default search action
Zhijie Jerry Shi
Person information
- affiliation: University of Connecticut, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Jun Li, Zhijie Shi, Jialiang Zhu, Jin Liu, Lihua Qiu, Yeye Song, Liqun Wang, Yuling Li, Yongliang Liu, Dawei Zhang, Haima Yang, Le Fu:
Placenta segmentation in magnetic resonance imaging: Addressing position and shape of uncertainty and blurred placenta boundary. Biomed. Signal Process. Control. 88(Part A): 105680 (2024) - 2023
- [c40]Shanglin Zhou, Yingjie Li, Minhan Lou, Weilu Gao, Zhijie Shi, Cunxi Yu, Caiwen Ding:
Physics-aware Roughness Optimization for Diffractive Optical Neural Networks. DAC 2023: 1-6 - [i6]Shanglin Zhou, Yingjie Li, Minhan Lou, Weilu Gao, Zhijie Shi, Cunxi Yu, Caiwen Ding:
Physics-aware Roughness Optimization for Diffractive Optical Neural Networks. CoRR abs/2304.01500 (2023) - 2021
- [j26]Evan Faulkner, Zelin Yun, Shengli Zhou, Zhijie Jerry Shi, Song Han, Georgios B. Giannakis:
An Advanced GNU Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer. IEEE Internet Things J. 8(11): 9206-9218 (2021)
2010 – 2019
- 2019
- [j25]Jie Dong, Zhijie Shi, Ruiqi Sun:
An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System. IEEE Access 7: 72885-72895 (2019) - [j24]Jie Dong, Ruiqi Sun, Kaixiang Peng, Zhijie Shi, Liang Ma:
Quality Monitoring and Root Cause Diagnosis for Industrial Processes Based on Lasso-SAE-CCA. IEEE Access 7: 90230-90242 (2019) - [c39]Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
SoK: Sharding on Blockchain. AFT 2019: 41-61 - [c38]Gang Wang, Zhijie Shi, Mark Nixon, Song Han:
ChainSplitter: Towards Blockchain-Based Industrial IoT Architecture for Supporting Hierarchical Storage. Blockchain 2019: 166-175 - [c37]Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
SMChain: a scalable blockchain protocol for secure metering systems in distributed industrial plants. IoTDI 2019: 249-254 - [c36]Kevin Kerliu, Alexandra Ross, Gong Tao, Zelin Yun, Zhijie Shi, Song Han, Shengli Zhou:
Secure Over-The-Air Firmware Updates for Sensor Networks. MASS Workshops 2019: 97-100 - [i5]Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage. CoRR abs/1910.00742 (2019) - [i4]Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage. IACR Cryptol. ePrint Arch. 2019: 1138 (2019) - [i3]Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
SoK: Sharding on Blockchain. IACR Cryptol. ePrint Arch. 2019: 1178 (2019) - [i2]Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants. IACR Cryptol. ePrint Arch. 2019: 1401 (2019) - 2017
- [j23]Chujiao Ma, John A. Chandy, Zhijie Shi:
Algebraic Side-Channel Attack on Twofish. J. Internet Serv. Inf. Secur. 7(2): 32-43 (2017) - 2016
- [j22]Yu Luo, Lina Pu, Zheng Peng, Zhijie Shi:
RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. IEEE Commun. Mag. 54(2): 32-38 (2016) - [j21]Xingyu Cai, Lei Wan, Yi Huang, Shengli Zhou, Zhijie Shi:
Further results on multicarrier MFSK based underwater acoustic communications. Phys. Commun. 18: 15-27 (2016) - [j20]Yi Huang, Shengli Zhou, Zhijie Jerry Shi, Lifeng Lai:
Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems. IEEE Trans. Wirel. Commun. 15(9): 5875-5888 (2016) - 2015
- [j19]Michael Zuba, Zhijie Shi, Zheng Peng, Jun-Hong Cui, Shengli Zhou:
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks. Secur. Commun. Networks 8(16): 2635-2645 (2015) - [c35]Abdulaziz Miyajan, Zhijie Shi, Chun-Hsi Huang, Turki F. Al-Somani:
Accelerating higher-order masking of AES using composite field and SIMD. ISSPIT 2015: 575-580 - 2014
- [j18]Wei Zeng, Jordan Cote, Xian Chen, Yoo-Ah Kim, Wei Wei, Kyoungwon Suh, Bing Wang, Zhijie Jerry Shi:
Delay monitoring for wireless sensor networks: An architecture using air sniffers. Ad Hoc Networks 13: 549-559 (2014) - [j17]Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Jerry Shi, François-Xavier Standaert, Chujiao Ma:
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations. IEEE Trans. Inf. Forensics Secur. 9(6): 999-1014 (2014) - [j16]Yuan Song, Bing Wang, Zhijie Shi, Krishna R. Pattipati, Shalabh Gupta:
Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks. IEEE Trans. Mob. Comput. 13(5): 1035-1047 (2014) - [c34]Yi Huang, Shengli Zhou, Zhijie Shi, Lifeng Lai:
Experimental study of secret key generation in underwater acoustic channels. ACSSC 2014: 323-327 - [c33]Xiaoyan Lu, Michael Zuba, Jun-Hong Cui, Zhijie Jerry Shi:
Uncooperative localization improves attack performance in Underwater Acoustic Networks. CNS 2014: 454-462 - [c32]Md. Tauhidur Rahman, Kan Xiao, Domenic Forte, Xuhei Zhang, Zhijie Jerry Shi, Mohammad Tehranipoor:
TI-TRNG: Technology Independent True Random Number Generator. DAC 2014: 179:1-179:6 - [c31]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu:
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. FDTC 2014: 29-39 - [c30]Michael Zuba, Michael Fagan, Zhijie Shi, Jun-Hong Cui:
A resilient pressure routing scheme for underwater acoustic networks. GLOBECOM 2014: 637-642 - [c29]Muhammad Samir, Michael Kowalski, Shengli Zhou, Zhijie Jerry Shi:
An Experimental Study of Effective Jamming in Underwater Acoustic Links. MASS 2014: 737-742 - 2013
- [j15]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais:
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Comput. Secur. 39: 173-189 (2013) - [j14]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Hao Luo:
Enhanced Side-Channel Cube Attacks on PRESENT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 332-339 (2013) - [j13]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. J. Syst. Softw. 86(3): 728-743 (2013) - [c28]Michael Zuba, Michael Fagan, Jun-Hong Cui, Zhijie Jerry Shi:
A vulnerability study of geographic routing in Underwater Acoustic Networks. CNS 2013: 109-117 - [c27]Fan Zhang, Xinjie Zhao, Shize Guo, Tao Wang, Zhijie Shi:
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers. COSADE 2013: 62-79 - [c26]Xinjie Zhao, Shize Guo, Fan Zhang, Zhijie Shi, Chujiao Ma, Tao Wang:
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques. FDTC 2013: 41-51 - [c25]Lei Wan, Hao Zhou, Xiaoka Xu, Yi Huang, Shengli Zhou, Zhijie Shi, Jun-Hong Cui:
Field tests of adaptive modulation and coding for underwater acoustic OFDM. WUWNet 2013: 35:1-35:5 - 2012
- [j12]Xian Chen, Yoo-Ah Kim, Bing Wang, Wei Wei, Zhijie Jerry Shi, Yuan Song:
Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring. Ad Hoc Networks 10(1): 62-74 (2012) - [j11]Lei Wan, Zhaohui Wang, Shengli Zhou, T. C. Yang, Zhijie Shi:
Performance Comparison of Doppler Scale Estimation Methods for Underwater Acoustic OFDM. J. Electr. Comput. Eng. 2012: 703243:1-703243:11 (2012) - [j10]Hai Yan, Lei Wan, Shengli Zhou, Zhijie Shi, Jun-Hong Cui, Jie Huang, Hao Zhou:
DSP based receiver implementation for OFDM acoustic modems. Phys. Commun. 5(1): 22-32 (2012) - [c24]Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi:
Static secure page allocation for light-weight dynamic information flow tracking. CASES 2012: 27-36 - [c23]Xin-jie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji:
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. COSADE 2012: 231-248 - [c22]Haining Mo, Son N. Le, Zheng Peng, Zhijie Shi, Jun-Hong Cui:
Aqua-OS: An Operating System for Underwater Acoustic Networks. WASA 2012: 561-573 - [c21]Jun-Hong Cui, Shengli Zhou, Zhijie Shi, James O'Donnell, Zheng Peng, Mario Gerla, Burkard Baschek, Sumit Roy, Payman Arabshahi, Xi Zhang:
Ocean-TUNE: a community ocean testbed for underwater wireless networks. WUWNet 2012: 17 - [i1]Xin-jie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji:
Algebraic Differential Fault Attacks on LED using a Single Fault Injection. IACR Cryptol. ePrint Arch. 2012: 347 (2012) - 2011
- [j9]Robert Zhong Zhou, James Zheng Peng, Jun-Hong Cui, Zhijie Shi, Amvrossios C. Bagtzoglou:
Scalable Localization with Mobility Prediction for Underwater Sensor Networks. IEEE Trans. Mob. Comput. 10(3): 335-348 (2011) - [j8]Robert Zhong Zhou, James Zheng Peng, Jun-Hong Cui, Zhijie Shi:
Efficient multipath communication for time-critical applications in underwater acoustic sensor networks. IEEE/ACM Trans. Netw. 19(1): 28-41 (2011) - [c20]Fan Zhang, Zhijie Jerry Shi:
Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool. ITNG 2011: 359-365 - [c19]Michael Zuba, Zhijie Shi, Zheng Peng, Jun-Hong Cui:
Launching denial-of-service jamming attacks in underwater sensor networks. WUWNet 2011: 12 - 2010
- [j7]Peng Xie, Robert Zhong Zhou, James Peng Zheng, Jun-Hong Cui, Zhijie Shi:
SDRT: A reliable data transport protocol for underwater sensor networks. Ad Hoc Networks 8(7): 708-722 (2010) - [j6]Peng Xie, Robert Zhong Zhou, Nicolas C. Nicolaou, Andrew See, Jun-Hong Cui, Zhijie Shi:
Efficient Vector-Based Forwarding for Underwater Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j5]Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi:
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors. IEEE Trans. Very Large Scale Integr. Syst. 18(11): 1519-1532 (2010) - [c18]Jordan Cote, Bing Wang, Wei Zeng, Zhijie Shi:
Capability and Fidelity of Mote-Class Wireless Sniffers. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [c17]Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi:
PIFT: efficient dynamic information flow tracking using secure page allocation. WESS 2009 - [c16]Peng Xie, Robert Zhong Zhou, James Peng Zheng, Jun-Hong Cui, Zhijie Shi:
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks. WASA 2009: 305-314 - 2008
- [j4]Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee:
Alternative application-specific processor architectures for fast arbitrary bit permutations. Int. J. Embed. Syst. 3(4): 219-228 (2008) - [j3]Zhijie Jerry Shi, Hai Yun:
Software Implementations of Elliptic Curve Cryptography. Int. J. Netw. Secur. 7(1): 141-150 (2008) - [c15]Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhijie Jerry Shi:
Making register file resistant to power analysis attacks. ICCD 2008: 577-582 - [c14]Fan Zhang, Zhijie Jerry Shi:
An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. ITNG 2008: 120-126 - [c13]Fan Zhang, Zhijie Jerry Shi, Bing Wang:
Chord-Based Key Establishment Schemes for Sensor Networks. ITNG 2008: 731-737 - [c12]Hai Yan, Zhijie Jerry Shi, Jun-Hong Cui:
DBR: Depth-Based Routing for Underwater Sensor Networks. Networking 2008: 72-86 - 2007
- [c11]Yunsi Fei, Zhijie Jerry Shi:
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors. DATE 2007: 815-820 - [c10]Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi:
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. ICCD 2007: 187-193 - [c9]Hai Yan, Shengli Zhou, Zhijie Jerry Shi, Baosheng Li:
A DSP implementation of OFDM acoustic modem. Underwater Networks 2007: 89-92 - 2006
- [c8]Hai Yan, Zhijie Jerry Shi:
Studying Software Implementations of Elliptic Curve Cryptography. ITNG 2006: 78-83 - 2005
- [j2]Ruby B. Lee, Xiao Yang, Zhijie Shi:
Single-Cycle Bit Permutations with MOMR Execution. J. Comput. Sci. Technol. 20(5): 577-585 (2005) - 2004
- [c7]Ruby B. Lee, Xiao Yang, Zhijie Shi:
Validating Word-Oriented Processors for Bit and Multi-word Operations. Asia-Pacific Computer Systems Architecture Conference 2004: 473-488 - [c6]Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw:
On Permutation Operations in Cipher Design. ITCC (2) 2004: 569-577 - 2003
- [c5]Zhijie Shi, Xiao Yang, Ruby B. Lee:
Arbitrary Bit Permutations in One or Two Cycles. ASAP 2003: 237- - [c4]Ruby B. Lee, David K. Karig, John Patrick McGregor, Zhijie Shi:
Enlisting Hardware Architecture to Thwart Malicious Code Injection. SPC 2003: 237-252 - 2002
- [c3]Ruby B. Lee, A. Murat Fiskiran, Zhijie Shi, Xiao Yang:
Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. ASAP 2002: 253-264 - [c2]Zhijie Shi, Ruby B. Lee:
Subword Sorting with Versatile Permutation Instructions. ICCD 2002: 234-241 - 2001
- [j1]Ruby B. Lee, Zhijie Shi, Xiao Yang:
Cryptography Efficient Permutation Instructions for Fast Software. IEEE Micro 21(6): 56-69 (2001) - 2000
- [c1]Zhijie Shi, Ruby B. Lee:
Bit Permutation Instructions for Accelerating Software Cryptography. ASAP 2000: 138-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint