
Shijie Zhou
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Shijie Zhou 0001
— Microsoft Corporation, Redmond, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j41]Mohammed Ramadan
, Yongjian Liao
, Fagen Li, Shijie Zhou
:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j40]Dejiao Niu
, Tianquan Liu, Tao Cai
, Shijie Zhou:
The Asynchronous Training Algorithm Based on Sampling and Mean Fusion for Distributed RNN. IEEE Access 8: 62439-62447 (2020) - [j39]Chunjiang Wu
, Shijie Zhou
, Licai Xiao
:
Dynamic Path Planning Based on Improved Ant Colony Algorithm in Traffic Congestion. IEEE Access 8: 180773-180783 (2020) - [j38]Zhun Zhang
, Qihe Liu
, Shilin Qiu
, Shijie Zhou
, Cheng Zhang
:
Unknown Attack Detection Based on Zero-Shot Learning. IEEE Access 8: 193981-193991 (2020) - [j37]Yifei Xiao, Shijie Zhou, Linpeng Zhong:
Erasure Coding-Oriented Data Update for Cloud Storage: A Survey. IEEE Access 8: 227982-227998 (2020) - [j36]Ryan Missel
, Prashnna K. Gyawali, Jaideep Vitthal Murkute, Zhiyuan Li, Shijie Zhou, Amir AbdelWahab, Jason Davis, James Warren, John L. Sapp
, Linwei Wang:
A hybrid machine learning approach to localizing the origin of ventricular tachycardia using 12-lead electrocardiograms. Comput. Biol. Medicine 126: 104013 (2020) - [j35]Ihsan H. Abdulqadder
, Shijie Zhou, Deqing Zou, Israa T. Aziz, Syed Muhammad Abrar Akber:
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms. Comput. Networks 179: 107364 (2020) - [j34]Libin Shi, Wenge Rong, Shijie Zhou, Nan Jiang, Zhang Xiong:
A dual channel class hierarchy based recurrent language modeling. Neurocomputing 418: 291-299 (2020) - [j33]Ashir Javeed, Sanam Shahla Rizvi
, Shijie Zhou, Rabia Riaz, Shafqat Ullah Khan, Se Jin Kwon
:
Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification. Mob. Inf. Syst. 2020: 8843115:1-8843115:11 (2020) - [j32]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020) - [j31]Juan Chen, Shijie Zhou
, Zhao Kang, Quan Wen:
Locality-constrained group lasso coding for microvessel image classification. Pattern Recognit. Lett. 130: 132-138 (2020) - [c38]Yanmeng Wang, Wenge Rong, Shijie Zhou, Yuanxin Ouyang, Zhang Xiong:
Dynamic Multi-level Attention Models for Dialogue Response Generation. DCAI (Special Sessions) 2020: 62-71 - [c37]Ihsan H. Abdulqadder, Shijie Zhou, Deqing Zou, Israa T. Aziz, Syed Muhammad Abrar Akber:
Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT. ICCT 2020: 499-507 - [c36]Deleli Mesay Adinew, Zhou Shijie, Yongjian Liao:
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing. ICDE 2020: 2049-2053 - [c35]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. TrustCom 2020: 623-630 - [i2]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries. CoRR abs/2010.08958 (2020) - [i1]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
the Connection between Cryptography and Differential Privacy: a Survey. CoRR abs/2011.00976 (2020)
2010 – 2019
- 2019
- [j30]Yongjian Liao
, Hongjie Chen, Wen Huang, Mohammed Ramadan, Hongtao Pan, Shijie Zhou:
Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access 7: 25087-25094 (2019) - [j29]Wen Huang
, Yongjian Liao
, Shijie Zhou, Hongjie Chen:
An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection. IEEE Access 7: 43453-43461 (2019) - [j28]Yu Fan
, Yongjian Liao
, Fagen Li, Shijie Zhou, Ganglin Zhang
:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - [j27]Yanghong Zhou, P. Y. Mok
, Shijie Zhou:
A Part-Based Deep Neural Network Cascade Model for Human Parsing. IEEE Access 7: 160101-160111 (2019) - [j26]Muhammad Asim Saleem
, Shijie Zhou
, Abida Sharif
, Tanzila Saba, Muhammad Azam Zia, Ashar Javed, Sudipta Roy
, Mamta Mittal
:
Expansion of Cluster Head Stability Using Fuzzy in Cognitive Radio CR-VANET. IEEE Access 7: 173185-173195 (2019) - [j25]Ashir Javeed, Shijie Zhou, Yongjian Liao
, Iqbal Qasim
, Adeeb Noor
, Redhwan Nour:
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection. IEEE Access 7: 180235-180243 (2019) - [j24]Wen Huang
, Shijie Zhou
, Yongjian Liao
, Ming Zhuo
:
Optimizing Query Times for Multiple Users Scenario of Differential Privacy. IEEE Access 7: 183292-183299 (2019) - [j23]Wen Huang
, Shijie Zhou
, Yongjian Liao
, Hongjie Chen:
An Efficient Differential Privacy Logistic Classification Mechanism. IEEE Internet Things J. 6(6): 10620-10626 (2019) - [j22]Muhammad Asim Saleem
, Zhou Shijie, Abida Sharif:
Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion. Mob. Networks Appl. 24(1): 248-258 (2019) - [j21]Yaolu Liu, Shijie Zhou, Huiming Ning
, Cheng Yan
, Ning Hu
:
An Inverse Approach of Damage Identification Using Lamb Wave Tomography. Sensors 19(9): 2180 (2019) - [j20]Shijie Zhou, John L. Sapp
, Fady Dawoud, B. Milan Horácek
:
Localization of Activation Origin on Patient-Specific Epicardial Surface by Empirical Bayesian Method. IEEE Trans. Biomed. Eng. 66(5): 1380-1389 (2019) - [j19]Shijie Zhou, John L. Sapp
, Petr Stovícek, B. Milan Horácek
:
Localization of Activation Origin on Patient-Specific Endocardial Surface by the Equivalent Double Layer (EDL) Source Model With Sparse Bayesian Learning. IEEE Trans. Biomed. Eng. 66(8): 2287-2295 (2019) - [c34]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics. ICNCC 2019: 75-78 - 2018
- [j18]Yongjian Liao
, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j17]Yongjian Liao, Yichuan He, Fagen Li, Shijie Zhou:
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces 56: 101-106 (2018) - [j16]Yongjian Liao
, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - [j15]Xiaoqiang Sun, Xiangyan Ding, Feilong Li, Shijie Zhou, Yaolu Liu, Ning Hu
, Zhongqing Su
, Youxuan Zhao
, Jun Zhang, Mingxi Deng:
Interaction of Lamb Wave Modes with Weak Material Nonlinearity: Generation of Symmetric Zero-Frequency Mode. Sensors 18(8): 2451 (2018) - [c33]Shijie Zhou, John L. Sapp, Amir AbdelWahab, Milan Horacek:
An algorithm for imaging isochrones of ventricular activation on patient-specific epicardial surface. CinC 2018: 1-4 - 2017
- [j14]Chenyang Xia
, Wei Wang
, Guoping Chen
, Xiaojie Wu, Shijie Zhou, Yanjing Sun:
Robust Control for the Relay ICPT System Under External Disturbance and Parametric Uncertainty. IEEE Trans. Control. Syst. Technol. 25(6): 2168-2175 (2017) - [c32]Qihe Liu, Shijie Zhou, Xianqiong Cheng, Hongrong Cheng, Huabo Zhang:
Gas Sensor Drift Compensation by an Optimal Linear Transformation. BigCom 2017: 193-199 - [c31]Shijie Zhou, Qihe Liu, Jin Xu, Yaqi He:
An Anti-collision Algorithm Based on Task Scheduling Model in RFID System. BigCom 2017: 284-290 - [c30]Zhe Fu, Shijie Zhou, Jun Li:
bitFA: A Novel Data Structure for Fast and Update-friendly Regular Expression Matching. SIGCOMM Posters and Demos 2017: 130-132 - [c29]Junfeng Zhou, Shijie Zhou, Jeffrey Xu Yu, Hao Wei, Ziyang Chen, Xian Tang:
DAG Reduction: Fast Answering Reachability Queries. SIGMOD Conference 2017: 375-390 - 2016
- [j13]Yanghong Zhou, Shijie Zhou, Jiaqing Luo:
Explore city dynamics from the communication network between base stations. Int. J. Embed. Syst. 8(1): 87-92 (2016) - [j12]Shijie Zhou, Yun Liu, Jin Xu:
Modeling RFID readers deployment in three-dimensional space. Int. J. RF Technol. Res. Appl. 7(2-3): 131-152 (2016) - [j11]Shijie Zhou, Chunting Chris Mi
:
Multi-Paralleled LCC Reactive Power Compensation Networks and Their Tuning Method for Electric Vehicle Dynamic Wireless Charging. IEEE Trans. Ind. Electron. 63(10): 6546-6556 (2016) - [c28]Tengyuan Cai, Hongrong Cheng, Jiaqing Luo, Shijie Zhou:
An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation. ER 2016: 248-259 - 2015
- [j10]Zhu Song, Shijie Zhou, Jiaqing Luo, Weiwei Deng:
The B+-tree-based method for nearest neighbour queries in traffic simulation systems. Int. J. High Perform. Comput. Netw. 8(2): 110-123 (2015) - [j9]Shijie Zhou:
A Survey on Fast-flux Attacks. Inf. Secur. J. A Glob. Perspect. 24(4-6): 79-97 (2015) - [j8]Xuhua Yang, Shijie Zhou:
基于重叠社团划分的大规模道路网络双层路由算法 (Double Layers Routing Algorithm on Large Road Networks Based on Overlapping Communities Detecting). 计算机科学 42(Z6): 285-289 (2015) - [c27]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c26]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c25]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6 - 2014
- [j7]Shijie Zhou, Jiaqing Luo:
A general approach for the intensive RFID reader deployment. Int. J. Ad Hoc Ubiquitous Comput. 16(3): 206-215 (2014) - [j6]Nianyi Wang, Yide Ma, Weilan Wang, Shijie Zhou:
An Image Fusion Method Based on NSCT and Dual-channel PCNN Model. J. Networks 9(2): 501-506 (2014) - [c24]Mengjie Zhang, Shijie Zhou, Dou Wu:
Research on Dynamic Load Balancing Technology Based on Simulation Terminal Pool. PACIS 2014: 178 - [c23]Yuping Zhao, Shijie Zhou, Jiaqing Luo, Zhu Song:
The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation. PACIS 2014: 179 - [c22]Mantun Chen, Shijie Zhou, Jiaqing Luo, Zhu Song:
An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System. PACIS 2014: 184 - 2013
- [j5]Jiaqing Luo, Bin Xiao
, Shijie Zhou:
A bottom-up model for heterogeneous BitTorrent systems. J. Parallel Distributed Comput. 73(8): 1116-1126 (2013) - [j4]Jiaqing Luo, Bin Xiao
, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - [c21]Shijie Zhou, Yun Liu, Jiaqing Luo:
A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space. MSN 2013: 115-120 - [c20]Lijun Sun, Shijie Zhou, Jiaqing Luo, Yuehan Zhang, Mengjie Zhang, Weiwei Deng:
ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking. MSN 2013: 248-253 - 2012
- [c19]Leyuan Liu, Weiqiang Kong, Shijie Zhou, Zhiguang Qin, Akira Fukuda:
Formal Verification of Communicating HSTM Designs. CIT 2012: 383-390 - [c18]Yi Pu, Shijie Zhou, Jason Gu, Hao Chen, Chenjin Zhang:
A novel linear switch reluctance generator system. ICAL 2012: 421-427 - 2011
- [j3]Sheng Yu, Shijie Zhou, Leyuan Liu, Rui Yang, Jiaqing Luo:
Detecting Malware Variants by Byte Frequency. J. Networks 6(4): 638-645 (2011) - [c17]Shijie Zhou, Zichen Zhang, Jason Gu:
Time-domain ECG signal analysis based on smart-phone. EMBC 2011: 2582-2585 - [c16]Shijie Zhou, Zichen Zhang, Jason Gu:
Interpretation of coarse-graining of Lempel-Ziv complexity measure in ECG signal analysis. EMBC 2011: 2716-2719 - 2010
- [j2]Shijie Zhou, Zhen Zhang, Zongwei Luo
, Edward C. Wong:
A lightweight anti-desynchronization RFID authentication protocol. Inf. Syst. Frontiers 12(5): 521-528 (2010) - [c15]Jiaqing Luo, Bin Xiao
, Zirong Yang, Shijie Zhou:
A clone of social networks to decentralized bootstrapping P2P networks. IWQoS 2010: 1-2 - [c14]Sheng Yu, Shijie Zhou, Sha Wang:
Fast-flux attack network identification based on agent lifespan. WCNIS 2010: 658-662
2000 – 2009
- 2009
- [c13]Jiaqing Luo, Bin Xiao
, Guobin Liu, Qingjun Xiao, Shijie Zhou:
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. IPDPS 2009: 1-8 - [c12]Chengyu Fan, Shijie Zhou, Fagen Li:
An Identity-Based Restricted Deniable Authentication Protocol. ISPA 2009: 474-478 - [c11]Lan Luo, Zhiguang Qin, Shijie Zhou:
A Comment to the Intelligent Functions of Different Weight Ciphers. WKDD 2009: 531-534 - 2008
- [j1]Fagen Li, Shijie Zhou, Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1820-1823 (2008) - [c10]Zhen Zhang, Shijie Zhou, Zongwei Luo
:
Design and Analysis for RFID Authentication Protocol. ICEBE 2008: 574-577 - [c9]Rui Yang, Shijie Zhou, Chengyu Fan:
A New Algorithm for Network Diameter. ICYCS 2008: 247-252 - [c8]Chengyu Fan, Shijie Zhou, Fagen Li:
Deniable Proxy-Anonymous Signatures. ICYCS 2008: 2131-2136 - [c7]Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. IIH-MSP 2008: 64-67 - 2007
- [c6]Chunjiang Wu, Shijie Zhou, Linna Wei, Jiaqing Luo, Yanli Wang, Xiaoqian Yang:
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems. ICA3PP 2007: 391-402 - 2006
- [c5]Shijie Zhou, Zhiguang Qin, Xiaomei Zhao, Xucheng Luo:
Interconnected Peer-to-Peer Network: A Community Based Scheme. AICT/ICIW 2006: 108 - [c4]Jiaqing Luo, Shijie Zhou, Chunjiang Wu:
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks. IAT Workshops 2006: 467-470 - 2004
- [c3]Feng Zhang, Zhiguang Qin, Shijie Zhou:
Policy-Tree Based Proactive Defense Model for Network Security. GCC Workshops 2004: 437-449 - 2003
- [c2]Shijie Zhou, Zhiguang Qin, Jinde Liu:
Distributing the Keys into P2P Network. GCC (1) 2003: 460-463 - [c1]Shijie Zhou, Zhiguang Qin, Feng Zhang, Xianfeng Zhang, Wei Chen, Jinde Liu:
Colored Petri Net Based Attack Modeling. RSFDGrC 2003: 715-718
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-19 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint