


default search action
Zhijie Ren
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j13]Silong Sheng
, Tianyou Zheng
, Zhijie Ren, Shengjiang Zhang, Yang Zhang, Weiwei Fu:
Enhancing video-based human mesh recovery with Attention-Mamba synergy. Expert Syst. Appl. 279: 127415 (2025)
[j12]Shengjiang Zhang, Tianyou Zheng, Zhijie Ren, Silong Sheng, Yang Zhang, Weiwei Fu:
RKPOEM: A fine-grained dropout strategy for robust multi-view 3D hand reconstruction. Neurocomputing 652: 131054 (2025)
[j11]Wenjie Liu
, Zhijie Ren, Liang Chen:
Knowledge reasoning based on graph neural networks with multi-layer top-p message passing and sparse negative sampling. Knowl. Based Syst. 311: 113063 (2025)
[j10]Zhijie Ren, Kang Yao, Silong Sheng, Beibei Wang, Xianli Lang, Dahang Wan, Weiwei Fu
:
YOLO-SDH: improved YOLOv5 using scaled decoupled head for object detection. Int. J. Mach. Learn. Cybern. 16(3): 1643-1660 (2025)
[j9]Wenjie Liu
, Zhijie Ren
:
DM-MKGC: Multimodal Knowledge Graph Completion Based on Dynamic Prompt Learning and Multi-Granularity Aggregation. IEEE Trans. Circuits Syst. Video Technol. 35(12): 11770-11782 (2025)
[i8]Junlan Feng, Fanyu Meng, Chong Long, Pengyu Cong, Duqing Wang, Yan Zheng, Yuyao Zhang, Xuanchang Gao, Ye Yuan, Yunfei Ma, Zhijie Ren, Fan Yang, Na Wu, Di Jin, Chao Deng:
JT-Safe: Intrinsically Enhancing the Safety and Trustworthiness of LLMs. CoRR abs/2510.17918 (2025)- 2024
[j8]Silong Sheng, Tianyou Zheng
, Zhijie Ren, Yang Zhang, Weiwei Fu
:
SS-MVMETRO: Semi-supervised multi-view human mesh recovery transformer. Appl. Intell. 54(6): 5027-5043 (2024)- 2023
[j7]Dahang Wan
, Rongsheng Lu
, Siyuan Shen
, Ting Xu, Xianli Lang, Zhijie Ren:
Mixed local channel attention for object detection. Eng. Appl. Artif. Intell. 123(Part C): 106442 (2023)
[j6]Dahang Wan
, Rongsheng Lu
, Ting Xu
, Siyuan Shen
, Xianli Lang
, Zhijie Ren
:
Random Interpolation Resize: A free image data augmentation method for object detection in industry. Expert Syst. Appl. 228: 120355 (2023)- 2022
[j5]Xianli Lang
, Zhijie Ren, Dahang Wan, Yuzhong Zhang, Shuangbao Shu:
MR-YOLO: An Improved YOLOv5 Network for Detecting Magnetic Ring Surface Defects. Sensors 22(24): 9897 (2022)- 2021
[c12]Zhijie Ren, Haitao Xiang, Ziheng Zhou, Ning Wang, Hanqing Jin:
AlphaBlock: An Evaluation Framework for Blockchain Consensus Algorithms. SBC@AsiaCCS 2021: 17-22- 2020
[i7]Zhijie Ren, Ziheng Zhou:
SURFACE: A Practical Blockchain Consensus Algorithm for Real-World Networks. CoRR abs/2002.07565 (2020)
[i6]Haitao Xiang, Zhijie Ren, Ziheng Zhou, Ning Wang, Hanqing Jin:
AlphaBlock: An Evaluation Framework for Blockchain Consensus Protocols. CoRR abs/2007.13289 (2020)
2010 – 2019
- 2019
[c11]Zhijie Ren, Zekeriya Erkin
:
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. Financial Cryptography 2019: 487-507
[c10]Huan Zhou, Xue Ouyang
, Zhijie Ren, Jinshu Su
, Cees de Laat, Zhiming Zhao:
A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement. INFOCOM 2019: 1567-1575- 2018
[c9]Zhijie Ren, Kelong Cong, Taico Aerts, Bart de Jonge, Alejandro Morais, Zekeriya Erkin
:
A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding. CVCBT 2018: 1-10
[c8]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin
, Reginald L. Lagendijk:
Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms. CVCBT 2018: 20-30
[c7]Kelong Cong, Zhijie Ren, Johan Pouwelse
:
A Blockchain Consensus Protocol with Horizontal Scalability. Networking 2018: 424-432
[i5]Zhijie Ren, Zekeriya Erkin:
A Scale-out Blockchain for Value Transfer with Spontaneous Sharding. CoRR abs/1801.02531 (2018)
[i4]Zhijie Ren, Zekeriya Erkin:
VAPOR: a Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. CoRR abs/1810.12596 (2018)- 2017
[j4]Zhijie Ren
, Jasper Goseling
, Jos H. Weber
, Michael Gastpar
:
Secure Transmission on the Two-Hop Relay Channel With Scaled Compute-and-Forward. IEEE Trans. Inf. Theory 63(12): 7753-7769 (2017)
[i3]Zhijie Ren, Kelong Cong, Johan Pouwelse, Zekeriya Erkin:
Implicit Consensus: Blockchain with Unbounded Throughput. CoRR abs/1705.11046 (2017)
[i2]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Information Propagation on Permissionless Blockchains. CoRR abs/1712.07564 (2017)- 2016
[c6]Pengyu Cong, Chaomin Wang, Zhijie Ren, Huixin Wang, Yanmeng Wang, Junlan Feng
:
Unsatisfied customer call detection with deep learning. ISCSLP 2016: 1-5
[c5]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
On the energy benefit of compute-and-forward for multiple unicasts. ISIT 2016: 2334-2338- 2015
[j3]Wenli Zheng, Zhijie Ren, Yifan Zhou, Jinwen Ma:
BYY harmony learning of log-normal mixtures with automated model selection. Neurocomputing 151: 1015-1026 (2015)
[c4]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Secure transmission using an untrusted relay with scaled compute-and-forward. ITW 2015: 1-5
[i1]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Secure Transmission on the Two-hop Relay Channel with Scaled Compute-and-Forward. CoRR abs/1509.04075 (2015)- 2014
[j2]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Maximum Throughput Gain of Compute-and-Forward for Multiple Unicast. IEEE Commun. Lett. 18(7): 1111-1114 (2014)- 2013
[c3]Yifan Zhou, Zhijie Ren, Jinwen Ma:
Automated Model Selection and Parameter Estimation of Log-Normal Mixtures via BYY Harmony Learning. ICIC (3) 2013: 67-72
[c2]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Compute-and-Forward: Multiple bi-directional sessions on the line network. ISIT 2013: 2344-2348
2000 – 2009
- 2009
[j1]Jinwen Ma, Jianfeng Liu, Zhijie Ren:
Parameter estimation of Poisson mixture with automated model selection through BYY harmony learning. Pattern Recognit. 42(11): 2659-2670 (2009)- 2008
[c1]Zhijie Ren, Jinwen Ma:
BYY Harmony Learning on Weibull Mixture with Automated Model Selection. ISNN (1) 2008: 589-599
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-07 23:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







