1.Nan Xia, Li Ming, Shi Jin. Using altmetrics for assessing impact of highly-cited books in Chinese Book Citation Index. Scientometrics 122, 1651–1669 (2020).
2.Jin Shi, Peng Jin, Siyu Gu, Research on Credit Distribution of Cooperative Papers According to Authors’ rank. ACM TUR-C 2019: 156:1-156:7
3.Mingyue Zhang, Jin Shi, Jin Wang, and Chang Liu, “Analysis of Academic Evaluation Indicators Based on Citation Quality,” Journal of Information Processing Systems, vol. 14, no. 4, pp. 916~925, 2018.
4.Peng Yufang, Shi Jin, Marcelo Fantinato, Chen Jing. A Study on the Author Collaboration Network in big data. Information Systems Frontiers. 2017(19): 1329–1342. DOI 10.1007/s10796-017-9771-1.
5.Peng Yufang, Gu Dongxiao, Shi Jin. Mining the Potential Collaborative Relationships Based on the Author Keyword Coupling Analysis and Social Network Analysis, CLBib-ISSI2017, 2017(2004): 28-41.
6.Yan Zhang; Jin Shi; Tian Zhang; Xiangwei Liu; Zhuzhong Qian, Modeling and Checking for Cyber-Physical System Based on Hybrid Interface Automata, Pervasive and Mobile Computing, 2015(7):179-193
7.Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Yuhua Wang, Zhitao Guan. Correlating Processes for Automatic Memory Evidences Analysis, InfoCom 2015 workshop, 2015.4.
8.Wu Zhiang, Cao Jie, Zhu Guixiang, Yin Wenpeng, Cuzzocrea Alfredo, Shi Jin, Detecting Overlapping Communities in Poly-Relational Networks, World Wide Web Journal: Internet and Web Information Systems, 2015, 2(2):1-18.
9.Pu Han, Jin Shi, Xiaoyan Li, Dongbo Wang, Si Shen, Xinning Su, International collaboration in LIS: global trends and networks at the country and institution level, Scientometrics, 2014, 98(1):53-72.
10.Haicheng Tao, Zhiang Wu, Jin Shi, Jie Cao, Xiaofeng Yu, Overlapping Community Extraction: A Link Hypergraph Partitioning based Method, The 11th IEEE International Conference on Services Computing (SCC2014)
11.Yiheng Duan, Xiao Fu, Bin Luo, Ziqi Wang, Jin Shi, Detective: Automatically Identify and Analyze Malware, Processes in Forensic Scenarios via Dynamic-Link Libraries, Jun.2015
12.Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Qian Zhuzhong, Scenario-Based Behavioral Nonexistent onsistency Checking for Cyber-physical Systems, Innovative Mobile and Internet Services in Ubiquitous computing (IMIS 2014), July, 2014
13.Fu Xiao, Shi Jin, Xie Li, Layered intrusion scenario reconstruction method for automated evidence analysis, Journal of Software, 2011, 22(5):996-1008.
14.Hu, Guangwei, Shi, Jin, Pan, Wenwen, Wang Jie, A hierarchical model of e-government service capability: An empirical analysis, Government Information Quarterly, 2012, 29(4):564-572.
15.Shi Jin, Hu Guangwei, Lu Mingxin, Xie li. “Intrusion Alerts Correlation Based Assessment of Network Security” 2010 International Conference of Information Science and Management Engineering (ISME 2010), IEEE CS, 2010.8
16.Fu Xiao, Shi Jin, Xie Li. “A Novel Data Mining-Based Method for Alert Reduction and Analysis”, Journal of Networks. VOL. 5, NO. 1, JANUARY 2010.
17.LU Yin, SHI Jin, Xie Li. T-NATPT - A Novel Proposal for NAT-PT/IPSec Traversing,2008 International Conference on Anti-counterfeiting, Security, and Identification (ASID 2008), 2008.8.
18.SHI Jin, LU Yin, Xie Li. “Game Theory Based Optimization of Security Configuration”, Proceedings of the 2007 International Conference on Computational Intelligence and Security (CIS 2007),IEEE CS, 2007.12.