default search action
Jie Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jie Shi 0001 — Arizona State University, School of Computing, Informatics, and Decision Systems Engineering, Tempe, AZ, USA
- Jie Shi 0002 — University of California, Riverside, Department of Electrical and Computer Engineering, CA, USA
- Jie Shi 0003 — Nanjing University of Science and Technology, School of Electronic Engineering and Optoelectronic Technology, Zijin College, China
- Jie Shi 0004 — University of Science and Technology Beijing, Design and Research Institute Company Ltd, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Hao Dong, Jie Shi, Jiale Linghu:
Higher-order multi-scale computational approach and its convergence for nonlocal gradient elasticity problems of composite materials. Comput. Math. Appl. 163: 66-83 (2024) - [j41]Wenwei He, Junyan Xu, Jie Shi, Hong Zhao:
ECS-SC: Long-tailed classification via data augmentation based on easily confused sample selection and combination. Expert Syst. Appl. 246: 123138 (2024) - [j40]Yang Zhang, Jie Shi, Hong Zhao:
DMTFS-FO: Dynamic multi-task feature selection based on flexible loss and orthogonal constraint. Expert Syst. Appl. 255: 124588 (2024) - [j39]Eloy Reulen, Jie Shi, Siamak Mehrkanoon:
GA-SmaAt-GNet: Generative adversarial small attention GNet for extreme precipitation nowcasting. Knowl. Based Syst. 305: 112612 (2024) - [j38]Chunzheng Kong, Yibo Zhang, Jie Shi, Xianqing Lv:
Oceanic Mesoscale Eddy Fitting Using Legendre Polynomial Surface Fitting Model Based on Along-Track Sea Level Anomaly Data. Remote. Sens. 16(15): 2799 (2024) - [j37]Jie Shi, Qiupeng Liu, Chunlei Shi, Mingming Lv, Wenli Pang:
Intuitionistic Fuzzy Sequential Three-Way Decision Model in Incomplete Information Systems. Symmetry 16(9): 1244 (2024) - [j36]Shiqiu Meng, Jie Shi, Bin Hu:
Computational Aids on Mental Health: Revolutionizing Care in the Digital Age. IEEE Trans. Comput. Soc. Syst. 11(5): 5559-5576 (2024) - [j35]Jie Wang, Guoqiang Li, Jie Shi, Jinwen Xi:
Weighted Guided Optional Fusion Network for RGB-T Salient Object Detection. ACM Trans. Multim. Comput. Commun. Appl. 20(5): 136:1-136:20 (2024) - [c48]Haixia Han, Jiaqing Liang, Jie Shi, Qianyu He, Yanghua Xiao:
Small Language Model Can Self-Correct. AAAI 2024: 18162-18170 - [c47]Li Wang, Jiaqi Li, Yuhao Luo, Jiahao Zheng, Lei Wang, Hao Li, Ke Xu, Chengfang Fang, Jie Shi, Zhizheng Wu:
ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification. ICASSP 2024: 4555-4559 - [c46]Xiaolei Chen, Jie Shi, Jia Chen, Peng Wang, Wei Wang:
High-precision Online Log Parsing with Large Language Models. ICSE Companion 2024: 354-355 - [c45]Xiangshan Gao, Jialuo Chen, Jingyi Wang, Jie Shi, Peng Cheng, Jiming Chen:
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development. ISSTA 2024: 1479-1490 - [c44]Bing Sun, Jun Sun, Wayne Koh, Jie Shi:
Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach. USENIX Security Symposium 2024 - [i23]Haixia Han, Jiaqing Liang, Jie Shi, Qianyu He, Yanghua Xiao:
Small Language Model Can Self-correct. CoRR abs/2401.07301 (2024) - [i22]Haokun Zhao, Haixia Han, Jie Shi, Chengyu Du, Jiaqing Liang, Yanghua Xiao:
Large Language Model Can Continue Evolving From Mistakes. CoRR abs/2404.08707 (2024) - [i21]Haixia Han, Tingyun Li, Shisong Chen, Jie Shi, Chengyu Du, Yanghua Xiao, Jiaqing Liang, Xin Lin:
Enhancing Confidence Expression in Large Language Models Through Learning from Past Experience. CoRR abs/2404.10315 (2024) - [i20]Mengjia Niu, Hao Li, Jie Shi, Hamed Haddadi, Fan Mo:
Mitigating Hallucinations in Large Language Models via Self-Refinement-Enhanced Knowledge Retrieval. CoRR abs/2405.06545 (2024) - [i19]Xiao Li, Wenxuan Sun, Huanran Chen, Qiongxiu Li, Yining Liu, Yingzhe He, Jie Shi, Xiaolin Hu:
ADBM: Adversarial diffusion bridge model for reliable adversarial purification. CoRR abs/2408.00315 (2024) - [i18]Peizhuo Liu, Li Wang, Renqiang He, Haorui He, Lei Wang, Huadi Zheng, Jie Shi, Tong Xiao, Zhizheng Wu:
SpMis: An Investigation of Synthetic Spoken Misinformation Detection. CoRR abs/2409.11308 (2024) - [i17]Qiongxiu Li, Lixia Luo, Agnese Gini, Changlong Ji, Zhanhao Hu, Xiao Li, Chengfang Fang, Jie Shi, Xiaolin Hu:
Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem. CoRR abs/2409.14260 (2024) - 2023
- [j34]Jie Shi, Zhengyu Li, Hong Zhao:
Feature selection via maximizing inter-class independence and minimizing intra-class redundancy for hierarchical classification. Inf. Sci. 626: 1-18 (2023) - [j33]Jie Shi, Hong Zhao:
FS-MGKC: Feature selection based on structural manifold learning with multi-granularity knowledge coordination. Inf. Sci. 648: 119555 (2023) - [j32]Ding Zhi, Lihua Xie, Yong Xia, Jie Shi:
Cigarette Production Line Flow Automatic Control System Based on PLC Technology and Embedded Software. Scalable Comput. Pract. Exp. 24(4): 1185-1190 (2023) - [j31]Feng Chen, Ke Ma, Yapeng Mao, Desen Yang, Yi Zhang, Jie Shi, Shiqi Mo, Chenyang Gui, Song Li:
A Novel Method to Design Steerable Differential Beamformer Using Linear Acoustics Vector Sensor Array. IEEE ACM Trans. Audio Speech Lang. Process. 31: 2836-2849 (2023) - [j30]Jie Shi, Xiaohu Fang, Changning Wei, Tao Lin, Luyu Zhao, Kwok-Keung Michael Cheng:
Design of a Highly Efficient Class-F GaN MMIC Power Amplifier Using a Multi-Function Bias Network and a Harmonic-Isolation L-C Resonator. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5208-5219 (2023) - [j29]Jie Shi, Xiaohu Fang, Hao Yu, Jiangwei Sui, Kwok-Keung Michael Cheng:
Novel Wideband Millimeter-Wave GaN Power Amplifier Design Using Transistors With Large Drain Capacitance and High Optimum Load Impedance. IEEE Trans. Circuits Syst. II Express Briefs 70(12): 4309-4313 (2023) - [j28]Qingqing Ye, Haibo Hu, Xiaofeng Meng, Huadi Zheng, Kai Huang, Chengfang Fang, Jie Shi:
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy. IEEE Trans. Dependable Secur. Comput. 20(1): 17-35 (2023) - [j27]Rixuan Qiu, Jiawen Bao, Yuancheng Li, Xin Zhou, Liang Liang, Hui Tian, Yanting Zeng, Jie Shi:
Virtual network function deployment algorithm based on graph convolution deep reinforcement learning. J. Supercomput. 79(6): 6849-6870 (2023) - [c43]Zijun Lin, Ke Xu, Chengfang Fang, Huadi Zheng, Aneez Ahmed Jaheezuddin, Jie Shi:
QUDA: Query-Limited Data-Free Model Extraction. AsiaCCS 2023: 913-924 - [c42]Zhenxing Hu, Shengjie Guan, Wenbo Xu, Zhen Xiao, Jie Shi, Pengze Li, Qiuyu Ding, Hui Ding, Chao Zeng:
A Data Flow Framework with High Throughput and Low Latency for Permissioned Blockchains. ICDCS 2023: 1-12 - [c41]Rong Du, Qingqing Ye, Yue Fu, Haibo Hu, Jin Li, Chengfang Fang, Jie Shi:
Differential Aggregation against General Colluding Attackers. ICDE 2023: 2180-2193 - [c40]Mengao Zhang, Ke Xu, Hao Li, Lei Wang, Chengfang Fang, Jie Shi:
DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures. INTERSPEECH 2023: 4014-4018 - [c39]Jie Shi, Sihang Jiang, Bo Xu, Jiaqing Liang, Yanghua Xiao, Wei Wang:
ShellGPT: Generative Pre-trained Transformer Model for Shell Language Understanding. ISSRE 2023: 671-682 - [c38]Jie Shi, Jingzheng Chong, Zejiang Huang, Zhihua Yang:
A Multi-UAVs Cooperative Spectrum Sensing Method Based on Improved IDW Algorithm. SINC 2023: 150-163 - [c37]Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi:
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning. SP 2023: 1893-1907 - [i16]Rong Du, Qingqing Ye, Yue Fu, Haibo Hu, Jin Li, Chengfang Fang, Jie Shi:
Differential Aggregation against General Colluding Attackers. CoRR abs/2302.09315 (2023) - [i15]Shengming Yin, Chenfei Wu, Jian Liang, Jie Shi, Houqiang Li, Gong Ming, Nan Duan:
DragNUWA: Fine-grained Control in Video Generation by Integrating Text, Image, and Trajectory. CoRR abs/2308.08089 (2023) - [i14]Li Wang, Jiaqi Li, Yuhao Luo, Jiahao Zheng, Lei Wang, Hao Li, Ke Xu, Chengfang Fang, Jie Shi, Zhizheng Wu:
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification. CoRR abs/2310.05369 (2023) - [i13]Jie Shi, Arno P. J. M. Siebes, Siamak Mehrkanoon:
TransCORALNet: A Two-Stream Transformer CORAL Networks for Supply Chain Credit Assessment Cold Start. CoRR abs/2311.18749 (2023) - 2022
- [j26]Fengli Lu, Chengcai Fu, Guoying Zhang, Jie Shi:
Adaptive multi-scale feature fusion based U-net for fracture segmentation in coal rock images. J. Intell. Fuzzy Syst. 42(4): 3761-3774 (2022) - [j25]Fengli Lu, Chengcai Fu, Jie Shi, Guoying Zhang:
Attention based deep neural network for micro-fracture extraction of sequential coal rock CT images. Multim. Tools Appl. 81(18): 26463-26482 (2022) - [j24]Wei Liu, Xu Liu, Yuan Hu, Jie Shi, Xinqiang Chen, Jiansen Zhao, Shengzheng Wang, Qingsong Hu:
Fall Detection for Shipboard Seafarers Based on Optimized BlazePose and LSTM. Sensors 22(14): 5449 (2022) - [j23]Jiayin Song, Jie Shi, Hongwei Zhou, Wenlong Song, Hongju Zhou, Yue Zhao:
Imaging of Insect Hole in Living Tree Trunk Based on Joint Driven Algorithm of Electromagnetic Inverse Scattering. Sensors 22(24): 9840 (2022) - [j22]Huadi Zheng, Qingqing Ye, Haibo Hu, Chengfang Fang, Jie Shi:
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation. IEEE Trans. Dependable Secur. Comput. 19(3): 2007-2022 (2022) - [j21]Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Trans. Dependable Secur. Comput. 19(6): 3987-4001 (2022) - [c36]Rixuan Qiu, Yongtai Qin, Yuancheng Li, Xin Zhou, Junfeng Fu, Wei Li, Juan Yan, Jie Shi:
A software-defined security middle platform architecture. CSSE 2022: 647-651 - [c35]Jinghao Wang, Chenling Cui, Xuejun Wen, Jie Shi:
TransPatch: A Transformer-based Generator for Accelerating Transferable Patch Generation in Adversarial Attacks Against Object Detection Models. ECCV Workshops (1) 2022: 317-331 - [c34]Yaxin Xiao, Qingqing Ye, Haibo Hu, Huadi Zheng, Chengfang Fang, Jie Shi:
MExMI: Pool-based Active Model Extraction Crossover Membership Inference. NeurIPS 2022 - [c33]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts Through Perturbation. TASE 2022: 29-48 - [i12]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts through Perturbation. CoRR abs/2201.02504 (2022) - [i11]Bing Sun, Jun Sun, Hong Long Pham, Jie Shi:
Causality-based Neural Network Repair. CoRR abs/2204.09274 (2022) - [i10]Jie Shi, Chenfei Wu, Jian Liang, Xiang Liu, Nan Duan:
DiVAE: Photorealistic Images Synthesis with Denoising Diffusion Decoder. CoRR abs/2206.00386 (2022) - 2021
- [c32]Zihao Qin, Hsiao-Ying Lin, Jie Shi:
Towards Demystifying Adversarial Robustness of Binarized Neural Networks. ACNS Workshops 2021: 439-462 - [c31]Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. CCS 2021: 516-534 - [c30]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CCS 2021: 3141-3158 - [c29]Jie Ren, Die Zhang, Yisen Wang, Lu Chen, Zhanpeng Zhou, Yiting Chen, Xu Cheng, Xin Wang, Meng Zhou, Jie Shi, Quanshi Zhang:
Towards a Unified Game-Theoretic View of Adversarial Perturbations and Robustness. NeurIPS 2021: 3797-3810 - [i9]Xiao Li, Jianmin Li, Ting Dai, Jie Shi, Jun Zhu, Xiaolin Hu:
Rethinking Natural Adversarial Examples for Classification Models. CoRR abs/2102.11731 (2021) - [i8]Haowen Liu, Ping Yi, Hsiao-Ying Lin, Jie Shi, Weidong Qiu:
DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction. CoRR abs/2103.06487 (2021) - [i7]Jie Ren, Die Zhang, Yisen Wang, Lu Chen, Zhanpeng Zhou, Xu Cheng, Xin Wang, Yiting Chen, Jie Shi, Quanshi Zhang:
Game-theoretic Understanding of Adversarially Learned Features. CoRR abs/2103.07364 (2021) - [i6]An Zhang, Xiang Wang, Chengfang Fang, Jie Shi, Tat-Seng Chua, Zehua Chen:
A-FMI: Learning Attributions from Deep Networks via Feature Map Importance. CoRR abs/2104.05527 (2021) - [i5]Xinyi Zhang, Chengfang Fang, Jie Shi:
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack. CoRR abs/2104.05921 (2021) - [i4]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CoRR abs/2111.00197 (2021) - 2020
- [j20]Shengguo Shi, Ying Li, Desen Yang, Aifei Liu, Jie Shi:
Sparse representation based direction-of-arrival estimation using circular acoustic vector sensor arrays. Digit. Signal Process. 99: 102675 (2020) - [j19]Yongcai Hu, Wei Sun, Xigang Liu, Quan Gan, Jie Shi:
Tourism demonstration system for large-scale museums based on 3D virtual simulation technology. Electron. Libr. 38(2): 367-381 (2020) - [j18]Shengkai Yue, Minglei Yuan, Tong Lu, Palaiahnakote Shivakumara, Michael Blumenstein, Jie Shi, G. Hemantha Kumar:
Rotation invariant angle-density based features for an ice image classification system. Expert Syst. Appl. 162: 113744 (2020) - [j17]Jie Shi, Xiangrui Zeng, Rui Jiang, Tao Jiang, Min Xu:
A simulated annealing approach for resolution guided homogeneous cryo-electron microscopy image selection. Quant. Biol. 8(1): 51-63 (2020) - [j16]Mingyu Gao, Chao Chen, Jie Shi, Chun Sing Lai, Yuxiang Yang, Zhekang Dong:
A Multiscale Recognition Method for the Optimization of Traffic Signs Using GMM and Category Quality Focal Loss. Sensors 20(17): 4850 (2020) - [c28]Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi:
Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence. AISec@CCS 2020: 1-12 - [c27]Hsiao-Ying Lin, Chengfang Fang, Jie Shi:
Bident Structure for Neural Network Model Protection. ICISSP 2020: 377-384 - [i3]Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang:
Deep Quaternion Features for Privacy Protection. CoRR abs/2003.08365 (2020) - [i2]Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang:
Rotation-Equivariant Neural Networks for Privacy Protection. CoRR abs/2006.13016 (2020) - [i1]Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi:
Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence. CoRR abs/2009.13033 (2020)
2010 – 2019
- 2019
- [j15]Hualu Zhang, Jie Shi, Boya Deng, Gangyong Jia, Guangjie Han, Lei Shu:
MCTE: Minimizes Task Completion Time and Execution Cost to Optimize Scheduling Performance for Smart Grid Cloud. IEEE Access 7: 134793-134803 (2019) - [c26]Jie Shi, Tianbing Zhang, Songlin Wang, Boya Deng, Gangyong Jia, Guangjie Han:
A New Task Scheduling for Minimizing Completion Time and Execution Cost in Smart Grid Cloud. ComComAP 2019: 151-156 - [c25]Yangyang Zhao, Boya Deng, Hui Chen, Hualu Zhang, Jie Shi, Zhengwei Xu, Xingyang Zhu, Guangjie Han:
An Evaluation Strategy of Energy Storage Construction for Industrial Users Based on K-Means Clustering Algorithm. ComComAP 2019: 396-401 - [c24]Huadi Zheng, Qingqing Ye, Haibo Hu, Chengfang Fang, Jie Shi:
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks. ESORICS (1) 2019: 66-83 - 2018
- [j14]Jie Shi, Hualu Zhang, Yang Bai, Guangjie Han, Gangyong Jia:
A Novel Data Aggregation Preprocessing Algorithm in Flash Memory for Iot Based Power Grid Storage System. IEEE Access 6: 57279-57290 (2018) - [c23]Hai-yang Ding, Run-dong Yang, Jie Shi, Pei-fei Song:
A (k, n) Visual Cryptography Based on Shamir's Secret Sharing. ICMSSP 2018: 17-23 - [c22]Xuerong Wu, Palaiahnakote Shivakumara, Liping Zhu, Hualu Zhang, Jie Shi, Tong Lu, Umapada Pal, Michael Blumenstein:
Fourier Transform based Features for Clean and Polluted Water Image Classification. ICPR 2018: 1707-1712 - [c21]Heng Zhang, Huan Zhou, Wenming Jiao, Jie Shi, Qiyan Zang, Jing Sun, Jian Zhang:
Biological Features De-identification in Iris Images. I-SPAN 2018: 67-71 - 2017
- [j13]Lanyue Zhang, Dandan Ding, Desen Yang, Jia Wang, Jie Shi:
Sound Source Localization Using Non-Conformal Surface Sound Field Transformation Based on Spherical Harmonic Wave Decomposition. Sensors 17(5): 1087 (2017) - 2016
- [j12]Jie Shi, Yinya Li, Guoqing Qi, Andong Sheng:
Extended target tracking filter with intermittent observations. IET Signal Process. 10(6): 592-602 (2016) - [j11]Zongmin Cui, Hong Zhu, Jie Shi, Lianhua Chi, Ke Yan:
Efficient authorisation update on cloud data. Int. J. Web Grid Serv. 12(2): 109-141 (2016) - 2015
- [j10]Zongda Wu, Jie Shi, Chenglang Lu, Enhong Chen, Guandong Xu, Guiling Li, Sihong Xie, Philip S. Yu:
Constructing plausible innocuous pseudo queries to protect user query intention. Inf. Sci. 325: 215-226 (2015) - [c20]Yang Yu, Jie Shi, Ke He, Peng Han:
A Reservation Multichannel MAC Protocol Utilize Blind Source Separation. ICIRA (3) 2015: 106-115 - 2014
- [j9]Jie Shi, Zhaohao Ding, Wei-Jen Lee, Yongping Yang, Yongqian Liu, Mingming Zhang:
Hybrid Forecasting Model for Very-Short Term Wind Power Forecasting Based on Grey Relational Analysis and Wind Speed Distribution Features. IEEE Trans. Smart Grid 5(1): 521-526 (2014) - [c19]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435 - [c18]Jie Shi, Su Mon Kywe, Yingjiu Li:
Batch Clone Detection in RFID-enabled supply chain. IEEE RFID 2014: 118-125 - [c17]Yang Yu, Jie Shi, Ke He:
A Multichannel MAC Protocol for Underwater Acoustic Sensor Networks. WUWNet 2014: 2:1-2:5 - 2013
- [c16]Jie Shi, Ge Fu, Jian Weng, Hong Zhu:
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases. EIDWT 2013: 385-392 - [c15]Zongmin Cui, Hong Zhu, Jie Shi, Lianhua Chi, Ke Yan:
Lightweight Management of Authorization Update on Cloud Data. ICPADS 2013: 456-461 - [c14]Su Mon Kywe, Yingjiu Li, Jie Shi:
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service. RFID-TA 2013: 1-6 - [c13]Jie Shi, Qin Yan, Huijuan Shi, Yapeng Wang:
Visual attention based image zero watermark scheme with ensemble similarity. WCSP 2013: 1-5 - 2012
- [j8]Jie Shi, Yingjiu Li, Wei He, Darren Sim:
SecTTS: A secure track & trace system for RFID-enabled supply chains. Comput. Ind. 63(6): 574-585 (2012) - [j7]Jie Shi, Yingjiu Li, Robert H. Deng:
A secure and efficient discovery service system in EPCglobal network. Comput. Secur. 31(8): 870-885 (2012) - [j6]Mark Roantree, Jie Shi, Paolo Cappellari, Martin F. O'Connor, Michael Whelan, Niall Moyna:
Data transformation and query management in personal health sensor networks. J. Netw. Comput. Appl. 35(4): 1191-1202 (2012) - [j5]Jie Shi, Shilin Xiao, Lilin Yi, Meihua Bi:
A Sensitivity-Enhanced Refractive Index Sensor Using a Single-Mode Thin-Core Fiber Incorporating an Abrupt Taper. Sensors 12(4): 4697-4705 (2012) - [c12]Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng:
SecDS: a secure EPC discovery service system in EPCglobal network. CODASPY 2012: 267-274 - [c11]Jie Shi, Yingjiu Li, Robert H. Deng, Kevin Chiew:
Design and Implementation of a Secure Prototype for EPCglobal Network Services. RFIDSec Asia 2012: 45-56 - 2011
- [j4]Fan Wang, Huotao Gao, Lin Zhou, Qingchen Zhou, Jie Shi, Yuxiang Sun:
Design and FPGA implementation of digital pulse compression for HF chirp radar based on modified orthogonal transformation. IEICE Electron. Express 8(20): 1736-1742 (2011) - [c10]Paolo Cappellari, Jie Shi, Mark Roantree, Crionna Tobin, Niall Moyna:
Enabling Knowledge Extraction from Low Level Sensor Data. DEXA (2) 2011: 411-419 - [c9]Juntao Xue, Shiming Wang, Jie Shi:
Serial fingerprint device driver development based on EFI. EMEIT 2011: 299-302 - [c8]Jie Shi, Wei-Jen Lee, Yongqian Liu, Yongping Yang, Peng Wang:
Forecasting power output of photovoltaic system based on weather classification and support vector machine. IAS 2011: 1-6 - 2010
- [j3]Jie Shi, Hong Zhu:
A fine-grained access control model for relational databases. J. Zhejiang Univ. Sci. C 11(8): 575-586 (2010)
2000 – 2009
- 2009
- [c7]Jie Shi, Hong Zhu, Ge Fu, Tao Jiang:
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. ACIS-ICIS 2009: 469-474 - [c6]Jie Shi, Zhenkuan Pan, Weibo Wei:
An Innovative Variational Level Set Model for Multiphase Image Segmentation. MUE 2009: 41-44 - [c5]Mark Roantree, Michael Whelan, Jie Shi, Niall Moyna:
Using Sensor Networks to Measure Intensity in Sporting Activities. QSHINE 2009: 598-612 - 2008
- [c4]Jie Shi, Weiling Wu:
Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying. CSSE (3) 2008: 1077-1080 - [c3]Hong Zhu, Ge Fu, Yi Zhu, Renchao Jin, Kevin Lü, Jie Shi:
Dynamic data recovery for database systems based on fine grained transaction log. IDEAS 2008: 249-253 - [c2]Tao Jiang, Yucai Feng, Bin Zhang, Jie Shi, Yuanzhen Wang:
Finding Motifs of Financial Data Streams in Real Time. ISICA 2008: 546-555 - [c1]Hong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng:
Controlling Information Leakage of Fine-Grained Access Model in DBMSs. WAIM 2008: 583-590 - 2007
- [j2]Sarah Dorner, Jie Shi, David A. Swayne:
Multi-objective modelling and decision support using a Bayesian network approximation to a non-point source pollution model. Environ. Model. Softw. 22(2): 211-222 (2007)
1980 – 1989
- 1988
- [j1]Jie Shi, Serge Monchaud, Raymond Prat, Ivan Kas:
Control of motors by microprocessors for space positioning and localization. Microprocess. Microprogramming 23(1-5): 339-344 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint