


default search action
Jie Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jie Shi 0001
— Arizona State University, School of Computing, Informatics, and Decision Systems Engineering, Tempe, AZ, USA - Jie Shi 0002
— University of California, Riverside, Department of Electrical and Computer Engineering, CA, USA - Jie Shi 0003
— Nanjing University of Science and Technology, School of Electronic Engineering and Optoelectronic Technology, Zijin College, China - Jie Shi 0004
— University of Science and Technology Beijing, Design and Research Institute Company Ltd, China - Jie Shi 0005
— Huawei International, Singapore - Jie Shi 0006
— Universiteit Utrecht, Utrecht, The Netherlands - Jie Shi 0007
— Ocean University of China, Qingdao, Shandong, China - Jie Shi 0008
— AsiaInfo Technology (Chengdu) Co., Ltd., China - Jie Shi 0009
— Southern University of Science and Technology, Shenzhen, China - Jie Shi 0010
— Fudan University, Shanghai, China - Jie Shi 0011
— North Automatic Control Technology Institute, Taiyuan, China - Jie Shi 0012
— Hebei University, Baoding, China - Jie Shi 0013
— Huawei International, Singapore - Jie Shi 0014
— Shanghai University, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j40]Xin Wen
, Shijie Guo
, Li Dong, Xiaobo Liu, Wenbo Ning, Jie Shi, Songhua Liu, Cheng Luo, Rui Cao
, Dezhong Yao
:
A consistency-driven pseudo-labeling framework for robust functional connectivity modeling in neuropsychiatric disorder diagnosis. Eng. Appl. Artif. Intell. 166: 113556 (2026)
[j39]Xiaoxia Liu, Jingyi Wang, Hsiao-Ying Lin, Chengfang Fang, Jie Shi, Xiaodong Zhang, Wenhai Wang:
Semantic-aware testing for object detection systems. Inf. Softw. Technol. 189: 107888 (2026)
[i15]Qingyu Liu, Zhongjie Ba, Jianmin Guo, Qiu Wang, Zhibo Wang
, Jie Shi, Kui Ren:
R2BD: A Reconstruction-Based Method for Generalizable and Efficient Detection of Fake Images. CoRR abs/2601.08867 (2026)- 2025
[j38]Rui Wang, Qifan Ma, Yong Zhang, Jie Shi, Hongbo Zhao, Ying Yuan, Xiaofeng Tao:
A novel synthetic MRI for discrimination of oral cavity and oropharynx malignancy. BMC Medical Imaging 25(1): 447 (2025)
[j37]Yikun Li, Jie Shi:
Multimodal deep learning for art behavior analysis and personalized teaching path generation. Discov. Artif. Intell. 5(1): 215 (2025)
[j36]Haoxiang Su
, Hongyan Xie, Jie Shi, Di Wu, Liting Jiang, Hao Huang, Zhongjiang He, Yongxiang Li, Ruiyu Fang, Jianyu Zhao, Shuangyong Song:
RAICL-DSC: Retrieval-Augmented In-Context Learning for Dialogue State Correction. Knowl. Based Syst. 317: 113423 (2025)
[j35]Jie Shi, Tianqing Yang, Zheng Zhang:
New criteria for stability of fuzzy neutral-type memristive neural networks with mixed delays. Int. J. Mach. Learn. Cybern. 16(12): 10913-10924 (2025)
[j34]Shaohui Lv, Wenjing Xu, Jie Shi, Pucha Song, Haiquan Zhao
:
Robust maximum versoria criterion adaptive filtering algorithm against non-Gaussian noises and censored observation. Signal Image Video Process. 19(13): 1108 (2025)
[j33]Jie Shi, Huanhuan Kang:
Analysis of the potential and charm of LED new energy in stage design. Serv. Oriented Comput. Appl. 19(2): 175-185 (2025)
[j32]Jie Shi, Jiaxin Wu, Jingzheng Chong, Zhihua Yang
:
Collaborative Spectrum Sensing for Multi-UAV System: A U-Net Approach With Uncertainty Awareness. IEEE Trans. Veh. Technol. 74(9): 14760-14774 (2025)
[c42]Chenhao Huang, Ziyu Shen, Yicong Ren, Huiyuan Zheng, Jiazheng Zhang, Mingxu Chai, Ming Zhang, Shihan Dou, Fan Mo, Jie Shi, Tao Gui, Qi Zhang, Xuanjing Huang:
Governance in Motion: Co-evolution of Constitutions and AI models for Scalable Safety. EMNLP 2025: 17187-17210
[c41]Xiaolei Chen, Jia Chen, Jie Shi, Peng Wang, Wei Wang:
EPAS: Efficient Online Log Parsing via Asynchronous Scheduling of LLM Queries. ICDE 2025: 4025-4037
[c40]Xiao Li, Wenxuan Sun, Huanran Chen, Qiongxiu Li, Yingzhe He, Jie Shi, Xiaolin Hu:
ADBM: Adversarial Diffusion Bridge Model for Reliable Adversarial Purification. ICLR 2025
[c39]Jie Shi, Xin Wen, Shijie Guo, Robert H. Deng, Jianan Xie, Rui Cao:
Multi-Level Normalizing Flow for Comprehensive Anomaly Detection and Localization. ICME 2025: 1-6
[c38]Jie Shi, Yijie Liu, Caiming Sun:
Mamba: Efficient Multi-channel Attention Temporal Network for Sleep Recognition. PRCV (14) 2025: 220-233
[i14]Xiao Li, Yiming Zhu, Yifan Huang, Wei Zhang, Yingzhe He, Jie Shi, Xiaolin Hu:
PBCAT: Patch-based composite adversarial training against physically realizable attacks on object detection. CoRR abs/2506.23581 (2025)
[i13]Filippo Utro, Meltem Tolunay, Kahn Rhrissorrakrai, Tanvi P. Gujarati, Jie Shi, Sara Capponi, Mirko Amico, Nathan Earnest-Noble, Laxmi Parida:
Enhanced Prediction of CAR T-Cell Cytotoxicity with Quantum-Kernel Methods. CoRR abs/2507.22710 (2025)- 2024
[j31]Hao Dong, Jie Shi, Jiale Linghu:
Higher-order multi-scale computational approach and its convergence for nonlocal gradient elasticity problems of composite materials. Comput. Math. Appl. 163: 66-83 (2024)
[j30]Jie Shi, Qiupeng Liu, Chunlei Shi, Mingming Lv, Wenli Pang:
Intuitionistic Fuzzy Sequential Three-Way Decision Model in Incomplete Information Systems. Symmetry 16(9): 1244 (2024)
[j29]Shiqiu Meng, Jie Shi, Bin Hu
:
Computational Aids on Mental Health: Revolutionizing Care in the Digital Age. IEEE Trans. Comput. Soc. Syst. 11(5): 5559-5576 (2024)
[c37]Jie Shi, Ying Su, Xiaoyi Lv, Xuecong Tian
:
DDA-NG: Fusing Non-negative Matrix Factorization and Graph Tranformer to Enhance Potential Dmg-Disease Associations. ICCEIC 2024: 418-422
[c36]Yip Keng Kan, Ke Xu, Hao Li, Jie Shi:
VoiceDefense: Protecting Automatic Speaker Verification Models Against Black-box Adversarial Attacks. INTERSPEECH 2024
[i12]Xiao Li, Wenxuan Sun, Huanran Chen, Qiongxiu Li, Yining Liu, Yingzhe He, Jie Shi, Xiaolin Hu:
ADBM: Adversarial diffusion bridge model for reliable adversarial purification. CoRR abs/2408.00315 (2024)
[i11]Qiongxiu Li
, Lixia Luo, Agnese Gini, Changlong Ji
, Zhanhao Hu, Xiao Li, Chengfang Fang, Jie Shi, Xiaolin Hu:
Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem. CoRR abs/2409.14260 (2024)- 2023
[j28]Ding Zhi, Lihua Xie, Yong Xia, Jie Shi:
Cigarette Production Line Flow Automatic Control System Based on PLC Technology and Embedded Software. Scalable Comput. Pract. Exp. 24(4): 1185-1190 (2023)
[j27]Feng Chen
, Ke Ma, Yapeng Mao, Desen Yang, Yi Zhang
, Jie Shi, Shiqi Mo
, Chenyang Gui, Song Li
:
A Novel Method to Design Steerable Differential Beamformer Using Linear Acoustics Vector Sensor Array. IEEE ACM Trans. Audio Speech Lang. Process. 31: 2836-2849 (2023)
[j26]Rixuan Qiu, Jiawen Bao, Yuancheng Li
, Xin Zhou, Liang Liang, Hui Tian, Yanting Zeng, Jie Shi:
Virtual network function deployment algorithm based on graph convolution deep reinforcement learning. J. Supercomput. 79(6): 6849-6870 (2023)
[c35]Zhenxing Hu, Shengjie Guan, Wenbo Xu, Zhen Xiao
, Jie Shi, Pengze Li, Qiuyu Ding, Hui Ding, Chao Zeng:
A Data Flow Framework with High Throughput and Low Latency for Permissioned Blockchains. ICDCS 2023: 1-12
[c34]Mengao Zhang, Ke Xu, Hao Li, Lei Wang
, Chengfang Fang, Jie Shi:
DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures. INTERSPEECH 2023: 4014-4018
[c33]Jie Shi, Jingzheng Chong, Zejiang Huang, Zhihua Yang:
A Multi-UAVs Cooperative Spectrum Sensing Method Based on Improved IDW Algorithm. SINC 2023: 150-163
[i10]Shengming Yin, Chenfei Wu, Jian Liang, Jie Shi, Houqiang Li, Gong Ming, Nan Duan:
DragNUWA: Fine-grained Control in Video Generation by Integrating Text, Image, and Trajectory. CoRR abs/2308.08089 (2023)- 2022
[j25]Fengli Lu, Chengcai Fu, Guoying Zhang, Jie Shi:
Adaptive multi-scale feature fusion based U-net for fracture segmentation in coal rock images. J. Intell. Fuzzy Syst. 42(4): 3761-3774 (2022)
[j24]Fengli Lu
, Chengcai Fu, Jie Shi, Guoying Zhang:
Attention based deep neural network for micro-fracture extraction of sequential coal rock CT images. Multim. Tools Appl. 81(18): 26463-26482 (2022)
[j23]Wei Liu, Xu Liu, Yuan Hu, Jie Shi, Xinqiang Chen
, Jiansen Zhao, Shengzheng Wang, Qingsong Hu:
Fall Detection for Shipboard Seafarers Based on Optimized BlazePose and LSTM. Sensors 22(14): 5449 (2022)
[j22]Jiayin Song, Jie Shi, Hongwei Zhou, Wenlong Song, Hongju Zhou, Yue Zhao:
Imaging of Insect Hole in Living Tree Trunk Based on Joint Driven Algorithm of Electromagnetic Inverse Scattering. Sensors 22(24): 9840 (2022)
[j21]Changjiang Li
, Shouling Ji
, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo
, Zonghui Wang
, Ting Wang
:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Trans. Dependable Secur. Comput. 19(6): 3987-4001 (2022)
[c32]Jinghao Wang, Chenling Cui, Xuejun Wen, Jie Shi:
TransPatch: A Transformer-based Generator for Accelerating Transferable Patch Generation in Adversarial Attacks Against Object Detection Models. ECCV Workshops (1) 2022: 317-331
[i9]Jie Shi, Chenfei Wu
, Jian Liang, Xiang Liu, Nan Duan
:
DiVAE: Photorealistic Images Synthesis with Denoising Diffusion Decoder. CoRR abs/2206.00386 (2022)- 2021
[c31]Zihao Qin, Hsiao-Ying Lin, Jie Shi:
Towards Demystifying Adversarial Robustness of Binarized Neural Networks. ACNS Workshops 2021: 439-462
[c30]Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. CCS 2021: 516-534
[c29]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CCS 2021: 3141-3158
[c28]Jie Ren, Die Zhang, Yisen Wang, Lu Chen, Zhanpeng Zhou, Yiting Chen, Xu Cheng, Xin Wang, Meng Zhou, Jie Shi, Quanshi Zhang:
Towards a Unified Game-Theoretic View of Adversarial Perturbations and Robustness. NeurIPS 2021: 3797-3810
[i8]Xiao Li, Jianmin Li, Ting Dai, Jie Shi, Jun Zhu, Xiaolin Hu:
Rethinking Natural Adversarial Examples for Classification Models. CoRR abs/2102.11731 (2021)
[i7]Haowen Liu, Ping Yi, Hsiao-Ying Lin, Jie Shi, Weidong Qiu:
DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction. CoRR abs/2103.06487 (2021)
[i6]Jie Ren, Die Zhang, Yisen Wang, Lu Chen, Zhanpeng Zhou, Xu Cheng, Xin Wang, Yiting Chen, Jie Shi, Quanshi Zhang:
Game-theoretic Understanding of Adversarially Learned Features. CoRR abs/2103.07364 (2021)
[i5]Xinyi Zhang, Chengfang Fang, Jie Shi:
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack. CoRR abs/2104.05921 (2021)
[i4]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CoRR abs/2111.00197 (2021)- 2020
[j20]Shengguo Shi, Ying Li
, Desen Yang, Aifei Liu
, Jie Shi:
Sparse representation based direction-of-arrival estimation using circular acoustic vector sensor arrays. Digit. Signal Process. 99: 102675 (2020)
[j19]Yongcai Hu, Wei Sun, Xigang Liu, Quan Gan, Jie Shi:
Tourism demonstration system for large-scale museums based on 3D virtual simulation technology. Electron. Libr. 38(2): 367-381 (2020)
[j18]Shengkai Yue, Minglei Yuan, Tong Lu
, Palaiahnakote Shivakumara
, Michael Blumenstein, Jie Shi, G. Hemantha Kumar:
Rotation invariant angle-density based features for an ice image classification system. Expert Syst. Appl. 162: 113744 (2020)
[j17]Jie Shi, Xiangrui Zeng, Rui Jiang, Tao Jiang
, Min Xu
:
A simulated annealing approach for resolution guided homogeneous cryo-electron microscopy image selection. Quant. Biol. 8(1): 51-63 (2020)
[j16]Mingyu Gao, Chao Chen
, Jie Shi, Chun Sing Lai
, Yuxiang Yang
, Zhekang Dong
:
A Multiscale Recognition Method for the Optimization of Traffic Signs Using GMM and Category Quality Focal Loss. Sensors 20(17): 4850 (2020)
[c27]Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi:
Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence. AISec@CCS 2020: 1-12
[c26]Hsiao-Ying Lin, Chengfang Fang, Jie Shi:
Bident Structure for Neural Network Model Protection. ICISSP 2020: 377-384
[i3]Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang:
Deep Quaternion Features for Privacy Protection. CoRR abs/2003.08365 (2020)
[i2]Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng
, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang:
Rotation-Equivariant Neural Networks for Privacy Protection. CoRR abs/2006.13016 (2020)
[i1]Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi:
Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence. CoRR abs/2009.13033 (2020)
2010 – 2019
- 2019
[j15]Hualu Zhang, Jie Shi, Boya Deng, Gangyong Jia
, Guangjie Han
, Lei Shu:
MCTE: Minimizes Task Completion Time and Execution Cost to Optimize Scheduling Performance for Smart Grid Cloud. IEEE Access 7: 134793-134803 (2019)
[c25]Jie Shi, Tianbing Zhang, Songlin Wang, Boya Deng, Gangyong Jia, Guangjie Han
:
A New Task Scheduling for Minimizing Completion Time and Execution Cost in Smart Grid Cloud. ComComAP 2019: 151-156
[c24]Yangyang Zhao, Boya Deng, Hui Chen, Hualu Zhang, Jie Shi, Zhengwei Xu, Xingyang Zhu, Guangjie Han
:
An Evaluation Strategy of Energy Storage Construction for Industrial Users Based on K-Means Clustering Algorithm. ComComAP 2019: 396-401- 2018
[j14]Jie Shi, Hualu Zhang, Yang Bai, Guangjie Han
, Gangyong Jia:
A Novel Data Aggregation Preprocessing Algorithm in Flash Memory for Iot Based Power Grid Storage System. IEEE Access 6: 57279-57290 (2018)
[c23]Hai-yang Ding, Run-dong Yang, Jie Shi, Pei-fei Song:
A (k, n) Visual Cryptography Based on Shamir's Secret Sharing. ICMSSP 2018: 17-23
[c22]Xuerong Wu, Palaiahnakote Shivakumara
, Liping Zhu, Hualu Zhang, Jie Shi, Tong Lu, Umapada Pal, Michael Blumenstein:
Fourier Transform based Features for Clean and Polluted Water Image Classification. ICPR 2018: 1707-1712
[c21]Heng Zhang, Huan Zhou, Wenming Jiao, Jie Shi, Qiyan Zang, Jing Sun, Jian Zhang:
Biological Features De-identification in Iris Images. I-SPAN 2018: 67-71- 2017
[j13]Lanyue Zhang, Dandan Ding, Desen Yang, Jia Wang, Jie Shi:
Sound Source Localization Using Non-Conformal Surface Sound Field Transformation Based on Spherical Harmonic Wave Decomposition. Sensors 17(5): 1087 (2017)- 2016
[j12]Jie Shi, Yinya Li
, Guoqing Qi, Andong Sheng:
Extended target tracking filter with intermittent observations. IET Signal Process. 10(6): 592-602 (2016)
[j11]Zongmin Cui, Hong Zhu
, Jie Shi, Lianhua Chi, Ke Yan:
Efficient authorisation update on cloud data. Int. J. Web Grid Serv. 12(2): 109-141 (2016)- 2015
[j10]Zongda Wu, Jie Shi, Chenglang Lu, Enhong Chen, Guandong Xu, Guiling Li, Sihong Xie, Philip S. Yu:
Constructing plausible innocuous pseudo queries to protect user query intention. Inf. Sci. 325: 215-226 (2015)
[c20]Yang Yu, Jie Shi, Ke He, Peng Han:
A Reservation Multichannel MAC Protocol Utilize Blind Source Separation. ICIRA (3) 2015: 106-115- 2014
[j9]Jie Shi, Zhaohao Ding, Wei-Jen Lee, Yongping Yang, Yongqian Liu, Mingming Zhang:
Hybrid Forecasting Model for Very-Short Term Wind Power Forecasting Based on Grey Relational Analysis and Wind Speed Distribution Features. IEEE Trans. Smart Grid 5(1): 521-526 (2014)
[c19]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng
, Jian Weng
:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435
[c18]Jie Shi, Su Mon Kywe, Yingjiu Li:
Batch Clone Detection in RFID-enabled supply chain. IEEE RFID 2014: 118-125
[c17]Yang Yu, Jie Shi, Ke He:
A Multichannel MAC Protocol for Underwater Acoustic Sensor Networks. WUWNet 2014: 2:1-2:5- 2013
[c16]Jie Shi, Ge Fu, Jian Weng
, Hong Zhu:
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases. EIDWT 2013: 385-392
[c15]Zongmin Cui, Hong Zhu
, Jie Shi, Lianhua Chi, Ke Yan:
Lightweight Management of Authorization Update on Cloud Data. ICPADS 2013: 456-461
[c14]Su Mon Kywe, Yingjiu Li, Jie Shi:
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service. RFID-TA 2013: 1-6
[c13]Jie Shi, Qin Yan, Huijuan Shi, Yapeng Wang:
Visual attention based image zero watermark scheme with ensemble similarity. WCSP 2013: 1-5- 2012
[j8]Jie Shi, Yingjiu Li, Wei He, Darren Sim:
SecTTS: A secure track & trace system for RFID-enabled supply chains. Comput. Ind. 63(6): 574-585 (2012)
[j7]Jie Shi, Yingjiu Li, Robert H. Deng
:
A secure and efficient discovery service system in EPCglobal network. Comput. Secur. 31(8): 870-885 (2012)
[j6]Mark Roantree
, Jie Shi, Paolo Cappellari, Martin F. O'Connor, Michael Whelan, Niall Moyna:
Data transformation and query management in personal health sensor networks. J. Netw. Comput. Appl. 35(4): 1191-1202 (2012)
[j5]Jie Shi, Shilin Xiao, Lilin Yi, Meihua Bi:
A Sensitivity-Enhanced Refractive Index Sensor Using a Single-Mode Thin-Core Fiber Incorporating an Abrupt Taper. Sensors 12(4): 4697-4705 (2012)
[c12]Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng
:
SecDS: a secure EPC discovery service system in EPCglobal network. CODASPY 2012: 267-274
[c11]Jie Shi, Yingjiu Li, Robert H. Deng
, Kevin Chiew:
Design and Implementation of a Secure Prototype for EPCglobal Network Services. RFIDSec Asia 2012: 45-56- 2011
[j4]Fan Wang, Huotao Gao, Lin Zhou, Qingchen Zhou, Jie Shi, Yuxiang Sun
:
Design and FPGA implementation of digital pulse compression for HF chirp radar based on modified orthogonal transformation. IEICE Electron. Express 8(20): 1736-1742 (2011)
[c10]Paolo Cappellari, Jie Shi, Mark Roantree
, Crionna Tobin, Niall Moyna:
Enabling Knowledge Extraction from Low Level Sensor Data. DEXA (2) 2011: 411-419
[c9]Juntao Xue, Shiming Wang, Jie Shi:
Serial fingerprint device driver development based on EFI. EMEIT 2011: 299-302
[c8]Jie Shi, Wei-Jen Lee, Yongqian Liu, Yongping Yang, Peng Wang:
Forecasting power output of photovoltaic system based on weather classification and support vector machine. IAS 2011: 1-6- 2010
[j3]Jie Shi, Hong Zhu
:
A fine-grained access control model for relational databases. J. Zhejiang Univ. Sci. C 11(8): 575-586 (2010)
2000 – 2009
- 2009
[c7]Jie Shi, Hong Zhu
, Ge Fu, Tao Jiang:
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs. ACIS-ICIS 2009: 469-474
[c6]Jie Shi, Zhenkuan Pan, Weibo Wei:
An Innovative Variational Level Set Model for Multiphase Image Segmentation. MUE 2009: 41-44
[c5]Mark Roantree
, Michael Whelan, Jie Shi, Niall Moyna:
Using Sensor Networks to Measure Intensity in Sporting Activities. QSHINE 2009: 598-612- 2008
[c4]Jie Shi, Weiling Wu:
Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying. CSSE (3) 2008: 1077-1080
[c3]Hong Zhu, Ge Fu, Yi Zhu, Renchao Jin, Kevin Lü
, Jie Shi:
Dynamic data recovery for database systems based on fine grained transaction log. IDEAS 2008: 249-253
[c2]Tao Jiang, Yucai Feng, Bin Zhang, Jie Shi, Yuanzhen Wang:
Finding Motifs of Financial Data Streams in Real Time. ISICA 2008: 546-555
[c1]Hong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng:
Controlling Information Leakage of Fine-Grained Access Model in DBMSs. WAIM 2008: 583-590- 2007
[j2]Sarah Dorner
, Jie Shi, David A. Swayne:
Multi-objective modelling and decision support using a Bayesian network approximation to a non-point source pollution model. Environ. Model. Softw. 22(2): 211-222 (2007)
1980 – 1989
- 1988
[j1]Jie Shi, Serge Monchaud, Raymond Prat, Ivan Kas:
Control of motors by microprocessors for space positioning and localization. Microprocess. Microprogramming 23(1-5): 339-344 (1988)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-15 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







