Leyi Shi

548 total citations
41 papers, 364 citations indexed

About

Leyi Shi is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Leyi Shi has authored 41 papers receiving a total of 364 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Computer Networks and Communications, 15 papers in Artificial Intelligence and 13 papers in Information Systems. Recurrent topics in Leyi Shi's work include Network Security and Intrusion Detection (23 papers), Mobile Agent-Based Network Management (7 papers) and Smart Grid Security and Resilience (6 papers). Leyi Shi is often cited by papers focused on Network Security and Intrusion Detection (23 papers), Mobile Agent-Based Network Management (7 papers) and Smart Grid Security and Resilience (6 papers). Leyi Shi collaborates with scholars based in China, Russia and United States. Leyi Shi's co-authors include Honglong Chen, Zhibo Wang, Kai Lin, Yang Li, Jiguo Yu, Yanjun Li, Feng Xia, Chunfu Jia, Na Yan and Xuxin Zhang and has published in prestigious journals such as IEEE Access, Sensors and Remote Sensing.

In The Last Decade

Leyi Shi

40 papers receiving 341 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Leyi Shi China 10 195 119 100 75 71 41 364
Abdulaziz Alhumam Saudi Arabia 13 199 1.0× 68 0.6× 167 1.7× 66 0.9× 50 0.7× 31 561
Kimmo Hätönen Finland 9 258 1.3× 132 1.1× 179 1.8× 121 1.6× 165 2.3× 30 512
Hongda Li China 12 253 1.3× 75 0.6× 195 1.9× 80 1.1× 31 0.4× 45 449
R. K. Pateriya India 11 205 1.1× 187 1.6× 189 1.9× 76 1.0× 41 0.6× 62 453
Dongsheng Yang China 10 223 1.1× 59 0.5× 162 1.6× 90 1.2× 24 0.3× 38 369
Mohammed I. Younis Iraq 12 103 0.5× 135 1.1× 41 0.4× 26 0.3× 51 0.7× 57 429
Mustapha Hedabou Morocco 12 236 1.2× 228 1.9× 200 2.0× 57 0.8× 102 1.4× 40 554
M A Rajan India 11 353 1.8× 236 2.0× 137 1.4× 89 1.2× 81 1.1× 25 525
Ismael Ripoll Spain 19 437 2.2× 114 1.0× 148 1.5× 89 1.2× 61 0.9× 59 940
Ayaz Ali Khan Pakistan 15 345 1.8× 245 2.1× 95 0.9× 64 0.9× 63 0.9× 27 498

Countries citing papers authored by Leyi Shi

Since Specialization
Citations

This map shows the geographic impact of Leyi Shi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Leyi Shi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Leyi Shi more than expected).

Fields of papers citing papers by Leyi Shi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Leyi Shi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Leyi Shi. The network helps show where Leyi Shi may publish in the future.

Co-authorship network of co-authors of Leyi Shi

This figure shows the co-authorship network connecting the top 25 collaborators of Leyi Shi. A scholar is included among the top collaborators of Leyi Shi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Leyi Shi. Leyi Shi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shu, Feng, Lin Gao, & Leyi Shi. (2025). CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation. Applied Sciences. 15(5). 2416–2416. 3 indexed citations
2.
Shi, Leyi, et al.. (2024). Game analysis and decision making optimization of evolutionary dynamic honeypot. Computers & Electrical Engineering. 119. 109534–109534. 3 indexed citations
3.
Shi, Leyi, et al.. (2024). CMTD:A fast Moving Target Defense Scheme based on CFL Authentication. IEEE Internet of Things Journal. 1–1. 1 indexed citations
4.
Li, Zhe, Honglong Chen, Kai Lin, et al.. (2021). From edge data to recommendation: A double attention-based deformable convolutional network. Peer-to-Peer Networking and Applications. 14(6). 3984–3997. 8 indexed citations
5.
Li, Tiehan, Shanshan Xu, Yujie Wang, et al.. (2021). Quality chemical analysis of crush tear curl (CTC) black tea from different geographical regions based on UHPLC‐Orbitrap‐MS. Journal of Food Science. 86(9). 3909–3925. 27 indexed citations
6.
Chen, Honglong, et al.. (2020). Trust‐aware generative adversarial network with recurrent neural network for recommender systems. International Journal of Intelligent Systems. 36(2). 778–795. 27 indexed citations
7.
Chen, Honglong, et al.. (2020). Double Attention-based Deformable Convolutional Network for Recommendation. 1051–1056. 2 indexed citations
8.
Shi, Leyi, Yuxiao Song, Zhiyu Xue, Yihao Liu, & Honglong Chen. (2020). SACT: A New Model of Covert Communication Based on SDN. Sensors. 20(24). 7300–7300. 1 indexed citations
9.
Shi, Leyi, et al.. (2019). Latest Research Progress of Honeypot Technology. 电子与信息学报. 41(2). 498–508. 4 indexed citations
10.
Shi, Leyi, et al.. (2019). A Game-Theoretic Analysis for Distributed Honeypots. Future Internet. 11(3). 65–65. 10 indexed citations
11.
Zhang, Xuxin, Honglong Chen, Kai Lin, et al.. (2019). RMTS: A robust clock synchronization scheme for wireless sensor networks. Journal of Network and Computer Applications. 135. 1–10. 29 indexed citations
12.
Shi, Leyi, Hongqiang Zhu, Yihao Liu, & Jia Liu. (2019). Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM. 56(11). 2330. 8 indexed citations
13.
Chen, Honglong, et al.. (2016). Efficient 3-dimensional localization for RFID systems using jumping probe. Pervasive and Mobile Computing. 41. 300–318. 7 indexed citations
14.
Shi, Leyi, et al.. (2014). An ACO-Based Trust Inference Algorithm. 7. 216–220. 1 indexed citations
15.
Shi, Leyi, et al.. (2014). Game Theoretic Analysis for the Feature of Mimicry Honeypot. JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY. 35(5). 1063–1068. 5 indexed citations
16.
Shi, Leyi. (2012). Improvement of distributed timestamp synchronization. Journal of Communications. 6 indexed citations
17.
Shi, Leyi, et al.. (2012). A Game Theoretic Analysis for the Honeypot Deceptive Mechanism. JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY. 34(6). 1420–1424. 3 indexed citations
18.
Shi, Leyi. (2008). Research on end hopping for active network confrontation. Journal of Communications. 16 indexed citations
19.
Shi, Leyi, et al.. (2007). DoS Evading Mechanism upon Service Hopping. 119–122. 6 indexed citations
20.
Shi, Leyi, et al.. (2007). DoS Evading Mechanism upon Service Hopping. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026