication is 'Detecting overlapping communities in poly-relational networks'.
Current institution
Nanjing University

Publications

Publications (15)
Article
Full-text available
Risk assessment and categorization of terrorist attacks can assist enhance awareness of terrorism and give crucial information support for anti-terrorism efforts. This study utilizes quantitative approaches for the risk assessment and categorization of terrorist attacks. A total of 210,454 terrorist attacks that occurred worldwide from 1970 through...
Article
Author-editorial cooperation is an important form of scientific research cooperative relationship, which is divided into four types in this paper. We select top 10 Information Science & Library Science (IS&LS) journals as samples, and try to figure out whether and how the author-editorial cooperation affects the author’s publications and citation i...
Article
Full-text available
With the development of information technology, cloud computing technology has brought many conveniences to all aspects of work and life. With the continuous promotion, popularization and vigorous development of e-government and e-commerce, the number of documents in electronic form is getting larger and larger. Electronic document is an indispensa...
Chapter
With the electronic transformation of traditional paper media, the integration of government new media platforms, the establishment of various institutions on social, music, video, shopping and other websites, and the rise of We-Media, massive new media information resources come out. In order to solve the problem of organizing and managing such in...
Chapter
Evidence plays an extremely important role in legal proceedings, historical research, and diplomatic disputes. In recent years, more and more evidence data has been presented in the form of electronic data. Therefore, the extraction, organization, and validation of knowledge in electronic evidence also seem more and more important. In order to effe...
Article
Full-text available
With the rapid development of Internet technology, online academic communications are increasingly prevalent, the traditional ways of academic evaluation can’t comprehensively reflect the multi-dimensional impact of scientific publications, therefore altmetrics is widely concerned by scholars because of its objectivity, timeliness and openness. Bas...
Article
Full-text available
In order to obtain a deeper understanding of the collaboration status in the big data field, we investigated the author collaboration groups and the core author collaboration groups as well as the collaboration trends in big data by combining bibliometric analysis and social network analysis. A total of 4130 papers from 13,759 authors during the pe...
Conference Paper
Energy saving is a fundamental issue for clusters because huge energy consumption has profound impact on operating cost, system reliability and environment. Therefore, many techniques have been proposed to reduce energy consumption, among which, Dynamic Frequency and Voltage Scaling (DVFS) is recognized as an efficient technique. To save energy for...
Article
Cyber–Physical Systems (CPS) are hybrid, safety-critical systems. For finding safety or security hazard in the design phase, modeling for CPS and checking their properties become very important. We focus on the compatibility, i.e., two systems can work together, and behavioral nonexistent consistency, i.e., forbidden behaviors do not occur in a sys...
Article
Full-text available
Discovering communities can promote the understanding of the structure, function and evolution in various systems. Overlapping community detection in poly-relational networks has gained much more interests in recent years, due to the fact that poly-relational networks and communities with pervasive overlap are prevalent in the real world. A plethor...
Article
Real-world networks often contain communities with pervasive overlaps such that nodes simultaneously belong to several groups. Community extraction, emerging in recent years, is considered to be a promising solution for finding meaningful communities from social networks. In this paper, we explore overlapping community extraction from a link partit...
Article
System incentive and alternation of attacker's strategies are not taken into full consideration in current intrusion response research. An intrusion response model (intrusion response based on attack graph, IRAG) based on the attack graph is proposed to solve this problem. IRAG model deals well with the attack's intent and alternation of strategies...
Article
During the IPv6/v4 transition, we are faced with the challenge to ensure the security of interconnections between heterogeneous IP nodes or networks. Unfortunately, the IPSec can not be applied in NAT-PT environment due to the conflict lies between their intrinsic functionalities. In this paper, we propose a novel solution, namely T-NATPT, for ensu...

Network

Cited By