近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
1. 郑杨,石进,司徒凌云,李明.智能目录构建与发展研究[J].图书馆学研究,2021 (17) : 47-56.
2. 李梦婷,石进,李明.国家科技竞争情报态势感知研究.情报杂志, 2021,40 (09): 52-57.
3. 王曼,卢明欣,石进,杨海杰.基于ECT理论和FLOW理论的视频网站用户粘性影响因素研究——以哔哩哔哩为例.情报工程,2021,7(01):80-92.
4. 郑杨,石进.学者智能目录体系构建研究. 现代情报,2021,41(02):42-54.
5. 石进,赵小柯,刘千里.面向国家安全的情报支持路径.情报学报, 2020, 39(07): 675-686.
6. 石进,张天娇.基于工业互联网的竞争情报系统研究.现代情报,2020,40(02):18-25.
7. 石进,李益婷.平行竞争情报态势感知系统研究.西南民族大学学报(人文社科版), 2020, 41(02):234-240
8. 胡雅萍,石进,董尹.决策失误防范中的情报介入影响因素实证分析.图书情报工作,2020,64(06):69-78.
9. 石进,韩进,赵小柯,刘千里.基于语境概念核心词提取算法研究.情报学报, 2019, 38(11): 1177-1186.
10. 石进,苗杰,李明.面向预印本系统的自组织同行评议及激励机制研究.现代情报,2019, 39(12):88-100.
11. 石进,苗杰.情报博弈理论研究.情报杂志,2019, 38(12):27-34+156
12. 石进,薛四新,赵小柯. 基于区块链技术的电子文件真实性保障系统模型研究.图书情报知识, 2019(06):111-119.
13. 赵小柯,石进.Rec-chain:基于区块链技术的国际期刊论文出版系统概念验证与测试[J].南京信息工程大学学报(自然科学版),2019,11(05):559-566.
14. 张磊波,赵小柯,石进.强化工业大数据中的安全保密.保密工作,2019(10):57-58.
15. 石进,邵波,苗杰. 基于区块链的中小企业竞争情报共享平台研究,图书情报工作,2019 63 (20): 112-120.
16. 石进,李益婷,胡雅萍.基于边缘计算的竞争情报系统研究.情报科学,2019, 37(10):34-39.
17. 石进,胡雅萍,李益婷.大数据时代目录学的新使命.图书馆学研究,2019(06):49-55.
18. 石进,李益婷,刘千里.企业竞争情报态势感知系统研究.情报杂志,2019,38(04):43-51.
19. 石进,苗杰,刘千里.平行竞争情报系统研究.情报科学,2019,37(03):27-31.
20. 刘凯乐,石进.聚焦IPv6发展新篇章.保密工作,2019(08):63-64.
21. 石进,南霞,刘千里.基于总线结构的政务数据共享应用模型研究. 现代情报, 2019, 39(06): 113-121.
22. 胡雅萍,石进.三维向度中面向安全与发展的情报学学科基础与理论溯源[J].情报杂志,2019,38(06):1-6.
23. 李明,李江,陈铭,石进*.中文学术图书引文量与Altmetrics指标探索性分析及其启示.情报学报,2019,38(06):557-567 (通讯作者)
24. 李明,柯青,石进,朱婷婷.学术期刊作者机构指数AAI排名实证探索——以中文高等教育学期刊为例[J].西南民族大学学报(人文社科版),2019,40(09):236-240.
25. 石进. 基于云计算的竞争情报系统研究[J]. 情报杂志, 2013, 32(7): 28-32.
26. 石进,胡广伟. 企业竞争情报系统建设中的舆情监控研究, 图书情报工作, 2012.12.
27. 宋继伟; 石进*; 吕美香; 牛青; 陈彬; 秦宝宝; 董尹. 信息情报化的关键——构建CIS分析模块的思考, 图书情报工作, 2012.12. (CCSCI,通讯作者)
28. 伏晓, 石进, 谢立, 用于自动证据分析的层次化入侵场景重构方法, 软件学报, 2011, (05):996-1008
29. 石进,郭山清,陆音,谢立. “一种基于攻击图的入侵响应方法”,软件学报,2008.10.
30. 石进,陆音,谢立.“基于博弈理论的动态入侵响应”,计算机研究与发展,2008.5.
31. 陆音,石进,谢立.“基于重复博弈的无线自组网络协作增强模型”,软件学报,2008.3.
Engilsh:
1.Tianjiao Zhang, Jin Shi, Lingyun Situ, The correlation between author-editorial cooperation and the author’s publications in journals, Journal of Informetrics, Vol. 15, No. 1,2021,
2.Nan Xia, Li Ming, Shi Jin. Using altmetrics for assessing impact of highly-cited books in Chinese Book Citation Index. Scientometrics 122, 1651–1669 (2020).
3.Jin Shi, Peng Jin, Siyu Gu, Research on Credit Distribution of Cooperative Papers According to Authors’ rank. ACM TUR-C 2019: 156:1-156:7
4.Mingyue Zhang, Jin Shi, Jin Wang, and Chang Liu, “Analysis of Academic Evaluation Indicators Based on Citation Quality,” Journal of Information Processing Systems, vol. 14, no. 4, pp. 916~925, 2018.
5.Peng Yufang, Shi Jin, Marcelo Fantinato, Chen Jing. A Study on the Author Collaboration Network in big data. Information Systems Frontiers. 2017(19): 1329–1342. DOI 10.1007/s10796-017-9771-1.
6.Peng Yufang, Gu Dongxiao, Shi Jin. Mining the Potential Collaborative Relationships Based on the Author Keyword Coupling Analysis and Social Network Analysis, CLBib-ISSI2017, 2017(2004): 28-41.
7.Yan Zhang; Jin Shi; Tian Zhang; Xiangwei Liu; Zhuzhong Qian, Modeling and Checking for Cyber-Physical System Based on Hybrid Interface Automata, Pervasive and Mobile Computing, 2015(7):179-193
8.Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Yuhua Wang, Zhitao Guan. Correlating Processes for Automatic Memory Evidences Analysis, InfoCom 2015 workshop, 2015.4.
9.Wu Zhiang, Cao Jie, Zhu Guixiang, Yin Wenpeng, Cuzzocrea Alfredo, Shi Jin, Detecting Overlapping Communities in Poly-Relational Networks, World Wide Web Journal: Internet and Web Information Systems, 2015, 2(2):1-18.
10.Pu Han, Jin Shi, Xiaoyan Li, Dongbo Wang, Si Shen, Xinning Su, International collaboration in LIS: global trends and networks at the country and institution level, Scientometrics, 2014, 98(1):53-72.
11.Haicheng Tao, Zhiang Wu, Jin Shi, Jie Cao, Xiaofeng Yu, Overlapping Community Extraction: A Link Hypergraph Partitioning based Method, The 11th IEEE International Conference on Services Computing (SCC2014)
12.Yiheng Duan, Xiao Fu, Bin Luo, Ziqi Wang, Jin Shi, Detective: Automatically Identify and Analyze Malware, Processes in Forensic Scenarios via Dynamic-Link Libraries, Jun.2015
13.Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Qian Zhuzhong, Scenario-Based Behavioral Nonexistent onsistency Checking for Cyber-physical Systems, Innovative Mobile and Internet Services in Ubiquitous computing (IMIS 2014), July, 2014
14.Fu Xiao, Shi Jin, Xie Li, Layered intrusion scenario reconstruction method for automated evidence analysis, Journal of Software, 2011, 22(5):996-1008.
15.Hu, Guangwei, Shi, Jin, Pan, Wenwen, Wang Jie, A hierarchical model of e-government service capability: An empirical analysis, Government Information Quarterly, 2012, 29(4):564-572.
16.Shi Jin, Hu Guangwei, Lu Mingxin, Xie li. “Intrusion Alerts Correlation Based Assessment of Network Security” 2010 International Conference of Information Science and Management Engineering (ISME 2010), IEEE CS, 2010.8
17.Fu Xiao, Shi Jin, Xie Li. “A Novel Data Mining-Based Method for Alert Reduction and Analysis”, Journal of Networks. VOL. 5, NO. 1, JANUARY 2010.
18.LU Yin, SHI Jin, Xie Li. T-NATPT - A Novel Proposal for NAT-PT/IPSec Traversing,2008 International Conference on Anti-counterfeiting, Security, and Identification (ASID 2008), 2008.8.
19.SHI Jin, LU Yin, Xie Li. “Game Theory Based Optimization of Security Configuration”, Proceedings of the 2007 International Conference on Computational Intelligence and Security (CIS 2007),IEEE CS, 2007.12.