
Hui Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Hui Shi 0001 — University of Bremen, Faculty of Mathematics, Computer Science
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j23]Guochen Zhang, Hui Shi, Zhaobo Chen, Xiaobo Li:
Research on preventive maintenance strategy of multi-equipment system based on the internet of things. Int. J. Wirel. Mob. Comput. 18(2): 204-214 (2020) - [j22]Ying Ma, Kang Ping, Chen Wu, Long Chen, Hui Shi, Dazhi Chong:
Artificial Intelligence powered Internet of Things and smart public service. Libr. Hi Tech 38(1): 165-179 (2020) - [j21]Xiong Li, Yu Pan, Zhuo Fang, Hui Lei, Xiaocui Zhang, Hui Shi, Ning Ma, Philip Raine, Reagan Wetherill
, Junghoon J. Kim, Yan Wan, Hengyi Rao:
Test-retest reliability of brain responses to risk-taking during the balloon analogue risk task. NeuroImage 209: 116495 (2020) - [c48]Jing Fan
, C. T. Ng, T. C. E. Cheng, Hui Shi
:
Single Bounded Parallel-Batch Machine Scheduling with an Unavailability Constraint and Job Delivery. AAIM 2020: 525-536 - [c47]Hengyu Zhao, Yubo Zhang, Pingfan Meng, Hui Shi, Li Erran Li, Tiancheng Lou, Jishen Zhao:
Driving Scenario Perception-Aware Computing System Design in Autonomous Vehicles. ICCD 2020: 88-95 - [c46]Hui Shi, Yang Zhang, Xinyun Chen, Yuandong Tian, Jishen Zhao:
Deep Symbolic Superoptimization Without Human Knowledge. ICLR 2020 - [c45]Hui Shi, Wei Ma, Xiaoliang Zhang, Junyan Jiang, Yanbing Liu, Shujuan Chen:
A Hybrid Paper Recommendation Method by Using Heterogeneous Graph and Metadata. IJCNN 2020: 1-8 - [c44]Hengyu Zhao, Yubo Zhang, Pingfan Meng, Hui Shi, Li Erran Li, Tiancheng Lou, Jishen Zhao:
Safety Score: A Quantitative Approach to Guiding Safety-Aware Autonomous Vehicle Computing System Design. IV 2020: 1479-1485 - [c43]Hui Shi, Grace J. Gang, Junyuan Li, Eleni Liapi, Craig K. Abbey, J. Webster Stayman:
Performance assessment of texture reproduction in high-resolution CT. Medical Imaging: Image Perception, Observer Performance, and Technology Assessment 2020: 113160R - [c42]Hui Shi, Guanjie Wang:
Physical Layer Security in the Untrusted EH Relay Networks with the Cooperative Jammer. WCSP 2020: 899-903
2010 – 2019
- 2019
- [j20]Hui Shi
, Yueming Cai, Dechuan Chen, Jianwei Hu, Weiwei Yang
, Wendong Yang
:
Physical Layer Security in an Untrusted Energy Harvesting Relay Network. IEEE Access 7: 24819-24828 (2019) - [j19]Ruiqian Ma
, Weiwei Yang
, Yu Zhang, Jue Liu, Hui Shi
:
Secure mmWave Communication Using UAV-Enabled Relay and Cooperative Jammer. IEEE Access 7: 119729-119741 (2019) - [j18]Hui Shi, Ying Li:
Local discontinuous Galerkin methods with implicit-explicit multistep time-marching for solving the nonlinear Cahn-Hilliard equation. J. Comput. Phys. 394: 719-731 (2019) - [j17]Yi Xie, Jia Liu, Shufan Zhu, Dazhi Chong, Hui Shi, Yong Chen:
An IoT-based risk warning system for smart libraries. Libr. Hi Tech 37(4): 918-932 (2019) - [j16]Hui Shi, Weiwei Yang, Dechuan Chen, Yunpeng Luo, Yueming Cai:
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks. Sensors 19(1): 76 (2019) - [c41]Hui Shi, Zhenwei Peng, Honglin Wan:
Pulmonary Nodules Detection Based on CNN Multi-scale Feature Fusion. ICAIT 2019: 86-90 - [c40]Wenyong Yu, Yang Zhang, Hui Shi:
Surface Defect Inspection Under a Small Training Set Condition. ICIRA (4) 2019: 517-528 - [c39]Yuxuan Wang, Bo Yu, Hui Shi, Xinyu He, Yonggong Ren:
The Attention Based BLSTM Model Integrating Sentence Embeddings for Biomedical Event Trigger Identification. ISKE 2019: 565-570 - [c38]Ting Dong, Hui Shi, Yajie Zhu, Kai Li, Fengping Chai, Yan Wang:
Embedded Software Reliability Prediction Based on Software Life Cycle. ISKE 2019: 725-729 - [c37]Hui Shi, Ting Dong, Yanni Li, Cheng Guo, Mingchu Li:
An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain. ISKE 2019: 948-954 - [i1]Hengyu Zhao, Yubo Zhang, Pingfan Meng, Hui Shi, Li Erran Li, Tiancheng Lou, Jishen Zhao:
Towards Safety-Aware Computing System Design in Autonomous Vehicles. CoRR abs/1905.08453 (2019) - 2018
- [j15]Hui Shi, Dan Liu, Hongbin Lu, Chenguang Zhou:
A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multim. Tools Appl. 77(16): 20535-20567 (2018) - [c36]Yanqing Wang, Guanglu Sun, Hui Shi:
Research on Blended Learning Activity and Application. eLEOT 2018: 266-272 - [c35]Ying Chen, Fei Lang, Zeguang Lu, Hui Shi:
Build Up Peer Instruction Based Flipped Classroom with Social Network. eLEOT 2018: 298-304 - [c34]Yanhong Lu, Meng Zhang, Hui Shi, Xiaohong Qin:
An edge-preserving completion method for airborne equipment monitoring data. ICDSP 2018: 43-47 - [c33]Hui Shi, Wu He, Guandong Xu:
Workshop Proposal on Knowledge Discovery from Digital Libraries. JCDL 2018: 429-430 - [c32]Hui Shi, Zhongming Ma, Dazhi Chong, Wu He:
Impact of Social Media on Real Estate Sales. WEB 2018: 3-14 - 2017
- [j14]Jie Ding, Hui Shi, Jing Gong, Yuanqing Deng:
基于Camellia算法的快速流密码算法设计与特性研究 (Design and Characteristic Study on Fast Stream Cipher Algorithm Based on Camellia). 计算机科学 44(8): 146-150 (2017) - [j13]Hui Shi, Xianghai Wang, Mingchu Li, Jun Bai, Bin Feng:
Secure variable-capacity self-recovery watermarking scheme. Multim. Tools Appl. 76(5): 6941-6972 (2017) - 2016
- [j12]Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, Tie Qiu
:
An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing. IEEE Access 4: 7899-7911 (2016) - [j11]Hui Shi, Jianchao Zeng:
Real-time prediction of remaining useful life and preventive opportunistic maintenance strategy for multi-component systems considering stochastic dependence. Comput. Ind. Eng. 93: 192-204 (2016) - [j10]Hui Shi, Lizhu Liu, Ling Weng, Weiwei Cui:
The microstructure and property study of tri-layer polyimide/Al2O3 nanocomposite films. Int. J. Manuf. Technol. Manag. 30(6): 443-455 (2016) - [j9]Hui Shi, Mingchu Li, Cheng Guo, Ru Tan:
A region-adaptive semi-fragile dual watermarking scheme. Multim. Tools Appl. 75(1): 465-495 (2016) - [j8]Dan Liu, Jianmin Duan, Hui Shi:
A Strong Tracking Square Root Central Difference FastSLAM for Unmanned Intelligent Vehicle With Adaptive Partial Systematic Resampling. IEEE Trans. Intell. Transp. Syst. 17(11): 3110-3120 (2016) - [c31]Yanqing Wang, Yipu Wang, Chao-xia Shi, Hui Shi:
Research on Technology of Twin Image Recognition Based on the Multi-feature Fusion. ICYCSEE (2) 2016: 180-187 - [c30]Yanqing Wang, Yipu Wang, Chao-xia Shi, Hui Shi:
Research on Feature Fusion Technology of Fruit and Vegetable Image Recognition Based on SVM. ICYCSEE (1) 2016: 591-599 - [c29]Hui Shi, Kurt Maly, Dazhi Chong, Gongjun Yan, Wu He:
Backward Chaining Ontology Reasoning Systems with Custom Rules. WWW (Companion Volume) 2016: 381-387 - 2015
- [j7]Xiao Xiao, Hui Shi, Fanzhi Kong:
谱聚类算法研究及其在图像分割中的应用 (Spectral Clustering Algorithm and its Application in Image Segmentation). 计算机科学 42(Z11): 206-208 (2015) - [j6]Jiayu Li, Hui Shi, Yuanqing Deng, Jing Gong, Yu Guan:
针对流密码LEX的差分故障攻击及算法改进分析 (Differential Fault Attack and Analysis of Improvement on LEX). 计算机科学 42(Z11): 352-356 (2015) - [c28]Dazhi Chong, Wu He, Harris Wu, Hui Shi:
Dynamic Tagging for Enterprise Knowledge Sharing and Representation. AMCIS 2015 - [c27]Hui Shi, Zheng Sun, Yong Xu, Cheng Hu, Shan Luo, Wei Ding:
Design of the 1.0V bandgap reference on chip. ASICON 2015: 1-4 - [c26]Hongzheng Fang, Huanzhen Fan, Haodong Ma, Hui Shi, Yunfan Dong:
Lithium-ion batteries life prediction method basedon degenerative characters and improved particle filter. ICPHM 2015: 1-10 - [c25]Jianmin Duan, Dan Liu, Hongxiao Yu, Hui Shi:
An Improved FastSLAM Algorithm for Autonomous Vehicle Based on the Strong Tracking Square Root Central Difference Kalman Filter. ITSC 2015: 693-698 - 2014
- [j5]Gongjun Yan, Danda B. Rawat, Hui Shi, Awny Alnusair:
Developing and Applying Smartphone Apps in Online Courses. J. Inf. Syst. Educ. 25(2): 149-159 (2014) - [c24]Hui Shi, Kurt Maly, Steven J. Zeil:
Optimized Backward Chaining Reasoning System for a Semantic Web. WIMS 2014: 34:1-34:6 - [c23]Hui Shi, Kurt Maly, Steven J. Zeil:
Trust and hybrid reasoning for ontological knowledge bases. WWW (Companion Volume) 2014: 1189-1194 - 2011
- [c22]Hui Shi, Kurt Maly, Steven J. Zeil, Mohammad Zubair:
Comparison of ontology reasoning systems using custom rules. WIMS 2011: 16 - 2010
- [c21]Wen Cao, Hui Shi, Shu-long Zhu, Run-sheng Li:
The application of fuzzy evidence theory in optimum route planning. ICNC 2010: 4335-4337
2000 – 2009
- 2009
- [c20]Xiaoping Liu, Lin Du, Hao Ji, Hui Shi:
The visualization of constraints conflict in collaborative design. CSCWD 2009: 32-37 - 2008
- [c19]Qing Zhang, Sanyou Zeng, Rui Wang, Hui Shi, Guang Chen, Lixin X. Ding, Lishan Kang:
Constrained optimization by the evolutionary algorithm with lower dimensional crossover and gradient-based mutation. IEEE Congress on Evolutionary Computation 2008: 273-279 - [c18]Sanyou Zeng, Guang Chen, Rui Wang, Hui Li, Hui Shi, Lixin X. Ding, Lishan Kang:
A new technique for assessing the diversity of close-Pareto-optimal front. IEEE Congress on Evolutionary Computation 2008: 344-349 - 2007
- [j4]Hui Shi, Tetsushi Abe, Takahiro Asai, Hitoshi Yoshino:
Analyses of Achievable Gains in Half Duplex MIMO Relaying Schemes Using Multiple Relay Nodes. IEICE Trans. Commun. 90-B(9): 2541-2551 (2007) - [j3]Hui Shi, Tetsushi Abe, Takahiro Asai, Hitoshi Yoshino:
Relaying Schemes Using Matrix Triangularization for MIMO Wireless Networks. IEEE Trans. Commun. 55(9): 1683-1688 (2007) - [c17]Sanyou Zeng, Hui Shi, Hui Li, Guang Chen, Lixin X. Ding, Lishan Kang:
A lower-dimensional-search evolutionary algorithm and its application in constrained optimization problems. IEEE Congress on Evolutionary Computation 2007: 1255-1260 - [c16]Xiaoping Liu, Hui Shi, Qiang Lu, Zhengqiang Mao:
Visual Task-driven Based on Task Precedence Graph for Collaborative Design. CSCWD 2007: 246-251 - [c15]Marcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann:
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services. DSN 2007: 612-617 - [c14]Hui Shi, Sanyou Zeng, Hui Wang, Gang Liu, Guang Chen, Hugo de Garis, Lishan Kang:
A Novel Lower-Dimensional-Search Algorithm for Numerical Optimization. ISICA 2007: 214-223 - [c13]Hui Wang, Sanyou Zeng, Yong Liu, Wenjun Wang, Hui Shi, Gang Liu:
Re-diversification Based Particle Swarm Algorithm with Cauchy Mutation. ISICA 2007: 362-371 - [p1]Sanyou Zeng, Hui Shi, Lishan Kang, Lixin X. Ding:
Orthogonal Dynamic Hill Climbing Algorithm: ODHC. Evolutionary Computation in Dynamic and Uncertain Environments 2007: 79-104 - 2006
- [j2]Tetsushi Abe, Hui Shi, Takahiro Asai, Hitoshi Yoshino:
Relay Techniques for MIMO Wireless Networks with Multiple Source and Destination Pairs. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [j1]Hui Shi, Tetsushi Abe, Hirohito Suda:
Iterative Power Allocation Scheme for MIMO Systems. IEICE Trans. Commun. 89-B(3): 791-800 (2006) - [c12]Sangyou Zeng, Guang Chen, Liang Zheng, Hui Shi, Hugo de Garis, Lixin X. Ding, Lishan Kang:
A Dynamic Multi-Objective Evolutionary Algorithm Based on an Orthogonal Design. IEEE Congress on Evolutionary Computation 2006: 573-580 - [c11]Sanyou Zeng, Hui Shi, Guang Chen, Hugo de Garis, Lishan Kang, Lixin X. Ding:
Orthogonal Dynamic Hill-Climbing Algorithm for Dynamic Optimization Problems. IEEE Congress on Evolutionary Computation 2006: 1331-1338 - [c10]Xiaoping Liu, Hui Shi, Zhengqiang Mao, Qiang Lu:
Constraint Information Visualization Methodology for Cooperative Design. CSCWD (Selected Papers) 2006: 63-72 - [c9]Xiaoping Liu, Hui Shi, Zhengqiang Mao, Liping Zheng:
Study on Constraint Information Visualization in CSCD. CSCWD 2006: 117-122 - [c8]Sanyou Zeng, Rui Wang, Hui Shi, Guang Chen, Hugo de Garis, Lishan Kang, Lixin X. Ding:
Both robust computation and mutation operation in dynamic evolutionary algorithm are based on orthogonal design. GECCO 2006: 1437-1438 - [c7]Hui Shi, Takahiro Asai, Hitoshi Yoshino:
A "Relay Node Division Duplex" Relaying Approach for MIMO Relay Networks. PIMRC 2006: 1-5 - 2005
- [c6]Xiaoping Liu, Hui Shi, Zhengqiang Mao, Liping Zheng:
Cooperative Template Mechanism for Cooperative Design. CSCWD (Selected papers) 2005: 102-111 - [c5]Xiaoping Liu, Hui Shi, Xue-yuan Chen, Zhengqiang Mao, Liping Zheng:
Study on visual design environment of cooperative template. CSCWD (1) 2005: 157-163 - [c4]Hui Shi, Tetsushi Abe, Takahiro Asai, Hitoshi Yoshino:
A relaying scheme using QR decomposition with phase control for MIMO wireless networks. ICC 2005: 2705-2711 - 2004
- [c3]Jiahua Zhu, HongJiang Zhang, Hui Shi, Binyu Zang, Chuanqi Zhu:
Overflow Controlled SIMD Arithmetic. LCPC 2004: 424-438 - 2001
- [c2]Hui Shi, Masaaki Katayama, Takaya Yamazato, Hiraku Okada, Akira Ogawa:
An adaptive antenna selection scheme for transmit diversity in OFDM systems. VTC Fall 2001: 2168-2172
1990 – 1999
- 1996
- [c1]Hui Shi:
A Semantic Matching Algorithm: Analysis and Implementation. MFCS 1996: 517-528
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-16 23:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint