


Остановите войну!
for scientists:


default search action
Shi Bai
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j17]Hui Wang
, Bo Zhao
, Panpan Tang
, Yuxiang Wang, Haoming Wan, Shi Bai, Ronghao Wei:
Paddy Rice Mapping Using a Dual-Path Spatio-Temporal Network Based on Annual Time-Series Sentinel-2 Images. IEEE Access 10: 132584-132595 (2022) - [j16]Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Shi Bai, Yuan He:
A practical privacy-preserving communication scheme for CAMs in C-ITS. J. Inf. Secur. Appl. 65: 103103 (2022) - [j15]Lijian Yang, Fuyin Zheng
, Ping Huang
, Shi Bai
, Yuming Su:
Research on the Analytical Model of Improved Magnetic Flux Leakage Signal for the Local Stress Concentration Zone of Pipelines. Sensors 22(3): 1128 (2022) - [c33]Shi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo:
Fiat-Shamir Signatures Based on Module-NTRU. ACISP 2022: 289-308 - [c32]Xianshang Lin, Yunfei Ma, Junshao Zhang, Yao Cui, Jing Li, Shi Bai, Ziyue Zhang, Dennis Cai, Hongqiang Harry Liu, Ming Zhang:
GSO-simulcast: global stream orchestration in simulcast video conferencing systems. SIGCOMM 2022: 826-839 - 2021
- [j14]Lijian Yang, Ping Huang
, Songwei Gao, Zhouzhong Du, Shi Bai:
Research on the magnetic flux leakage field distribution characteristics of defect in low-frequency electromagnetic detection technique. IEICE Electron. Express 18(1): 20200362 (2021) - [c31]Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell:
Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance. CRYPTO (2) 2021: 732-759 - [c30]Fanfei Chen
, Paul Szenher, Yewei Huang, Jinkun Wang, Tixiao Shan, Shi Bai, Brendan J. Englot:
Zero-Shot Reinforcement Learning on Graphs for Autonomous Exploration Under Uncertainty. ICRA 2021: 5193-5199 - [c29]Zheng Chen, Shi Bai, Lantao Liu:
Efficient Map Prediction via Low-Rank Matrix Completion. ICRA 2021: 13953-13959 - [c28]Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Jian Xu, Shi Bai, Yuan He:
A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS. TrustCom 2021: 232-239 - [c27]Xiaohan Yue, Lixin Yang, Xibo Wang, Shuaishuai Zeng, Jian Xu, Shi Bai, Yuan He:
An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation. TrustCom 2021: 452-459 - [i20]Fanfei Chen, Paul Szenher, Yewei Huang, Jinkun Wang, Tixiao Shan, Shi Bai, Brendan J. Englot:
Zero-Shot Reinforcement Learning on Graphs for Autonomous Exploration Under Uncertainty. CoRR abs/2105.04758 (2021) - [i19]Zheng Chen, Weizhe Chen, Shi Bai, Lantao Liu:
Multi-Objective Autonomous Exploration on Real-Time Continuous Occupancy Maps. CoRR abs/2111.00067 (2021) - [i18]Zheng Chen, Shi Bai, Lantao Liu:
Efficient Map Prediction via Low-Rank Matrix Completion. CoRR abs/2111.00075 (2021) - 2020
- [c26]Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque
, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k). CRYPTO (2) 2020: 186-212 - [c25]Shi Bai, Jie Zhao:
Interpolation of Geochemical Data with Aster Images Based on AlexNet Convolution Neural Network. IGARSS 2020: 244-247 - [c24]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. Public Key Cryptography (2) 2020: 66-93 - [c23]Yu Zhou, Chen Sun, Hongqiang Harry Liu, Rui Miao, Shi Bai, Bo Li, Zhilong Zheng, Lingjun Zhu, Zhen Shen, Yongqing Xi, Pengcheng Zhang, Dennis Cai, Ming Zhang, Mingwei Xu:
Flow Event Telemetry on Programmable Data Plane. SIGCOMM 2020: 76-89 - [i17]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. IACR Cryptol. ePrint Arch. 2020: 198 (2020) - [i16]Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)). IACR Cryptol. ePrint Arch. 2020: 707 (2020) - [i15]Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell:
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance. IACR Cryptol. ePrint Arch. 2020: 1260 (2020)
2010 – 2019
- 2019
- [j13]Shi Bai, Steven D. Galbraith
, Liangze Li, Daniel Sheffield:
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem. J. Cryptol. 32(1): 35-83 (2019) - [c22]Shi Bai, Shaun Miller, Weiqiang Wen:
A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: 181-205 - [c21]Shi Bai, Katharina Boudgoust
, Dipayan Das, Adeline Roux-Langlois
, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and Its Applications. ASIACRYPT (1) 2019: 55-81 - [i14]Shi Bai, Shaun Miller, Weiqiang Wen:
A refined analysis of the cost for solving LWE via uSVP. IACR Cryptol. ePrint Arch. 2019: 502 (2019) - [i13]Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and its Applications. IACR Cryptol. ePrint Arch. 2019: 1001 (2019) - 2018
- [j12]Cheng-Li Fan, Yafei Song
, Lei Lei, Xiaodan Wang, Shi Bai:
Evidence reasoning for temporal uncertain information based on relative reliability evaluation. Expert Syst. Appl. 113: 264-276 (2018) - [j11]Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois
, Amin Sakzad
, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance. J. Cryptol. 31(2): 610-640 (2018) - [c20]Shi Bai, Damien Stehlé, Weiqiang Wen:
Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ. ASIACRYPT (1) 2018: 369-404 - [i12]Jinming Wen, Chao Tong, Shi Bai:
Effects of Some Lattice Reductions on the Success Probability of the Zero-Forcing Decoder. CoRR abs/1807.03872 (2018) - [i11]Shi Bai, Damien Stehlé, Weiqiang Wen:
Measuring, simulating and exploiting the head concavity phenomenon in BKZ. IACR Cryptol. ePrint Arch. 2018: 856 (2018) - 2017
- [j10]Sean T. Holmes
, Shi Bai, Robbie J. Iuliucci, Karl T. Mueller, Cecil Dybowski:
Calculations of solid-state 43Ca NMR parameters: A comparison of periodic and cluster approaches and an evaluation of DFT functionals. J. Comput. Chem. 38(13): 949-956 (2017) - [c19]Dengwei Gao, Jianjun Luo, Weihua Ma, Shi Bai, Brendan J. Englot:
Efficient and robust feedback motion planning under uncertainty using the pontryagin difference. CDC 2017: 939-946 - [c18]Jinkun Wang, Shi Bai, Brendan J. Englot:
Underwater localization and 3D mapping of submerged structures with a single-beam scanning sonar. ICRA 2017: 4898-4905 - [c17]Shi Bai, Fanfei Chen
, Brendan J. Englot:
Toward autonomous mapping and exploration for mobile robots through deep supervised learning. IROS 2017: 2379-2384 - 2016
- [j9]Jinming Wen, Chao Tong
, Shi Bai
:
Effects of Some Lattice Reductions on the Success Probability of the Zero-Forcing Decoder. IEEE Commun. Lett. 20(10): 2031-2034 (2016) - [j8]Shi Bai, Cyril Bouvier, Alexander Kruppa, Paul Zimmermann
:
Better polynomials for GNFS. Math. Comput. 85(298): 861-873 (2016) - [c16]Martin R. Albrecht, Shi Bai, Léo Ducas:
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. CRYPTO (1) 2016: 153-178 - [c15]Shi Bai, Damien Stehlé, Weiqiang Wen:
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices. ICALP 2016: 76:1-76:12 - [c14]Shi Bai, Jinkun Wang, Fanfei Chen
, Brendan J. Englot:
Information-theoretic exploration with Bayesian optimization. IROS 2016: 1816-1822 - [i10]Martin R. Albrecht, Shi Bai, Léo Ducas:
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. IACR Cryptol. ePrint Arch. 2016: 127 (2016) - [i9]Shi Bai, Thijs Laarhoven, Damien Stehlé:
Tuple lattice sieving. IACR Cryptol. ePrint Arch. 2016: 713 (2016) - [i8]Shi Bai, Damien Stehlé, Weiqiang Wen:
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices. IACR Cryptol. ePrint Arch. 2016: 753 (2016) - 2015
- [j7]Shi Bai, Richard P. Brent
, Emmanuel Thomé
:
Root optimization of polynomials in the number field sieve. Math. Comput. 84(295): 2447-2457 (2015) - [j6]Zuzhi Fan, Shi Bai, Shuai Wang, Tian He:
Delay-Bounded Transmission Power Control for Low-Duty-Cycle Sensor Networks. IEEE Trans. Wirel. Commun. 14(6): 3157-3170 (2015) - [c13]Shi Bai, Adeline Langlois
, Tancrède Lepoint
, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance. ASIACRYPT (1) 2015: 3-24 - [c12]Shi Bai, Jinkun Wang, Kevin J. Doherty, Brendan J. Englot:
Inference-Enabled Information-Theoretic Exploration of Continuous Action Spaces. ISRR (2) 2015: 419-433 - [i7]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. IACR Cryptol. ePrint Arch. 2015: 483 (2015) - 2014
- [j5]Shi Bai, Xuan Li, Zhaohui Xie, Zhi Zhou, Jinping Ou:
A Wireless Fatigue Monitoring System Utilizing a Bio-Inspired Tree Ring Data Tracking Technique. Sensors 14(3): 4364-4383 (2014) - [c11]Shi Bai, Steven D. Galbraith
:
Lattice Decoding Attacks on Binary LWE. ACISP 2014: 322-337 - [c10]Shi Bai, Steven D. Galbraith
:
An Improved Compression Technique for Signatures Based on Learning with Errors. CT-RSA 2014: 28-47 - [i6]Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Exponential-time Algorithms for Inhomogeneous-SIS. IACR Cryptol. ePrint Arch. 2014: 593 (2014) - 2013
- [c9]Shi Bai, Tian He:
Throughput Optimization in Energy Sharing Wireless Sensor Networks. MASS 2013: 254-262 - [i5]Shi Bai, Steven D. Galbraith:
An improved compression technique for signatures based on learning with errors. IACR Cryptol. ePrint Arch. 2013: 838 (2013) - [i4]Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. IACR Cryptol. ePrint Arch. 2013: 839 (2013) - 2012
- [j4]Shi Bai, Xue-Liang Liao:
A parallel flash translation layer based on page group-block hybrid-mapping method. IEEE Trans. Consumer Electron. 58(2): 441-449 (2012) - [c8]Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Chonggang Wang:
DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks. INFOCOM 2012: 1593-1601 - [i3]Shi Bai, Richard P. Brent, Emmanuel Thomé:
Root optimization of polynomials in the number field sieve. CoRR abs/1212.1958 (2012) - [i2]Shi Bai, Emmanuel Thomé, Paul Zimmermann:
Factorisation of RSA-704 with CADO-NFS. IACR Cryptol. ePrint Arch. 2012: 369 (2012) - [i1]Shi Bai, Richard P. Brent, Emmanuel Thomé:
Root Optimization of Polynomials in the Number Field Sieve. IACR Cryptol. ePrint Arch. 2012: 691 (2012) - 2011
- [j3]Xue-Liang Liao, Shi Bai, Yu-Ping Wang
, Shi-Min Hu:
ISRA-Based Grouping: A Disk Reorganization Approach for Disk Energy Conservation and Disk Performance Enhancement. IEEE Trans. Computers 60(2): 292-304 (2011) - [j2]Shi Bai, Jie Yin, Gang Tan
, Yu-Ping Wang
, Shi-Min Hu:
FDTL: a unified flash memory and hard disk translation layer. IEEE Trans. Consumer Electron. 57(4): 1719-1727 (2011) - [c7]Shi Bai, Weiyi Zhang, Yang Liu, Chonggang Wang:
Max-Min Fair Scheduling in OFDMA-Based Multi-Hop WiMAX Mesh Networks. ICC 2011: 1-5 - [c6]Yang Liu, Weiyi Zhang, Shi Bai, Chonggang Wang:
Defending Sensor Worm Attack Using Software Diversity Approach. ICC 2011: 1-5 - [c5]Weiyi Zhang, Shi Bai, Guoliang Xue, Jian Tang, Chonggang Wang:
DARP: Distance-aware relay placement in WiMAX mesh networks. INFOCOM 2011: 2060-2068 - 2010
- [c4]Weiyi Zhang, Shi Bai, Yang Liu, Jian Tang:
Cognitive Radio Scheduling for Overwater Communications. GLOBECOM 2010: 1-5
2000 – 2009
- 2008
- [c3]Shi Bai, Richard P. Brent:
On the Efficiency of Pollard's Rho Method for Discrete Logarithms. CATS 2008: 125-131
1990 – 1999
- 1991
- [j1]Fathi M. A. Salam, Shi Bai:
A new feedback neural network with supervised learning. IEEE Trans. Neural Networks 2(1): 170-173 (1991) - 1990
- [c2]Fathi M. A. Salam, Shi Bai, J. Hou:
Dynamics of feedback neural nets with unsupervised learning. IJCNN 1990: 239-244 - [c1]Fathi M. A. Salam, Shi Bai:
A feedback neural network with supervised learning. IJCNN 1990: 263-268
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2023-01-22 01:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint