default search action
Minghui Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Chuyan Zeng, Zekun Niu, Hang Yang, Minghui Shi, Weisheng Hu, Lilin Yi:
Enhancing Generalization in Neural Channel Model for Optical Fiber WDM Transmission through Learned Encoding of System Parameters. OFC 2024: 1-3 - 2023
- [j20]Shaoyu Wei, Ruiling Zheng, Rui Li, Minghui Shi, Junsong Zhang:
Measuring cognitive load of digital interface combining event-related potential and BubbleView. Brain Informatics 10(1): 8 (2023) - [c35]Jiaquan Li, Min Jiang, Minghui Shi:
Dynamic Graph-Driven Heat Diffusion: Enhancing Industrial Semantic Segmentation. PRCV (6) 2023: 473-484 - 2020
- [c34]Chang Liu, Minghui Shi, Min Jiang, Meihong Wu, Tingting Chen, Jianting Liu, Enze Wang, Yuan Shi, Zilong Li:
Approach to recognizing SSVEP by combining CCA with artificial neural network. ICIAI 2020: 15-19
2010 – 2019
- 2019
- [c33]Minghui Shi, Jiaming Sun, Zhenhuan Huang, Hainan Wang, Chunlei Liu, Baochang Zhang:
Face Liveness Detection Benchmark based on Stereo Matching. ICDSC 2019: 10:1-10:6 - [c32]Sandra Ebele Nwachukwu, Minghui Shi, Chang Liu, Xiangqian Liu, Changle Zhou, Fei Chao, Min Jiang, Penglin Kang, Zilong Li:
An SSVEP Recognition Method by Combining Individual Template with CCA. ICIAI 2019: 6-10 - [c31]Minghui Shi, Jianting Liu, Jingkang Lin, Zilong Li, Chang Liu, Tingting Chen, Min Jiang, Fei Chao, Meihong Wu, Enze Wang, Yuan Shi, Tongrui Li:
A Method for SSVEP Recognition Based on Weighted Canonical Correlation Analysis. SSCI 2019: 399-403 - [i1]Min Jiang, Weizhen Hu, Liming Qiu, Minghui Shi, Kay Chen Tan:
Solving dynamic multi-objective optimization problems via support vector machine. CoRR abs/1910.08747 (2019) - 2018
- [j19]Ruilin Qin, Changle Zhou, He Zhu, Minghui Shi, Fei Chao, Na Li:
A Music-Driven Dance System of Humanoid Robots. Int. J. Humanoid Robotics 15(5): 1850023:1-1850023:31 (2018) - [j18]Dajun Zhou, Minghui Shi, Fei Chao, Chih-Min Lin, Longzhi Yang, Changjing Shang, Changle Zhou:
Use of human gestures for controlling a mobile robot via adaptive CMAC network and fuzzy logic controller. Neurocomputing 282: 218-231 (2018) - [j17]Minghui Shi, Changle Zhou, Jun Xie, Shaozi Li, Qingyang Hong, Min Jiang, Fei Chao, Weifeng Ren, Xiangqian Liu, Dajun Zhou, Tianyu Yang:
Electroencephalogram-based brain-computer interface for the Chinese spelling system: a survey. Frontiers Inf. Technol. Electron. Eng. 19(3): 423-436 (2018) - [j16]Fei Chao, Dajun Zhou, Chih-Min Lin, Changle Zhou, Minghui Shi, Dazhen Lin:
Fuzzy cerebellar model articulation controller network optimization via self-adaptive global best harmony search algorithm. Soft Comput. 22(10): 3141-3153 (2018) - [c30]Minghui Shi, Xiangqian Liu, Changle Zhou, Fei Chao, Chang Liu, Xinze Jiao, Yifei An, Sandra Ebele Nwachukwu, Min Jiang:
Towards portable SSVEP-based brain-computer interface using Emotiv EPOC and mobile phone. ICACI 2018: 249-253 - [c29]Min Jiang, Weizhen Hu, Liming Qiu, Minghui Shi, Kay Chen Tan:
Solving dynamic multi-objective optimization problems via support vector machine. ICACI 2018: 819-824 - 2017
- [c28]Dajun Zhou, Fei Chao, Chih-Min Lin, Longzhi Yang, Minghui Shi, Changle Zhou:
Integration of fuzzy CMAC and BELC networks for uncertain nonlinear system control. FUZZ-IEEE 2017: 1-6 - [c27]Min Jiang, Zhongqiang Huang, Guiying Jiang, Minghui Shi, Xiangxiang Zeng:
Motion generation of multi-legged robot in complex terrains by using estimation of distribution algorithm. SSCI 2017: 1-6 - [c26]Xiangqian Liu, Fei Chao, Min Jiang, Changle Zhou, Weifeng Ren, Minghui Shi:
Towards Low-Cost P300-Based BCI Using Emotiv Epoc Headset. UKCI 2017: 239-244 - [c25]Jiangqin Xu, Zhongqiang Huang, Minghui Shi, Min Jiang:
Emotion Detection in E-learning Using Expectation-Maximization Deep Spatial-Temporal Inference Network. UKCI 2017: 245-252 - 2016
- [c24]Minghui Shi, Changle Zhou, Min Jiang, Qingyang Hong, Fei Chao, Jun Xie, Weifeng Ren, Dajun Zhou, Tianyu Yang, Xiangqian Liu:
Advancement in the EEG-Based Chinese Spelling Systems. ICIRA (2) 2016: 110-117 - [c23]Dajun Zhou, Fei Chao, Chih-Min Lin, Minghui Shi, Changle Zhou:
Harmony Search Algorithm for Fuzzy Cerebellar Model Articulation Controller Networks Optimization. UKCI 2016: 45-58 - 2014
- [c22]Gang Yao, Fei Chao, Hualin Zeng, Minghui Shi, Min Jiang, Changle Zhou:
Integrate classifier diversity evaluation to feature selection based classifier ensemble reduction. UKCI 2014: 1-7 - 2013
- [c21]Dizhi Zhou, Wei Song, Minghui Shi:
Goodput improvement for multipath TCP by congestion window adaptation in multi-radio devices. CCNC 2013: 508-514 - [c20]Min Jiang, Yang Yu, Fei Chao, Minghui Shi, Changle Zhou:
A connectionist model for 2-dimensional modal logic. CIHLI 2013: 54-59 - 2012
- [j15]Li Li, Philip J. Vigneron, Colin Brown, Minghui Shi, Thomas Kunz:
On designing bandwidth constrained mobile tactical networks for complex terrains. IEEE Commun. Mag. 50(2): 188-194 (2012) - [c19]Fei Chao, Haixiong Lin, Min Jiang, Minghui Shi, Jinying Chao:
Integration of brain-like computational structure and infant behaviorial pattern for robotic hand-eye coordination. ICARCV 2012: 100-105 - [c18]David Kidston, Minghui Shi:
Opportunistic routing in tactical networks. ICC 2012: 328-333 - [c17]Minghui Shi, Changle Zhou, Fei Chao, Min Jiang:
An algorithm for computing attribute reducts based on graph search strategy. IJCNN 2012: 1-8 - [c16]David Kidston, Minghui Shi:
A multicast routing technique for tactical networks. MILCOM 2012: 1-6 - [c15]Li Li, Minghui Shi, Thomas Kunz:
Robust Networking for Bandwidth Constrained Mobile Tactical Radios. VTC Spring 2012: 1-5 - 2010
- [j14]Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin (Sherman) Shen, Chuang Lin:
An efficient dynamic-identity based signature scheme for secure network coding. Comput. Networks 54(1): 28-40 (2010)
2000 – 2009
- 2009
- [j13]Haojin Zhu, Xiaodong Lin, Minghui Shi, Pin-Han Ho, Xuemin Shen:
PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks. IEEE Trans. Veh. Technol. 58(5): 2529-2543 (2009) - [j12]Yixin Jiang, Minghui Shi, Xuemin Shen, Chuang Lin:
BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree. IEEE Trans. Wirel. Commun. 8(4): 1974-1983 (2009) - 2008
- [j11]Minghui Shi, Xuemin Shen, Jon W. Mark, Dongmei Zhao, Yixin Jiang:
User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks. Comput. Networks 52(9): 1693-1702 (2008) - [c14]Yixin Jiang, Minghui Shi, Xuemin Shen, Chuang Lin:
A Tree-Based Signature Scheme for VANETs. GLOBECOM 2008: 634-638 - [c13]Minghui Shi, Khaled Hatem Almotairi, Xuemin Shen, Jon W. Mark, Dongmei Zhao, Bruno R. Preiss:
Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks. ICC 2008: 2752-2756 - [c12]Yixin Jiang, Minghui Shi, Xuemin Shen, Chuang Lin:
Efficient Re-Keying Scheme for Group Key Distribution. WCNC 2008: 2639-2644 - 2007
- [j10]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5(1): 14-23 (2007) - [j9]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, Xiaowen Chu:
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. Comput. Commun. 30(11-12): 2428-2441 (2007) - [j8]Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon W. Mark, Aladdin Saleh:
A Service-Agent-Based Roaming Architecture for WLAN/Cellular Integrated Networks. IEEE Trans. Veh. Technol. 56(5): 3168-3181 (2007) - [j7]Humphrey Rutagemwa, Minghui Shi, Xuemin Shen, Jon W. Mark:
Wireless Profiled TCP Performance over Integrated Wireless LANs and Cellular Networks. IEEE Trans. Wirel. Commun. 6(6): 2294-2304 (2007) - [j6]Minghui Shi, Xuemin Shen, Yixin Jiang, Chuang Lin:
Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks. IEEE Wirel. Commun. 14(5): 38-46 (2007) - [j5]Minghui Shi, Liang Xu, Xuemin Shen, Jon W. Mark, Aladdin Saleh:
Air interface switching and performance analysis for fast vertical handoff in cellular network and WLAN interworking. Wirel. Commun. Mob. Comput. 7(5): 581-594 (2007) - [c11]Minghui Shi, Changle Zhou:
Diagnostic Rules Discovery with Hierarchical Clustering and Focusing Mechanism Based on Rough Sets Theory. FSKD (2) 2007: 673-677 - [c10]Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon W. Mark, Aladdin Saleh:
An Agent Based Authentication Architecture for WLAN/Cellular Integrated Service. ICC 2007: 1166-1171 - [c9]Minghui Shi, Changle Zhou:
Diagnosis in Traditional Chinese Medicine Using Artificial Neural Networks: State-of-the-art and Perspectives. ICNC (2) 2007: 290-294 - [c8]Minghui Shi, Changle Zhou:
An Approach to Syndrome Differentiation in Traditional Chinese Medicine based on Neural Network. ICNC (1) 2007: 376-380 - [c7]Minghui Shi, Xuemin (Sherman) Shen, Jon W. Mark, Dongmei Zhao:
A versatile roaming service framework with billing support for WLAN/cellular integrated networks. QSHINE 2007: 38 - [c6]Haojin Zhu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen, Minghui Shi:
TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks. WCNC 2007: 2957-2962 - [c5]Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon W. Mark, Aladdin Saleh:
A Ticket ID System for Service Agent Based Authentication in WLAN/Cellular Integrated Networks. WCNC 2007: 4151-4155 - 2006
- [j4]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
A self-encryption authentication protocol for teleconference services. Int. J. Secur. Networks 1(3/4): 198-205 (2006) - [j3]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
Multiple Key Sharing and Distribution Scheme With (n, t) Threshold for NEMO Group Communications. IEEE J. Sel. Areas Commun. 24(9): 1738-1747 (2006) - [j2]Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi:
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. IEEE Trans. Wirel. Commun. 5(9): 2569-2577 (2006) - [c4]Humphrey Rutagemwa, Minghui Shi, Xuemin Shen, Jon W. Mark:
Performance of Wireless Profiled TCP in Heterogeneous Wireless Networks. ICC 2006: 736-741 - 2005
- [c3]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
A self-encryption authentication protocol with identity anonymity for teleconference services. GLOBECOM 2005: 5 - [c2]Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi:
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. NETWORKING 2005: 114-125 - 2004
- [j1]Minghui Shi, Xuemin Shen, Jon W. Mark:
IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks. IEEE Wirel. Commun. 11(4): 66-75 (2004) - 2003
- [c1]Minghui Shi, Xuemin Shen, Jon W. Mark:
A light weight authentication scheme for mobile wireless Internet applications. WCNC 2003: 2126-2131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-07 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint