default search action
Shiyu Ji
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Guoqiang Liang, Zhaojie Chen, Zhaoqiang Chen, Shiyu Ji, Yanning Zhang:
New Insights on Relieving Task-Recency Bias for Online Class Incremental Learning. IEEE Trans. Circuits Syst. Video Technol. 34(5): 3451-3464 (2024) - [j16]Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Simulation-based uprighting of a capsized ship in wave-induced environments. J. Supercomput. 80(7): 9054-9072 (2024) - [j15]Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Correction to: Simulation-based uprighting of a capsized ship in wave-induced environments. J. Supercomput. 80(8): 11843 (2024) - 2023
- [j14]Yifan Qiao, Shiyu Ji, Changhai Wang, Jinjin Shao, Tao Yang:
Privacy-aware document retrieval with two-level inverted indexing. Inf. Retr. J. 26(1): 12 (2023) - [i8]Guoqiang Liang, Zhaojie Chen, Zhaoqiang Chen, Shiyu Ji, Yanning Zhang:
New Insights on Relieving Task-Recency Bias for Online Class Incremental Learning. CoRR abs/2302.08243 (2023) - 2022
- [j13]Xiaohan Li, Jun Wang, Jinghua Tan, Shiyu Ji, Huading Jia:
A graph neural network-based stock forecasting method utilizing multi-source heterogeneous data fusion. Multim. Tools Appl. 81(30): 43753-43775 (2022) - 2021
- [c14]Guoqiang Liang, Shiyu Ji, Yanning Zhang:
Local-enhanced Interaction for Temporal Moment Localization. ICMR 2021: 201-209 - [c13]Jinjin Shao, Yifan Qiao, Shiyu Ji, Tao Yang:
Window Navigation with Adaptive Probing for Executing BlockMax WAND. SIGIR 2021: 2323-2327 - 2020
- [j12]Hui Hong, Jinchi Jiang, Xudong Yuan, Shiyu Ji, Shan Keke, Guodong Su:
A low-power high-output-efficiency bipolar Colpitts VCO using base inductive feedback and Q-factor enhancement for analog signal acquisition. IEICE Electron. Express 17(7): 20200036 (2020) - [c12]Jinjin Shao, Shiyu Ji, Alvin Oliver Glova, Yifan Qiao, Tao Yang, Tim Sherwood:
Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment. CIKM 2020: 1345-1354
2010 – 2019
- 2019
- [c11]Jinjin Shao, Shiyu Ji, Tao Yang:
Privacy-aware Document Ranking with Neural Signals. SIGIR 2019: 305-314 - [c10]Shiyu Ji, Jinjin Shao, Tao Yang:
Efficient Interaction-based Neural Ranking with Locality Sensitive Hashing. WWW 2019: 2858-2864 - 2018
- [j11]Liangrui Tang, Hailin Hu, Jiajia Zhu, Shiyu Ji, Yanhua He, Xin Wu:
Joint User Experience and Energy Efficiency Optimization in Heterogeneous Small Cell Network. IEICE Trans. Commun. 101-B(6): 1453-1461 (2018) - [j10]Shiyu Ji, Liangrui Tang, Yanhua He, Shuxian Li, Shimo Du:
A QEE-Oriented Fair Power Allocation for Two-tier Heterogeneous Networks. KSII Trans. Internet Inf. Syst. 12(5): 1912-1931 (2018) - [j9]Weihua Zhang, Xin Wang, Shiyu Ji, Ziyun Wei, Zhaoguo Wang, Haibo Chen:
Eunomia: Scaling Concurrent Index Structures Under Contention Using HTM. IEEE Trans. Parallel Distributed Syst. 29(8): 1837-1850 (2018) - [j8]Yuan He, Liangrui Tang, Xiangjun Liu, Shiyu Ji:
Decision Theory Based Localization Algorithm in Smart Park. Wirel. Pers. Commun. 100(3): 1023-1046 (2018) - [c9]Shiyu Ji, Jinjin Shao, Daniel Agun, Tao Yang:
Privacy-aware Ranking with Tree Ensembles on the Cloud. SIGIR 2018: 315-324 - [c8]Daniel Agun, Jinjin Shao, Shiyu Ji, Stefano Tessaro, Tao Yang:
Privacy and Efficiency Tradeoffs for Multiword Top K Search with Linear Additive Rank Scoring. WWW 2018: 1725-1734 - 2017
- [j7]Liangrui Tang, Shiyu Ji, Shimo Du, Yun Ren, Run-ze Wu, Xin Wu:
Forecasting Network Traffic at Large Time Scales by Using Dual-Related Method. IEICE Trans. Commun. 100-B(11): 2049-2059 (2017) - [j6]Shiyu Ji, Liangrui Tang, Chen Xu, Shimo Du, Jiajia Zhu, Hailin Hu:
QoE-aware Energy Efficiency Maximization Based Joint User Access Selection and Power Allocation for Heterogeneous Network. KSII Trans. Internet Inf. Syst. 11(10): 4680-4697 (2017) - [j5]Liangrui Tang, Shiyu Ji, Jiangyu Yan:
A Heterogeneous Network Access Selection Algorithm Based on Attribute Dependence. Wirel. Pers. Commun. 92(3): 1163-1176 (2017) - [c7]Shiyu Ji, Tingting Chen:
On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems. TrustCom/BigDataSE/ICESS 2017: 162-169 - [i7]Shiyu Ji, Kun Wan:
k-Anonymously Private Search over Encrypted Data. CoRR abs/1703.08269 (2017) - [i6]Shiyu Ji, Kun Wan:
An Asymptotically Tighter Bound on Sampling for Frequent Itemsets Mining. CoRR abs/1703.08273 (2017) - [i5]Shiyu Ji, Kun Wan:
Adaptive Modular Exponentiation Methods v.s. Python's Power Function. CoRR abs/1707.01898 (2017) - 2016
- [j4]Shiyu Ji, Tingting Chen:
Incentive Mechanisms for Discretized Mobile Crowdsensings. IEEE Trans. Wirel. Commun. 15(1): 146-161 (2016) - [j3]Wei Ding, Liangrui Tang, Shiyu Ji:
Optimizing routing based on congestion control for wireless sensor networks. Wirel. Networks 22(3): 915-925 (2016) - [c6]Liangrui Tang, Shimo Du, Shiyu Ji:
Forecasting network traffic at large time scale by using dual-related method. ICNC-FSKD 2016: 1336-1340 - [c5]Shiyu Ji, Liangrui Tang, Shimo Du, Shuxian Li:
Energy efficiency maximization based joint power and bandwidth allocation for heterogeneous network. ICNC-FSKD 2016: 2019-2023 - [c4]Jiajia Zhu, Run-ze Wu, Liangrui Tang, Shiyu Ji:
Spectrum sharing in heterogeneous networks based on multi-objective optimization. WPMC 2016: 530-535 - [i4]Shiyu Ji:
On Credit-based Incentive Mechanisms of Voluntary User Comment Reviewing in Social Networks. CoRR abs/1608.04090 (2016) - [i3]Shiyu Ji, Zenghui Yan:
Refining Approximating Betweenness Centrality Based on Samplings. CoRR abs/1608.04472 (2016) - [i2]Shiyu Ji:
On the Correctness of Inverted Index Based Public-Key Searchable Encryption Scheme for Multi-time Search. CoRR abs/1608.06753 (2016) - 2015
- [j2]Shiyu Ji, Tingting Chen, Sheng Zhong:
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. IEEE Trans. Mob. Comput. 14(3): 660-674 (2015) - [c3]Shiyu Ji, Tingting Chen, Fan Wu:
Crowdsourcing with trembles: Incentive mechanisms for mobile phones with uncertain sensing time. ICC 2015: 3546-3551 - 2014
- [c2]Shiyu Ji, Tingting Chen:
Crowdsensing incentive mechanisms for mobile systems with finite precisions. ICC 2014: 2544-2549 - [c1]Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:
DAWN: Defending against wormhole attacks in wireless network coding systems. INFOCOM 2014: 664-672 - 2013
- [j1]Shiyu Ji, Xiaojun Tong, Miao Zhang:
Image encryption schemes for joint photographic experts group and graphics interchange format formats based on three-dimensional baker with compound chaotic sequence generator. J. Electronic Imaging 22(1): 013017 (2013) - 2012
- [i1]Shiyu Ji, Xiaojun Tong, Miao Zhang:
Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator. CoRR abs/1208.0999 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint