default search action
Zhijie Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Silong Sheng, Tianyou Zheng, Zhijie Ren, Yang Zhang, Weiwei Fu:
SS-MVMETRO: Semi-supervised multi-view human mesh recovery transformer. Appl. Intell. 54(6): 5027-5043 (2024) - 2023
- [j7]Dahang Wan, Rongsheng Lu, Siyuan Shen, Ting Xu, Xianli Lang, Zhijie Ren:
Mixed local channel attention for object detection. Eng. Appl. Artif. Intell. 123(Part C): 106442 (2023) - [j6]Dahang Wan, Rongsheng Lu, Ting Xu, Siyuan Shen, Xianli Lang, Zhijie Ren:
Random Interpolation Resize: A free image data augmentation method for object detection in industry. Expert Syst. Appl. 228: 120355 (2023) - 2022
- [j5]Xianli Lang, Zhijie Ren, Dahang Wan, Yuzhong Zhang, Shuangbao Shu:
MR-YOLO: An Improved YOLOv5 Network for Detecting Magnetic Ring Surface Defects. Sensors 22(24): 9897 (2022) - 2021
- [c12]Zhijie Ren, Haitao Xiang, Ziheng Zhou, Ning Wang, Hanqing Jin:
AlphaBlock: An Evaluation Framework for Blockchain Consensus Algorithms. SBC@AsiaCCS 2021: 17-22 - 2020
- [i7]Zhijie Ren, Ziheng Zhou:
SURFACE: A Practical Blockchain Consensus Algorithm for Real-World Networks. CoRR abs/2002.07565 (2020) - [i6]Haitao Xiang, Zhijie Ren, Ziheng Zhou, Ning Wang, Hanqing Jin:
AlphaBlock: An Evaluation Framework for Blockchain Consensus Protocols. CoRR abs/2007.13289 (2020)
2010 – 2019
- 2019
- [c11]Zhijie Ren, Zekeriya Erkin:
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. Financial Cryptography 2019: 487-507 - [c10]Huan Zhou, Xue Ouyang, Zhijie Ren, Jinshu Su, Cees de Laat, Zhiming Zhao:
A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement. INFOCOM 2019: 1567-1575 - 2018
- [c9]Zhijie Ren, Kelong Cong, Taico Aerts, Bart de Jonge, Alejandro Morais, Zekeriya Erkin:
A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding. CVCBT 2018: 1-10 - [c8]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms. CVCBT 2018: 20-30 - [c7]Kelong Cong, Zhijie Ren, Johan Pouwelse:
A Blockchain Consensus Protocol with Horizontal Scalability. Networking 2018: 424-432 - [i5]Zhijie Ren, Zekeriya Erkin:
A Scale-out Blockchain for Value Transfer with Spontaneous Sharding. CoRR abs/1801.02531 (2018) - [i4]Zhijie Ren, Zekeriya Erkin:
VAPOR: a Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design. CoRR abs/1810.12596 (2018) - 2017
- [j4]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Secure Transmission on the Two-Hop Relay Channel With Scaled Compute-and-Forward. IEEE Trans. Inf. Theory 63(12): 7753-7769 (2017) - [i3]Zhijie Ren, Kelong Cong, Johan Pouwelse, Zekeriya Erkin:
Implicit Consensus: Blockchain with Unbounded Throughput. CoRR abs/1705.11046 (2017) - [i2]Oguzhan Ersoy, Zhijie Ren, Zekeriya Erkin, Reginald L. Lagendijk:
Information Propagation on Permissionless Blockchains. CoRR abs/1712.07564 (2017) - 2016
- [c6]Pengyu Cong, Chaomin Wang, Zhijie Ren, Huixin Wang, Yanmeng Wang, Junlan Feng:
Unsatisfied customer call detection with deep learning. ISCSLP 2016: 1-5 - [c5]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
On the energy benefit of compute-and-forward for multiple unicasts. ISIT 2016: 2334-2338 - 2015
- [j3]Wenli Zheng, Zhijie Ren, Yifan Zhou, Jinwen Ma:
BYY harmony learning of log-normal mixtures with automated model selection. Neurocomputing 151: 1015-1026 (2015) - [c4]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Secure transmission using an untrusted relay with scaled compute-and-forward. ITW 2015: 1-5 - [i1]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Secure Transmission on the Two-hop Relay Channel with Scaled Compute-and-Forward. CoRR abs/1509.04075 (2015) - 2014
- [j2]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Maximum Throughput Gain of Compute-and-Forward for Multiple Unicast. IEEE Commun. Lett. 18(7): 1111-1114 (2014) - 2013
- [c3]Yifan Zhou, Zhijie Ren, Jinwen Ma:
Automated Model Selection and Parameter Estimation of Log-Normal Mixtures via BYY Harmony Learning. ICIC (3) 2013: 67-72 - [c2]Zhijie Ren, Jasper Goseling, Jos H. Weber, Michael Gastpar:
Compute-and-Forward: Multiple bi-directional sessions on the line network. ISIT 2013: 2344-2348
2000 – 2009
- 2009
- [j1]Jinwen Ma, Jianfeng Liu, Zhijie Ren:
Parameter estimation of Poisson mixture with automated model selection through BYY harmony learning. Pattern Recognit. 42(11): 2659-2670 (2009) - 2008
- [c1]Zhijie Ren, Jinwen Ma:
BYY Harmony Learning on Weibull Mixture with Automated Model Selection. ISNN (1) 2008: 589-599
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint