Jie Shi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Weighted Guided Optional Fusion Network for RGB-T Salient Object Detection.
ACM Trans. Multim. Comput. Commun. Appl., May, 2024

Small Language Model Can Self-Correct.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Novel Wideband Millimeter-Wave GaN Power Amplifier Design Using Transistors With Large Drain Capacitance and High Optimum Load Impedance.
IEEE Trans. Circuits Syst. II Express Briefs, December, 2023

Design of a Highly Efficient Class-F GaN MMIC Power Amplifier Using a Multi-Function Bias Network and a Harmonic-Isolation L-C Resonator.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Cigarette Production Line Flow Automatic Control System Based on PLC Technology and Embedded Software.
Scalable Comput. Pract. Exp., November, 2023

FS-MGKC: Feature selection based on structural manifold learning with multi-granularity knowledge coordination.
Inf. Sci., November, 2023

Feature selection via maximizing inter-class independence and minimizing intra-class redundancy for hierarchical classification.
Inf. Sci., May, 2023

Virtual network function deployment algorithm based on graph convolution deep reinforcement learning.
J. Supercomput., April, 2023

PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

A Novel Method to Design Steerable Differential Beamformer Using Linear Acoustics Vector Sensor Array.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

TransCORALNet: A Two-Stream Transformer CORAL Networks for Supply Chain Credit Assessment Cold Start.
CoRR, 2023

AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification.
CoRR, 2023

DragNUWA: Fine-grained Control in Video Generation by Integrating Text, Image, and Trajectory.
CoRR, 2023

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Multi-UAVs Cooperative Spectrum Sensing Method Based on Improved IDW Algorithm.
Proceedings of the Space Information Networks - 7th International Conference, 2023

ShellGPT: Generative Pre-trained Transformer Model for Shell Language Understanding.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Differential Aggregation against General Colluding Attackers.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

A Data Flow Framework with High Throughput and Low Latency for Permissioned Blockchains.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

QUDA: Query-Limited Data-Free Model Extraction.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

Imaging of Insect Hole in Living Tree Trunk Based on Joint Driven Algorithm of Electromagnetic Inverse Scattering.
Sensors, 2022

Fall Detection for Shipboard Seafarers Based on Optimized BlazePose and LSTM.
Sensors, 2022

Attention based deep neural network for micro-fracture extraction of sequential coal rock CT images.
Multim. Tools Appl., 2022

Adaptive multi-scale feature fusion based U-net for fracture segmentation in coal rock images.
J. Intell. Fuzzy Syst., 2022

DiVAE: Photorealistic Images Synthesis with Denoising Diffusion Decoder.
CoRR, 2022

Causality-based Neural Network Repair.
CoRR, 2022

Repairing Adversarial Texts Through Perturbation.
Proceedings of the Theoretical Aspects of Software Engineering, 2022

MExMI: Pool-based Active Model Extraction Crossover Membership Inference.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

TransPatch: A Transformer-based Generator for Accelerating Transferable Patch Generation in Adversarial Attacks Against Object Detection Models.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

A software-defined security middle platform architecture.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

2021
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack.
CoRR, 2021

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance.
CoRR, 2021

Game-theoretic Understanding of Adversarially Learned Features.
CoRR, 2021

DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction.
CoRR, 2021

Rethinking Natural Adversarial Examples for Classification Models.
CoRR, 2021

Towards a Unified Game-Theoretic View of Adversarial Perturbations and Robustness.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Towards Demystifying Adversarial Robustness of Binarized Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
A Multiscale Recognition Method for the Optimization of Traffic Signs Using GMM and Category Quality Focal Loss.
Sensors, 2020

A simulated annealing approach for resolution guided homogeneous cryo-electron microscopy image selection.
Quant. Biol., 2020

Rotation invariant angle-density based features for an ice image classification system.
Expert Syst. Appl., 2020

Tourism demonstration system for large-scale museums based on 3D virtual simulation technology.
Electron. Libr., 2020

Sparse representation based direction-of-arrival estimation using circular acoustic vector sensor arrays.
Digit. Signal Process., 2020

Rotation-Equivariant Neural Networks for Privacy Protection.
CoRR, 2020

Deep Quaternion Features for Privacy Protection.
CoRR, 2020

Bident Structure for Neural Network Model Protection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
MCTE: Minimizes Task Completion Time and Execution Cost to Optimize Scheduling Performance for Smart Grid Cloud.
IEEE Access, 2019

BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

An Evaluation Strategy of Energy Storage Construction for Industrial Users Based on K-Means Clustering Algorithm.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

A New Task Scheduling for Minimizing Completion Time and Execution Cost in Smart Grid Cloud.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
A Novel Data Aggregation Preprocessing Algorithm in Flash Memory for Iot Based Power Grid Storage System.
IEEE Access, 2018

Biological Features De-identification in Iris Images.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

Fourier Transform based Features for Clean and Polluted Water Image Classification.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

A (k, n) Visual Cryptography Based on Shamir's Secret Sharing.
Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing, 2018

2017
Sound Source Localization Using Non-Conformal Surface Sound Field Transformation Based on Spherical Harmonic Wave Decomposition.
Sensors, 2017

2016
Efficient authorisation update on cloud data.
Int. J. Web Grid Serv., 2016

Extended target tracking filter with intermittent observations.
IET Signal Process., 2016

2015
Constructing plausible innocuous pseudo queries to protect user query intention.
Inf. Sci., 2015

A Reservation Multichannel MAC Protocol Utilize Blind Source Separation.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

2014
Hybrid Forecasting Model for Very-Short Term Wind Power Forecasting Based on Grey Relational Analysis and Wind Speed Distribution Features.
IEEE Trans. Smart Grid, 2014

A Multichannel MAC Protocol for Underwater Acoustic Sensor Networks.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Batch Clone Detection in RFID-enabled supply chain.
Proceedings of the IEEE International Conference on RFID, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Visual attention based image zero watermark scheme with ensemble similarity.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Lightweight Management of Authorization Update on Cloud Data.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
A Sensitivity-Enhanced Refractive Index Sensor Using a Single-Mode Thin-Core Fiber Incorporating an Abrupt Taper.
Sensors, 2012

Data transformation and query management in personal health sensor networks.
J. Netw. Comput. Appl., 2012

A secure and efficient discovery service system in EPCglobal network.
Comput. Secur., 2012

SecTTS: A secure track & trace system for RFID-enabled supply chains.
Comput. Ind., 2012

Design and Implementation of a Secure Prototype for EPCglobal Network Services.
Proceedings of the Radio Frequency Identification System Security, 2012

SecDS: a secure EPC discovery service system in EPCglobal network.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Design and FPGA implementation of digital pulse compression for HF chirp radar based on modified orthogonal transformation.
IEICE Electron. Express, 2011

Forecasting power output of photovoltaic system based on weather classification and support vector machine.
Proceedings of the 2011 IEEE Industry Applications Society Annual Meeting, 2011

Serial fingerprint device driver development based on EFI.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Enabling Knowledge Extraction from Low Level Sensor Data.
Proceedings of the Database and Expert Systems Applications, 2011

2010
A fine-grained access control model for relational databases.
J. Zhejiang Univ. Sci. C, 2010

2009
Using Sensor Networks to Measure Intensity in Sporting Activities.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

An Innovative Variational Level Set Model for Multiphase Image Segmentation.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Controlling Information Leakage of Fine-Grained Access Model in DBMSs.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Finding Motifs of Financial Data Streams in Real Time.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Dynamic data recovery for database systems based on fine grained transaction log.
Proceedings of the 12th International Database Engineering and Applications Symposium (IDEAS 2008), 2008

Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Multi-objective modelling and decision support using a Bayesian network approximation to a non-point source pollution model.
Environ. Model. Softw., 2007

1988
Control of motors by microprocessors for space positioning and localization.
Microprocess. Microprogramming, 1988


  Loading...