Personal information

Verified email addresses

Traffic Analysis, IoT Security, Intrusion Detection, Malware Detection, Artificial Intelligence
China

Activities

Employment (1)

Peng Cheng Laboratory: Shenzhen, Guangdong, CN

2020-06-15 to present | Assistant Professor
Employment
Source: Self-asserted source
Shuaishuai Tan

Education and qualifications (2)

Xidian University: Xi'an, Shannxi, CN

2011-08-01 to 2016-12-26
Education
Source: Self-asserted source
Shuaishuai Tan

Shandong University: Jinan, Shandong, CN

2007-09-11 to 2011-06-15
Education
Source: Self-asserted source
Shuaishuai Tan

Works (16)

A Multi-User Effective Computation Offloading Mechanism for MEC System: Batched Multi-Armed Bandits Approach

IEEE Transactions on Network and Service Management
2024 | Journal article
Contributors: Hangfan Li; Li Li; Shuaishuai Tan; Xiaoxiong Zhong; Sheng Zhang
Source: check_circle
Crossref

FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows

IEEE Network
2024 | Journal article
Contributors: Shuaishuai Tan; Daojing He; Sammy Chan; Mohsen Guizani
Source: check_circle
Crossref

The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers

IEEE Transactions on Dependable and Secure Computing
2024-07 | Journal article
Contributors: Zhiyi Tian; Lei Cui; Chenhan Zhang; Shuaishuai Tan; Shui Yu; Yonghong Tian
Source: check_circle
Crossref

You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted

IEEE Transactions on Dependable and Secure Computing
2024-05 | Journal article
Contributors: Shuaishuai Tan; Shui Yu; Wenyin Liu; Daojing He; Sammy Chan
Source: check_circle
Crossref

Hitting Moving Targets: Intelligent Prevention of IoT Intrusions on the Fly

IEEE Internet of Things Journal
2023 | Journal article
Contributors: Shuaishuai Tan; Wenyin Liu; Qingkuan Dong; Sammy Chan; Shui Yu; Xiaoxiong Zhong; Daojing He
Source: check_circle
Crossref

Trust Aware Opportunistic Data Transmission for Cognitive IoT: An Edge Learning Perspective

2022 | Journal article
Contributors: Li, Li; Tan, Shuaishuai; Lu, Renhao; Zhong, Xiaoxiong
Source: Self-asserted source
Shuaishuai Tan

Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS

IEEE Transactions on Network and Service Management
2022-09 | Journal article
Contributors: Shuaishuai Tan; Xiaoxiong Zhong; Zhiyi Tian; Qingkuan Dong
Source: check_circle
Crossref

A Novel Android Malware Detection Method Based on Visible User Interface

2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
2021 | Conference paper
Contributors: Tan, Shuaishuai; Tian, Zhiyi; Zhong, Xiaoxiong; Yu, Shui; Zhang, Weizhe; Dong, Guozhong
Source: Self-asserted source
Shuaishuai Tan

EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements

Security and Communication Networks
2021 | Journal article
Contributors: Dong, Guozhong; Zhang, Weizhe; Tan, Haowen; Yadav, Rahul; Tan, Shuaishuai
Source: Self-asserted source
Shuaishuai Tan
grade
Preferred source (of 2)‎

Network-based malware detection with a two-tier architecture for online incremental update

2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)
2020 | Conference paper
Contributors: Yan, Anli; Chen, Zhenxiang; Spolaor, Riccardo; Tan, Shuaishuai; Zhao, Chuan; Peng, Lizhi; Yang, Bo
Source: Self-asserted source
Shuaishuai Tan

A similarity-based indirect trust model with anti-spoofing capability

Security and Communication Networks
2016 | Journal article
Contributors: Tan, Shuaishuai; Liu, Yanming; Li, Xiaoping; Dong, Qingkuan
Source: Self-asserted source
Shuaishuai Tan

A trust management system for securing data plane of ad-hoc networks

IEEE Transactions on Vehicular Technology
2015 | Journal article
Contributors: Tan, Shuaishuai; Li, Xiaoping; Dong, Qingkuan
Source: Self-asserted source
Shuaishuai Tan

Trust based routing mechanism for securing OSLR-based MANET

Ad Hoc Networks
2015 | Journal article
Contributors: Tan, Shuaishuai; Li, Xiaoping; Dong, Qingkuan
Source: Self-asserted source
Shuaishuai Tan

TrustR: An integrated router security framework for protecting computer networks

IEEE Communications Letters
2015 | Journal article
Contributors: Tan, Shuaishuai; Li, Xiaoping; Dong, Qingkuan
Source: Self-asserted source
Shuaishuai Tan

A routing selection algorithm based on a multiattribute decisionfor the IPv6 mobile network

Journal of Harbin Engineering University
2014 | Journal article
Contributors: ZHAO, Lei; LI, Xiaoping; TAN, Shuaishuai; SHI, Lei
Source: Self-asserted source
Shuaishuai Tan

An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network

2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
2014 | Conference paper
Contributors: Tan, Shuaishuai; Li, Xiaoping; Dong, Qingkuan
Source: Self-asserted source
Shuaishuai Tan

Peer review (15 reviews for 7 publications/grants)

Review activity for ... IEEE Global Communications Conference. (3)
Review activity for EURASIP Journal on wireless communications and networking (3)
Review activity for IAES International Journal of Artificial Intelligence (1)
Review activity for IEEE access : (3)
Review activity for IEEE communications letters : (1)
Review activity for IEEE internet of things journal. (3)
Review activity for International Journal of Computing and Digital Systems. (1)