Zhijie Jerry Shi

Orcid: 0000-0002-6773-8371

Affiliations:
  • University of Connecticut, USA


According to our database1, Zhijie Jerry Shi authored at least 68 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Placenta segmentation in magnetic resonance imaging: Addressing position and shape of uncertainty and blurred placenta boundary.
Biomed. Signal Process. Control., February, 2024

2023
Physics-aware Roughness Optimization for Diffractive Optical Neural Networks.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2021
An Advanced GNU Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer.
IEEE Internet Things J., 2021

2019
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants.
IACR Cryptol. ePrint Arch., 2019

SoK: Sharding on Blockchain.
IACR Cryptol. ePrint Arch., 2019

ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage.
IACR Cryptol. ePrint Arch., 2019

An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System.
IEEE Access, 2019

Quality Monitoring and Root Cause Diagnosis for Industrial Processes Based on Lasso-SAE-CCA.
IEEE Access, 2019

Secure Over-The-Air Firmware Updates for Sensor Networks.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

2017
Algebraic Side-Channel Attack on Twofish.
J. Internet Serv. Inf. Secur., 2017

2016
Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems.
IEEE Trans. Wirel. Commun., 2016

Further results on multicarrier MFSK based underwater acoustic communications.
Phys. Commun., 2016

RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements.
IEEE Commun. Mag., 2016

2015
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks.
Secur. Commun. Networks, 2015

Accelerating higher-order masking of AES using composite field and SIMD.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

2014
Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks.
IEEE Trans. Mob. Comput., 2014

Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014

Delay monitoring for wireless sensor networks: An architecture using air sniffers.
Ad Hoc Networks, 2014

An Experimental Study of Effective Jamming in Underwater Acoustic Links.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

A resilient pressure routing scheme for underwater acoustic networks.
Proceedings of the IEEE Global Communications Conference, 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

TI-TRNG: Technology Independent True Random Number Generator.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Uncooperative localization improves attack performance in Underwater Acoustic Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Experimental study of secret key generation in underwater acoustic channels.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Efficient Hamming weight-based side-channel cube attacks on PRESENT.
J. Syst. Softw., 2013

Enhanced Side-Channel Cube Attacks on PRESENT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013

Field tests of adaptive modulation and coding for underwater acoustic OFDM.
Proceedings of the Conference on Underwater Networks and Systems, 2013

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

A vulnerability study of geographic routing in Underwater Acoustic Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
DSP based receiver implementation for OFDM acoustic modems.
Phys. Commun., 2012

Performance Comparison of Doppler Scale Estimation Methods for Underwater Acoustic OFDM.
J. Electr. Comput. Eng., 2012

Algebraic Differential Fault Attacks on LED using a Single Fault Injection.
IACR Cryptol. ePrint Arch., 2012

Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring.
Ad Hoc Networks, 2012

Ocean-TUNE: a community ocean testbed for underwater wireless networks.
Proceedings of the Conference on Under Water Networks, 2012

Aqua-OS: An Operating System for Underwater Acoustic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Static secure page allocation for light-weight dynamic information flow tracking.
Proceedings of the 15th International Conference on Compilers, 2012

2011
Efficient multipath communication for time-critical applications in underwater acoustic sensor networks.
IEEE/ACM Trans. Netw., 2011

Scalable Localization with Mobility Prediction for Underwater Sensor Networks.
IEEE Trans. Mob. Comput., 2011

Launching denial-of-service jamming attacks in underwater sensor networks.
Proceedings of the Sixth ACM International Workshop on Underwater Networks, 2011

Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2010

Efficient Vector-Based Forwarding for Underwater Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

SDRT: A reliable data transport protocol for underwater sensor networks.
Ad Hoc Networks, 2010

Capability and Fidelity of Mote-Class Wireless Sniffers.
Proceedings of the Global Communications Conference, 2010

2009
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

PIFT: efficient dynamic information flow tracking using secure page allocation.
Proceedings of the 4th Workshop on Embedded Systems Security, 2009

2008
Software Implementations of Elliptic Curve Cryptography.
Int. J. Netw. Secur., 2008

Alternative application-specific processor architectures for fast arbitrary bit permutations.
Int. J. Embed. Syst., 2008

DBR: Depth-Based Routing for Underwater Sensor Networks.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Chord-Based Key Establishment Schemes for Sensor Networks.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Making register file resistant to power analysis attacks.
Proceedings of the 26th International Conference on Computer Design, 2008

2007
A DSP implementation of OFDM acoustic modem.
Proceedings of the Second Workshop on Underwater Networks, 2007

Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors.
Proceedings of the 25th International Conference on Computer Design, 2007

Microarchitectural support for program code integrity monitoring in application-specific instruction set processors.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

2006
Studying Software Implementations of Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

2005
Single-Cycle Bit Permutations with MOMR Execution.
J. Comput. Sci. Technol., 2005

2004
On Permutation Operations in Cipher Design.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Validating Word-Oriented Processors for Bit and Multi-word Operations.
Proceedings of the Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, 2004

2003
Enlisting Hardware Architecture to Thwart Malicious Code Injection.
Proceedings of the Security in Pervasive Computing, 2003

Arbitrary Bit Permutations in One or Two Cycles.
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003

2002
Subword Sorting with Versatile Permutation Instructions.
Proceedings of the 20th International Conference on Computer Design (ICCD 2002), 2002

Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments.
Proceedings of the 13th IEEE International Conference on Application-Specific Systems, 2002

2001
Cryptography Efficient Permutation Instructions for Fast Software.
IEEE Micro, 2001

2000
Bit Permutation Instructions for Accelerating Software Cryptography.
Proceedings of the 12th IEEE International Conference on Application-Specific Systems, 2000


  Loading...