default search action
Shijie Zhou
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Shijie Zhou 0001 — Microsoft Corporation, Redmond, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j80]Nabeil Eltayieb, Rashad Elhabob, Abdeldime M. S. Abdelgader, Yongjian Liao, Fagen Li, Shijie Zhou:
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing. Future Gener. Comput. Syst. 162: 107478 (2025) - [j79]Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Wenzheng Xu, Yongjian Liao, Shijie Zhou, Ziming Wang:
Auditing privacy budget of differentially private neural network models. Neurocomputing 614: 128756 (2025) - 2024
- [j78]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Isaac Amankona Obiri, Eric Kuada, Ebenezer Kwaku Danso, Acheampong Edward Mensah:
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis. Concurr. Comput. Pract. Exp. 36(25) (2024) - [j77]Yeming Lei, Shijie Zhou, Jerzy A. Filar, Nan Ye:
Multi-pass Bayesian estimation: a robust Bayesian method. Comput. Stat. 39(4): 2183-2216 (2024) - [j76]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Eric Kuada, Ebenezer Kwaku Danso:
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT. Internet Things 26: 101183 (2024) - [j75]Zhishuo Zhang, Wen Huang, Ying Huang, Yongjian Liao, Zhun Zhang, Shijie Zhou:
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT. IEEE Internet Things J. 11(9): 15616-15632 (2024) - [j74]Zhishuo Zhang, Ying Huang, Wen Huang, Wenbo Pan, Yongjian Liao, Shijie Zhou:
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System. IEEE Internet Things J. 11(18): 30187-30203 (2024) - [j73]Nabeil Eltayieb, Rashad Elhabob, Yongjian Liao, Fagen Li, Shijie Zhou:
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. J. Inf. Secur. Appl. 83: 103763 (2024) - [j72]Haitao Ma, Shijie Zhou, Yibo Wang, Ning Wu, Yue Li, Yanan Tian:
Improving Distributed Acoustic Sensing Data Quality With Self-Supervised Learning. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j71]Xiaoxiao Peng, Shijie Zhou:
Finite-time stochastic control for complex dynamical systems: The estimate for control time and energy consumption. Syst. Control. Lett. 184: 105711 (2024) - [j70]Shijie Zhou, Xiaoxiao Peng, Wei Lin, Xuerong Mao:
Adaptive Control and Synchronization of Complex Dynamical Systems with Various Types of Delays and Stochastic Disturbances. SIAM J. Appl. Math. 84(4): 1515-1531 (2024) - [j69]Xiaoxiao Peng, Shijie Zhou, Wei Lin, Xuerong Mao:
Invariance Principles for \(G\)-Brownian-Motion-Driven Stochastic Differential Equations and Their Applications to \(G\)-Stochastic Control. SIAM J. Control. Optim. 62(3): 1569-1589 (2024) - [j68]Shijie Zhou, Wei Lin, Xuerong Mao, Jianhong Wu:
Generalized Invariance Principles for Stochastic Dynamical Systems and Their Applications. IEEE Trans. Autom. Control. 69(1): 85-99 (2024) - [j67]Zhishuo Zhang, Ying Huang, Wen Huang, Yongjian Liao, Shijie Zhou:
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS. IEEE Trans. Intell. Transp. Syst. 25(7): 7861-7877 (2024) - [c62]Shijie Zhou, Haoran Chang, Sicheng Jiang, Zhiwen Fan, Zehao Zhu, Dejia Xu, Pradyumna Chari, Suya You, Zhangyang Wang, Achuta Kadambi:
Feature 3DGS: Supercharging 3D Gaussian Splatting to Enable Distilled Feature Fields. CVPR 2024: 21676-21685 - [c61]Zhewei Wu, Ruilong Yu, Qihe Liu, Shuying Cheng, Shilin Qiu, Shijie Zhou:
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks. ECCV (46) 2024: 198-214 - [c60]Shijie Zhou, Zhiwen Fan, Dejia Xu, Haoran Chang, Pradyumna Chari, Tejas Bharadwaj, Suya You, Zhangyang Wang, Achuta Kadambi:
DreamScene360: Unconstrained Text-to-3D Scene Generation with Panoramic Gaussian Splatting. ECCV (6) 2024: 324-342 - [i10]Rohan Sharma, Shijie Zhou, Kaiyi Ji, Changyou Chen:
Discriminative Adversarial Unlearning. CoRR abs/2402.06864 (2024) - [i9]Zhewei Wu, Ruilong Yu, Qihe Liu, Shuying Cheng, Shilin Qiu, Shijie Zhou:
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks. CoRR abs/2402.17976 (2024) - [i8]Shijie Zhou, Zhiwen Fan, Dejia Xu, Haoran Chang, Pradyumna Chari, Tejas Bharadwaj, Suya You, Zhangyang Wang, Achuta Kadambi:
DreamScene360: Unconstrained Text-to-3D Scene Generation with Panoramic Gaussian Splatting. CoRR abs/2404.06903 (2024) - [i7]Zhun Zhang, Yi Zeng, Qihe Liu, Shijie Zhou:
Towards a Novel Perspective on Adversarial Examples Driven by Frequency. CoRR abs/2404.10202 (2024) - [i6]Renjie Li, Panwang Pan, Bangbang Yang, Dejia Xu, Shijie Zhou, Xuanyang Zhang, Zeming Li, Achuta Kadambi, Zhangyang Wang, Zhiwen Fan:
4K4DGen: Panoramic 4D Generation at 4K Resolution. CoRR abs/2406.13527 (2024) - 2023
- [j66]Pradyumna Chari, Yunhao Ba, Shijie Zhou, Chinmay Talegaonkar, Shreeram S. Athreya, Achuta Kadambi:
On Learning Mechanical Laws of Motion From Video Using Neural Networks. IEEE Access 11: 30129-30145 (2023) - [j65]Wen Huang, Ming Zhuo, Tianqing Zhu, Shijie Zhou, Yongjian Liao:
Differential privacy: Review of improving utility through cryptography-based technologies. Concurr. Comput. Pract. Exp. 35(5) (2023) - [j64]Zhishuo Zhang, Wen Huang, Lin Yang, Yongjian Liao, Shijie Zhou:
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC. IEEE Internet Things J. 10(18): 16531-16547 (2023) - [j63]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Yingjie Dong:
Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE). J. Inf. Secur. Appl. 74: 103462 (2023) - [j62]Dejiao Niu, Le Yang, Tianquan Liu, Tao Cai, Shijie Zhou, Lei Li:
A new hierarchical temporal memory based on recurrent learning unit. J. Exp. Theor. Artif. Intell. 35(5): 665-678 (2023) - [j61]Peng Yang, Shuang Hu, Shijie Zhou, Jiaying Zhang:
A Topological Sensitive Node Importance Evaluation Method in Aerospace Information Networks. Sensors 23(1): 266 (2023) - [j60]Hongzhe Wang, Junjie Wang, Hao Hu, Guo Li, Shaogang Hu, Qi Yu, Zhen Liu, Tupei Chen, Shijie Zhou, Yang Liu:
Ultra-High-Speed Accelerator Architecture for Convolutional Neural Network Based on Processing-in-Memory Using Resistive Random Access Memory. Sensors 23(5): 2401 (2023) - [j59]Yunzhuo Liu, Wen Huang, Ming Zhuo, Shijie Zhou, Mengshi Li:
Mobile Payment Protocol with Deniably Authenticated Property. Sensors 23(8): 3927 (2023) - [j58]Shijie Zhou, Zelun Li, Zhongliang Lv, Chuande Zhou, Pengcheng Wu, Changshuang Zhu, Wei Liu:
Research on Positioning Accuracy of Mobile Robot in Indoor Environment Based on Improved RTABMAP Algorithm. Sensors 23(23): 9468 (2023) - [j57]Ming Zhuo, Yunzhuo Liu, Leyuan Liu, Shijie Zhou:
Local Cluster-Aware Attention for Non-Euclidean Structure Data. Symmetry 15(4): 837 (2023) - [c59]Xinchen Wang, Peng Wang, Jian Hu, Xiang Wang, Yuxiao Zhao, Shaolei Wang, Liujian Diao, Shijie Zhou:
Design and Implementation of a Low-Code Platform in the Power Sector. BDEIM 2023: 359-363 - [c58]Zhen Wang, Shijie Zhou, Jeong Joon Park, Despoina Paschalidou, Suya You, Gordon Wetzstein, Leonidas J. Guibas, Achuta Kadambi:
ALTO: Alternating Latent Topologies for Implicit 3D Reconstruction. CVPR 2023: 259-270 - [c57]Serhii Reznichenko, Shijie Zhou:
Optimization of Arrhythmia-based ECG-lead Selection for Computer-interpreted Heart Rhythm Classification. EMBC 2023: 1-4 - [c56]Ling Zhou, Qihe Liu, Shijie Zhou:
Preprocessing-based Adversarial Defense for Object Detection via Feature Filtration. ICACS 2023: 80-87 - [c55]Peng Yang, Shijie Zhou, Xiangyang Zhou:
Optimization of a Network Topology Generation Algorithm Based on Spatial Information Network. ICPCSEE (1) 2023: 246-255 - [c54]Yaowei Feng, Shijie Zhou, Yaoxing Wang, Zhendong Li, Hao Liu:
Edge-Prior Contrastive Transformer for Optic Cup and Optic Disc Segmentation. PRCV (5) 2023: 443-455 - [i5]Shijie Zhou, Haoran Chang, Sicheng Jiang, Zhiwen Fan, Zehao Zhu, Dejia Xu, Pradyumna Chari, Suya You, Zhangyang Wang, Achuta Kadambi:
Feature 3DGS: Supercharging 3D Gaussian Splatting to Enable Distilled Feature Fields. CoRR abs/2312.03203 (2023) - 2022
- [j56]Shijie Zhou, Wei Lin, Jianhong Wu:
Generalized invariance principles for discrete-time stochastic dynamical systems. Autom. 143: 110436 (2022) - [j55]Zhishuo Zhang, Wen Huang, Songying Cai, Lin Yang, Yongjian Liao, Shijie Zhou:
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing. Comput. Commun. 196: 9-22 (2022) - [j54]Shilin Qiu, Qihe Liu, Shijie Zhou, Wen Huang:
Adversarial attack and defense technologies in natural language processing: A survey. Neurocomputing 492: 278-307 (2022) - [j53]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms. IEEE Internet Things J. 9(1): 80-91 (2022) - [j52]Ihsan H. Abdulqadder, Shijie Zhou:
SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment. IEEE Internet Things J. 9(18): 18079-18097 (2022) - [j51]Zhishuo Zhang, Wen Huang, Shijie Zhou, Yongjian Liao:
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing. J. Syst. Archit. 129: 102589 (2022) - [j50]Minglei Yuan, Chunhao Cai, Tong Lu, Yirui Wu, Qian Xu, Shijie Zhou:
A novel forget-update module for few-shot domain generalization. Pattern Recognit. 129: 108704 (2022) - [j49]Ming Zhuo, Wen Huang, Leyuan Liu, Shijie Zhou, Zhiwen Tian:
A High-Utility Differentially Private Mechanism for Space Information Networks. Remote. Sens. 14(22): 5844 (2022) - [j48]Junhua Chen, Longmiao Chen, Linfang Qian, Guangsong Chen, Shijie Zhou:
Time-dependent kinematic reliability analysis of gear mechanism based on sequential decoupling strategy and saddle-point approximation. Reliab. Eng. Syst. Saf. 220: 108292 (2022) - [j47]Shijie Zhou, Ying-Cheng Lai, Wei Lin:
Stochastically Adaptive Control and Synchronization: From Globally One-Sided Lipschitzian to Only Locally Lipschitzian Systems. SIAM J. Appl. Dyn. Syst. 21(2): 932-959 (2022) - [c53]Shijie Zhou, Deshui Yu, Yuhui Cai, Yujie Zhang, Bojun Li, Wei Li:
TCAM-Resnet: A convolutional neural network for screening DR and AMD based on OCT images. BIBM 2022: 1830-1835 - [c52]Shijie Zhou, Lai Jiang, Longjie Fan, Jun Ma:
Build User Experience Evaluation System - - Selection and Integration of Indicators of Automotive Products. HCI (1) 2022: 369-387 - [c51]Shijie Zhou, Lv Bin, Ting Wen:
The Expression of Multi-sensory User Experience on Interactive Packaging Design-Emotional Design of Children's Food. HCI (48) 2022: 699-703 - [c50]Acheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience. HPCC/DSS/SmartCity/DependSys 2022: 1408-1415 - [c49]Acheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health. HPCC/DSS/SmartCity/DependSys 2022: 1690-1696 - [c48]Enyan Dai, Shijie Zhou, Zhimeng Guo, Suhang Wang:
Label-Wise Graph Convolutional Network for Heterophilic Graphs. LoG 2022: 26 - [i4]Shijie Zhou, Zhimeng Guo, Charu C. Aggarwal, Xiang Zhang, Suhang Wang:
Link Prediction on Heterophilic Graphs via Disentangled Representation Learning. CoRR abs/2208.01820 (2022) - [i3]Zhen Wang, Shijie Zhou, Jeong Joon Park, Despoina Paschalidou, Suya You, Gordon Wetzstein, Leonidas J. Guibas, Achuta Kadambi:
ALTO: Alternating Latent Topologies for Implicit 3D Reconstruction. CoRR abs/2212.04096 (2022) - 2021
- [j46]Zhishuo Zhang, Shijie Zhou:
A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things. Comput. Networks 201: 108553 (2021) - [j45]Chuan Tian, Wenge Rong, Shijie Zhou, Jianfei Zhang, Yuanxin Ouyang, Zhang Xiong:
Learning word representation by jointly using neighbor and syntactic contexts. Neurocomputing 456: 136-146 (2021) - [j44]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu, Yuyu Wang, Kwabena Owusu-Agyemang:
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions. J. Inf. Secur. Appl. 61: 102949 (2021) - [j43]Casper Shikali Shivachi, Refuoe Mokhosi, Zhou Shijie, Qihe Liu:
Learning Syllables Using Conv-LSTM Model for Swahili Word Representation and Part-of-speech Tagging. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(4): 58:1-58:25 (2021) - [j42]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries. IEEE Trans. Inf. Forensics Secur. 16: 3123-3137 (2021) - [c47]Chunjiang Wu, Shijie Zhou, Changli Fan, Le Qi:
A Method for Short-term Traffic Flow Prediction and Control on Urban Road. BigCom 2021: 263-270 - [c46]Wen Huang, Shijie Zhou, Yongjian Liao:
Improving the Number of Queries Supported by Differentially Private Mechanisms. BigDataSE 2021: 65-71 - [c45]Ganglin Zhang, Yongjian Liao, Shijie Zhou:
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service. DASC/PiCom/CBDCom/CyberSciTech 2021: 1-9 - [c44]Yifei Xiao, Shijie Zhou, Linpeng Zhong, Zhao Zhang:
Sector Error-Oriented Durability-Aware Fast Repair in Erasure-Coded Cloud Storage Systems. DMBD (2) 2021: 445-459 - [c43]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Ebenezer Kwaku Danso:
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. HPCC/DSS/SmartCity/DependSys 2021: 533-542 - [c42]Shijie Zhou, Wenge Rong, Jianfei Zhang, Yanmeng Wang, Libin Shi, Zhang Xiong:
Topic-Aware Dialogue Generation with Two-Hop Based Graph Attention. ICASSP 2021: 7428-7432 - [c41]Deleli Mesay Adinew, Zhou Shijie, Ayall Tewodros Alemu:
Spark Performance Optimization Analysis with Multi-Layer Parameter using Shuffling and Scheduling in Different Data Caching Options. ISKE 2021: 69-76 - [c40]Zhun Zhang, Qihe Liu, Shijie Zhou:
GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM. WASA (3) 2021: 172-182 - 2020
- [j41]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j40]Dejiao Niu, Tianquan Liu, Tao Cai, Shijie Zhou:
The Asynchronous Training Algorithm Based on Sampling and Mean Fusion for Distributed RNN. IEEE Access 8: 62439-62447 (2020) - [j39]Chunjiang Wu, Shijie Zhou, Licai Xiao:
Dynamic Path Planning Based on Improved Ant Colony Algorithm in Traffic Congestion. IEEE Access 8: 180773-180783 (2020) - [j38]Zhun Zhang, Qihe Liu, Shilin Qiu, Shijie Zhou, Cheng Zhang:
Unknown Attack Detection Based on Zero-Shot Learning. IEEE Access 8: 193981-193991 (2020) - [j37]Yifei Xiao, Shijie Zhou, Linpeng Zhong:
Erasure Coding-Oriented Data Update for Cloud Storage: A Survey. IEEE Access 8: 227982-227998 (2020) - [j36]Ryan Missel, Prashnna K. Gyawali, Jaideep Vitthal Murkute, Zhiyuan Li, Shijie Zhou, Amir AbdelWahab, Jason Davis, James Warren, John L. Sapp, Linwei Wang:
A hybrid machine learning approach to localizing the origin of ventricular tachycardia using 12-lead electrocardiograms. Comput. Biol. Medicine 126: 104013 (2020) - [j35]Ihsan H. Abdulqadder, Shijie Zhou, Deqing Zou, Israa T. Aziz, Syed Muhammad Abrar Akber:
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms. Comput. Networks 179: 107364 (2020) - [j34]Libin Shi, Wenge Rong, Shijie Zhou, Nan Jiang, Zhang Xiong:
A dual channel class hierarchy based recurrent language modeling. Neurocomputing 418: 291-299 (2020) - [j33]Ashir Javeed, Sanam Shahla Rizvi, Shijie Zhou, Rabia Riaz, Shafqat Ullah Khan, Se Jin Kwon:
Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification. Mob. Inf. Syst. 2020: 8843115:1-8843115:11 (2020) - [j32]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020) - [j31]Juan Chen, Shijie Zhou, Zhao Kang, Quan Wen:
Locality-constrained group lasso coding for microvessel image classification. Pattern Recognit. Lett. 130: 132-138 (2020) - [c39]Yanmeng Wang, Wenge Rong, Shijie Zhou, Yuanxin Ouyang, Zhang Xiong:
Dynamic Multi-level Attention Models for Dialogue Response Generation. DCAI (Special Sessions) 2020: 62-71 - [c38]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu:
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients. HPCC/DSS/SmartCity 2020: 816-823 - [c37]Ihsan H. Abdulqadder, Shijie Zhou, Deqing Zou, Israa T. Aziz, Syed Muhammad Abrar Akber:
Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT. ICCT 2020: 499-507 - [c36]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing. ICDE 2020: 2049-2053 - [c35]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. TrustCom 2020: 623-630 - [i2]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries. CoRR abs/2010.08958 (2020) - [i1]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
the Connection between Cryptography and Differential Privacy: a Survey. CoRR abs/2011.00976 (2020)
2010 – 2019
- 2019
- [j30]Yongjian Liao, Hongjie Chen, Wen Huang, Mohammed Ramadan, Hongtao Pan, Shijie Zhou:
Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access 7: 25087-25094 (2019) - [j29]Wen Huang, Yongjian Liao, Shijie Zhou, Hongjie Chen:
An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection. IEEE Access 7: 43453-43461 (2019) - [j28]Yu Fan, Yongjian Liao, Fagen Li, Shijie Zhou, Ganglin Zhang:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - [j27]Yanghong Zhou, P. Y. Mok, Shijie Zhou:
A Part-Based Deep Neural Network Cascade Model for Human Parsing. IEEE Access 7: 160101-160111 (2019) - [j26]Muhammad Asim Saleem, Shijie Zhou, Abida Sharif, Tanzila Saba, Muhammad Azam Zia, Ashar Javed, Sudipta Roy, Mamta Mittal:
Expansion of Cluster Head Stability Using Fuzzy in Cognitive Radio CR-VANET. IEEE Access 7: 173185-173195 (2019) - [j25]Ashir Javeed, Shijie Zhou, Yongjian Liao, Iqbal Qasim, Adeeb Noor, Redhwan Nour:
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection. IEEE Access 7: 180235-180243 (2019) - [j24]Wen Huang, Shijie Zhou, Yongjian Liao, Ming Zhuo:
Optimizing Query Times for Multiple Users Scenario of Differential Privacy. IEEE Access 7: 183292-183299 (2019) - [j23]Wen Huang, Shijie Zhou, Yongjian Liao, Hongjie Chen:
An Efficient Differential Privacy Logistic Classification Mechanism. IEEE Internet Things J. 6(6): 10620-10626 (2019) - [j22]Muhammad Asim Saleem, Shijie Zhou, Abida Sharif:
Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion. Mob. Networks Appl. 24(1): 248-258 (2019) - [j21]Yaolu Liu, Shijie Zhou, Huiming Ning, Cheng Yan, Ning Hu:
An Inverse Approach of Damage Identification Using Lamb Wave Tomography. Sensors 19(9): 2180 (2019) - [j20]Shijie Zhou, John L. Sapp, Fady Dawoud, B. Milan Horácek:
Localization of Activation Origin on Patient-Specific Epicardial Surface by Empirical Bayesian Method. IEEE Trans. Biomed. Eng. 66(5): 1380-1389 (2019) - [j19]Shijie Zhou, John L. Sapp, Petr Stovícek, B. Milan Horácek:
Localization of Activation Origin on Patient-Specific Endocardial Surface by the Equivalent Double Layer (EDL) Source Model With Sparse Bayesian Learning. IEEE Trans. Biomed. Eng. 66(8): 2287-2295 (2019) - [c34]Dejiao Niu, Yawen Liu, Tao Cai, Xia Zheng, Tianquan Liu, Shijie Zhou:
A Novel Distributed Duration-Aware LSTM for Large Scale Sequential Data Analysis. Big Data (CCF) 2019: 120-134 - [c33]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics. ICNCC 2019: 75-78 - 2018
- [j18]Yongjian Liao, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j17]Yongjian Liao, Yichuan He, Fagen Li, Shijie Zhou:
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces 56: 101-106 (2018) - [j16]Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - [j15]Xiaoqiang Sun, Xiangyan Ding, Feilong Li, Shijie Zhou, Yaolu Liu, Ning Hu, Zhongqing Su, Youxuan Zhao, Jun Zhang, Mingxi Deng:
Interaction of Lamb Wave Modes with Weak Material Nonlinearity: Generation of Symmetric Zero-Frequency Mode. Sensors 18(8): 2451 (2018) - [c32]Shijie Zhou, John L. Sapp, Amir AbdelWahab, Milan Horacek:
An algorithm for imaging isochrones of ventricular activation on patient-specific epicardial surface. CinC 2018: 1-4 - 2017
- [j14]Chenyang Xia, Wei Wang, Guoping Chen, Xiaojie Wu, Shijie Zhou, Yanjing Sun:
Robust Control for the Relay ICPT System Under External Disturbance and Parametric Uncertainty. IEEE Trans. Control. Syst. Technol. 25(6): 2168-2175 (2017) - [c31]Qihe Liu, Shijie Zhou, Xianqiong Cheng, Hongrong Cheng, Huabo Zhang:
Gas Sensor Drift Compensation by an Optimal Linear Transformation. BigCom 2017: 193-199 - [c30]Shijie Zhou, Qihe Liu, Jin Xu, Yaqi He:
An Anti-collision Algorithm Based on Task Scheduling Model in RFID System. BigCom 2017: 284-290 - [c29]Junfeng Zhou, Shijie Zhou, Jeffrey Xu Yu, Hao Wei, Ziyang Chen, Xian Tang:
DAG Reduction: Fast Answering Reachability Queries. SIGMOD Conference 2017: 375-390 - 2016
- [j13]Yanghong Zhou, Shijie Zhou, Jiaqing Luo:
Explore city dynamics from the communication network between base stations. Int. J. Embed. Syst. 8(1): 87-92 (2016) - [j12]Shijie Zhou, Yun Liu, Jin Xu:
Modeling RFID readers deployment in three-dimensional space. Int. J. RF Technol. Res. Appl. 7(2-3): 131-152 (2016) - [j11]Shijie Zhou, Chunting Chris Mi:
Multi-Paralleled LCC Reactive Power Compensation Networks and Their Tuning Method for Electric Vehicle Dynamic Wireless Charging. IEEE Trans. Ind. Electron. 63(10): 6546-6556 (2016) - [c28]Tengyuan Cai, Hongrong Cheng, Jiaqing Luo, Shijie Zhou:
An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation. ER 2016: 248-259 - 2015
- [j10]Zhu Song, Shijie Zhou, Jiaqing Luo, Weiwei Deng:
The B+-tree-based method for nearest neighbour queries in traffic simulation systems. Int. J. High Perform. Comput. Netw. 8(2): 110-123 (2015) - [j9]Shijie Zhou:
A Survey on Fast-flux Attacks. Inf. Secur. J. A Glob. Perspect. 24(4-6): 79-97 (2015) - [j8]Xuhua Yang, Shijie Zhou:
基于重叠社团划分的大规模道路网络双层路由算法 (Double Layers Routing Algorithm on Large Road Networks Based on Overlapping Communities Detecting). 计算机科学 42(Z6): 285-289 (2015) - [c27]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c26]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c25]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6 - 2014
- [j7]Shijie Zhou, Jiaqing Luo:
A general approach for the intensive RFID reader deployment. Int. J. Ad Hoc Ubiquitous Comput. 16(3): 206-215 (2014) - [j6]Nianyi Wang, Yide Ma, Weilan Wang, Shijie Zhou:
An Image Fusion Method Based on NSCT and Dual-channel PCNN Model. J. Networks 9(2): 501-506 (2014) - [c24]Mengjie Zhang, Shijie Zhou, Dou Wu:
Research on Dynamic Load Balancing Technology Based on Simulation Terminal Pool. PACIS 2014: 178 - [c23]Yuping Zhao, Shijie Zhou, Jiaqing Luo, Zhu Song:
The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation. PACIS 2014: 179 - [c22]Mantun Chen, Shijie Zhou, Jiaqing Luo, Zhu Song:
An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System. PACIS 2014: 184 - 2013
- [j5]Jiaqing Luo, Bin Xiao, Shijie Zhou:
A bottom-up model for heterogeneous BitTorrent systems. J. Parallel Distributed Comput. 73(8): 1116-1126 (2013) - [j4]Jiaqing Luo, Bin Xiao, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - [c21]Shijie Zhou, Yun Liu, Jiaqing Luo:
A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space. MSN 2013: 115-120 - [c20]Lijun Sun, Shijie Zhou, Jiaqing Luo, Yuehan Zhang, Mengjie Zhang, Weiwei Deng:
ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking. MSN 2013: 248-253 - 2012
- [c19]Leyuan Liu, Weiqiang Kong, Shijie Zhou, Zhiguang Qin, Akira Fukuda:
Formal Verification of Communicating HSTM Designs. CIT 2012: 383-390 - [c18]Yi Pu, Shijie Zhou, Jason Gu, Hao Chen, Chenjin Zhang:
A novel linear switch reluctance generator system. ICAL 2012: 421-427 - 2011
- [j3]Sheng Yu, Shijie Zhou, Leyuan Liu, Rui Yang, Jiaqing Luo:
Detecting Malware Variants by Byte Frequency. J. Networks 6(4): 638-645 (2011) - [c17]Shijie Zhou, Zichen Zhang, Jason Gu:
Time-domain ECG signal analysis based on smart-phone. EMBC 2011: 2582-2585 - [c16]Shijie Zhou, Zichen Zhang, Jason Gu:
Interpretation of coarse-graining of Lempel-Ziv complexity measure in ECG signal analysis. EMBC 2011: 2716-2719 - 2010
- [j2]Shijie Zhou, Zhen Zhang, Zongwei Luo, Edward C. Wong:
A lightweight anti-desynchronization RFID authentication protocol. Inf. Syst. Frontiers 12(5): 521-528 (2010) - [c15]Jiaqing Luo, Bin Xiao, Zirong Yang, Shijie Zhou:
A clone of social networks to decentralized bootstrapping P2P networks. IWQoS 2010: 1-2 - [c14]Sheng Yu, Shijie Zhou, Sha Wang:
Fast-flux attack network identification based on agent lifespan. WCNIS 2010: 658-662
2000 – 2009
- 2009
- [c13]Jiaqing Luo, Bin Xiao, Guobin Liu, Qingjun Xiao, Shijie Zhou:
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. IPDPS 2009: 1-8 - [c12]Chengyu Fan, Shijie Zhou, Fagen Li:
An Identity-Based Restricted Deniable Authentication Protocol. ISPA 2009: 474-478 - [c11]Lan Luo, Zhiguang Qin, Shijie Zhou:
A Comment to the Intelligent Functions of Different Weight Ciphers. WKDD 2009: 531-534 - 2008
- [j1]Fagen Li, Shijie Zhou, Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1820-1823 (2008) - [c10]Zhen Zhang, Shijie Zhou, Zongwei Luo:
Design and Analysis for RFID Authentication Protocol. ICEBE 2008: 574-577 - [c9]Rui Yang, Shijie Zhou, Chengyu Fan:
A New Algorithm for Network Diameter. ICYCS 2008: 247-252 - [c8]Chengyu Fan, Shijie Zhou, Fagen Li:
Deniable Proxy-Anonymous Signatures. ICYCS 2008: 2131-2136 - [c7]Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. IIH-MSP 2008: 64-67 - 2007
- [c6]Chunjiang Wu, Shijie Zhou, Linna Wei, Jiaqing Luo, Yanli Wang, Xiaoqian Yang:
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems. ICA3PP 2007: 391-402 - 2006
- [c5]Shijie Zhou, Zhiguang Qin, Xiaomei Zhao, Xucheng Luo:
Interconnected Peer-to-Peer Network: A Community Based Scheme. AICT/ICIW 2006: 108 - [c4]Jiaqing Luo, Shijie Zhou, Chunjiang Wu:
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks. IAT Workshops 2006: 467-470 - 2004
- [c3]Feng Zhang, Zhiguang Qin, Shijie Zhou:
Policy-Tree Based Proactive Defense Model for Network Security. GCC Workshops 2004: 437-449 - 2003
- [c2]Shijie Zhou, Zhiguang Qin, Jinde Liu:
Distributing the Keys into P2P Network. GCC (1) 2003: 460-463 - [c1]Shijie Zhou, Zhiguang Qin, Feng Zhang, Xianfeng Zhang, Wei Chen, Jinde Liu:
Colored Petri Net Based Attack Modeling. RSFDGrC 2003: 715-718
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint