default search action
Jizhong Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zejia Lyu, Jizhong Shen:
An efficient algorithm for estimating gate-level power consumption in large-scale integrated circuits. Microelectron. J. 146: 106143 (2024) - 2023
- [j21]Jiaming Shen, Fangjun Liu, Jizhong Shen:
Design of current steering logic CMOS circuit. Microelectron. J. 141: 105979 (2023) - 2022
- [j20]Xiaochen Liu, Lingli Hu, Shuang Wang, Jizhong Shen:
Localization of seizure onset zone with epilepsy propagation networks based on graph convolutional network. Biomed. Signal Process. Control. 74: 103489 (2022) - [c5]Yongzhi Fan, Xin Du, Lun Luo, Jizhong Shen:
FreSCo: Frequency-Domain Scan Context for LiDAR-based Place Recognition with Translation and Rotation Invariance. ICARCV 2022: 576-583 - [i1]Yongzhi Fan, Xin Du, Jizhong Shen:
FreSCo: Frequency-Domain Scan Context for LiDAR-based Place Recognition with Translation and Rotation Invariance. CoRR abs/2206.12628 (2022) - 2021
- [j19]Congyuan Xu, Jizhong Shen, Xin Du:
Low-rate DoS attack detection method based on hybrid deep neural networks. J. Inf. Secur. Appl. 60: 102879 (2021) - 2020
- [j18]Li Deng, Xin Du, Jizhong Shen:
Web page classification based on heterogeneous features and a combination of multiple classifiers. Frontiers Inf. Technol. Electron. Eng. 21(7): 995-1004 (2020) - [j17]Congyuan Xu, Jizhong Shen, Xin Du:
A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework. IEEE Trans. Inf. Forensics Secur. 15: 3540-3552 (2020)
2010 – 2019
- 2019
- [j16]Congyuan Xu, Jizhong Shen, Xin Du:
Detection method of domain names generated by DGAs based on semantic representation and deep neural network. Comput. Secur. 85: 77-88 (2019) - [c4]Xiaochen Liu, Jizhong Shen, Wufeng Zhao:
P300-based deception detection of mock network fraud with modified genetic algorithm and combined classification. BCI 2019: 1-4 - 2018
- [j15]Congyuan Xu, Jizhong Shen, Xin Du, Fan Zhang:
An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units. IEEE Access 6: 48697-48707 (2018) - 2017
- [j14]Liang Geng, Fan Zhang, Jizhong Shen, Wei He, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Transistor level SCA-resistant scheme based on fluctuating power logic. Sci. China Inf. Sci. 60(10): 109401:1-109401:3 (2017) - [j13]Xiao-hua Li, Jizhong Shen:
An algorithm for identifying symmetric variables based on the order eigenvalue matrix. Frontiers Inf. Technol. Electron. Eng. 18(10): 1644-1653 (2017) - [j12]Maoqun Yao, Kai Yang, Jizhong Shen, Congyuan Xu:
Function synthesis algorithm based on RTD-based three-variable universal logic gates. Frontiers Inf. Technol. Electron. Eng. 18(10): 1654-1664 (2017) - [c3]Fan Zhang, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks. AsianHOST 2017: 49-54 - 2016
- [j11]Liang Geng, Jizhong Shen, Congyuan Xu:
Design of flip-flops with clock-gating and pull-up control scheme for power-constrained and speed-insensitive applications. IET Comput. Digit. Tech. 10(4): 193-201 (2016) - [j10]Xiaohua Li, Jizhong Shen:
An Algorithm for Identifying Symmetric Variables in the Canonical Reed-Muller Algebra System. J. Circuits Syst. Comput. 25(10): 1650126:1-1650126:15 (2016) - [j9]Liang Geng, Jizhong Shen, Congyuan Xu:
Power-efficient dual-edge implicit pulse-triggered flip-flop with an embedded clock-gating scheme. Frontiers Inf. Technol. Electron. Eng. 17(9): 962-972 (2016) - 2015
- [j8]Maoqun Yao, Kai Yang, Congyuan Xu, Jizhong Shen:
Function Synthesis Algorithm of RTD-Based Universal Threshold Logic Gate. J. Appl. Math. 2015: 827572:1-827572:7 (2015) - [j7]Maoqun Yao, Kai Yang, Congyuan Xu, Jizhong Shen:
Design of a novel RTD-based three-variable universal logic gate. Frontiers Inf. Technol. Electron. Eng. 16(8): 694-699 (2015) - 2012
- [j6]Yi Wei, Jizhong Shen:
Design of nanopipelined adder based on resonant tunneling diode. Microelectron. J. 43(6): 353-357 (2012) - 2011
- [j5]Yi Wei, Jizhong Shen:
Design of a novel low power 8-transistor 1-bit full adder cell. J. Zhejiang Univ. Sci. C 12(7): 604-607 (2011) - [j4]Yi Wei, Jizhong Shen:
Novel universal threshold logic gate based on RTD and its application. Microelectron. J. 42(6): 851-854 (2011)
1990 – 1999
- 1996
- [j3]Jizhong Shen:
Fuzzy Language on Free Monoid. Inf. Sci. 88(1-4): 149-168 (1996) - 1995
- [c2]Xunwei Wu, Xiexiong Chen, Jizhong Shen:
Race-Hazard and Skip-Hazard in Multivalued Combinational Circuits. ISMVL 1995: 222-227 - 1993
- [j2]Jizhong Shen:
Fuzzifying groups based on complete residuated lattice-valued logic. Inf. Sci. 75(1-2): 165-186 (1993) - 1992
- [c1]Jizhong Shen:
Fuzzifying Topological Groups Based on Completely Distributive Residuated Lattice-Valued Logic (I). ISMVL 1992: 198-205 - 1990
- [j1]Jizhong Shen:
On fuzzy regular subsemigroups of a semigroup. Inf. Sci. 51(2): 111-120 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint