default search action
Shizhong Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Chen Liu, Jiming Chen, Haoyu Liu, Shizhong Li, Shibo He:
Toward Efficient Traffic Incident Detection via Explicit Edge-Level Incident Modeling. IEEE Internet Things J. 11(11): 20015-20029 (2024) - [j11]Shizhong Li, Wenchao Meng, Shibo He, Jichao Bi, Guanglun Liu:
STAGED: A Spatial-Temporal Aware Graph Encoder-Decoder for Fault Diagnosis in Industrial Processes. IEEE Trans. Ind. Informatics 20(2): 1742-1752 (2024) - [c12]Shizhong Li, Wei Zhang, Ruonan Chen, Dawei Li:
A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoT. BigDataSecurity 2024: 90-95 - [c11]Shiyuan Meng, Wenchao Meng, Qihang Zhou, Shizhong Li, Weiye Hou, Shibo He:
MoEAD: A Parameter-Efficient Model for Multi-class Anomaly Detection. ECCV (85) 2024: 345-361 - [c10]Chen Liu, Shibo He, Haoyu Liu, Shizhong Li:
Treemil: A Multi-Instance Learning Framework for Time Series Anomaly Detection with Inexact Supervision. ICASSP 2024: 7510-7514 - [c9]Chen Liu, Shibo He, Qihang Zhou, Shizhong Li, Wenchao Meng:
Large Language Model Guided Knowledge Distillation for Time Series Anomaly Detection. IJCAI 2024: 2162-2170 - [c8]Hongsen Liu, Lin Wang, Guangyi Liu, Yong Sun, Shizhong Li, Wenchao Meng:
Efficient HW/SW Co-design of FPGA Accelerator to Detect Anomaly Attacks in Smart Grids. ISIE 2024: 1-6 - [i2]Chen Liu, Shibo He, Haoyu Liu, Shizhong Li:
TreeMIL: A Multi-instance Learning Framework for Time Series Anomaly Detection with Inexact Supervision. CoRR abs/2401.11235 (2024) - [i1]Chen Liu, Shibo He, Qihang Zhou, Shizhong Li, Wenchao Meng:
Large Language Model Guided Knowledge Distillation for Time Series Anomaly Detection. CoRR abs/2401.15123 (2024) - 2023
- [j10]Hang Zhao, Yamin Zhang, Qiangqiang Jiang, Xiaofeng Wei, Shizhong Li, Bo Chen:
Software-Defined Satellite Observation: A Fast Method Based on Virtual Resource Pools. Remote. Sens. 15(22): 5388 (2023) - [j9]Dawei Li, Ruonan Chen, Qinjun Wan, Zhenyu Guan, Shizhong Li, Min Xie, Jieyu Su, Jianwei Liu:
Intelligent and Fair IoV Charging Service Based on Blockchain With Cross-Area Consensus. IEEE Trans. Intell. Transp. Syst. 24(12): 15984-15994 (2023) - [c7]Mengqiao Zhang, Yingpeng Zhang, Shizhong Li, Qinjun Wan:
Software Trusted Startup and Update Protection Scheme of IoT Devices. BigDataSecurity/HPSC/IDS 2023: 147-152 - [c6]Zhenyu Guan, Yang Zhang, Shizhong Li, Ruonan Chen, Dawei Li:
Scaling Blockchain via a Lightweight Tree-based Sharding System. NaNA 2023: 397-403 - 2022
- [j8]Daduan Zhao, Yan Li, Shizhong Li, Zhengran Cao, Chenghui Zhang:
Distributed Event-Triggered Impulsive Tracking Control for Fractional-Order Multiagent Networks. IEEE Trans. Syst. Man Cybern. Syst. 52(7): 4544-4556 (2022) - 2021
- [j7]Daoye Zhu, Chengqi Cheng, Weixin Zhai, Yihang Li, Shizhong Li, Bo Chen:
Multiscale Spatial Polygonal Object Granularity Factor Matching Method Based on BPNN. ISPRS Int. J. Geo Inf. 10(2): 75 (2021) - [j6]Dmitri V. Truhachev, Kamal El-Sankary, Alireza Karami, Abolfazl Zokaei, Shizhong Li:
Efficient Implementation of 400 Gbps Optical Communication FEC. IEEE Trans. Circuits Syst. I Regul. Pap. 68(1): 496-509 (2021) - [j5]Daduan Zhao, Chenghui Zhang, Yue Sun, Shizhong Li, Bo Sun, Yan Li:
Distributed Robust Frequency Restoration and Active Power Sharing for Autonomous Microgrids With Event-Triggered Strategy. IEEE Trans. Smart Grid 12(5): 3819-3834 (2021) - 2020
- [j4]Shuang Li, Kaihua Hou, Chengqi Cheng, Shizhong Li, Bo Chen:
A Space-Interconnection Algorithm for Satellite Constellation Based on Spatial Grid Model. Remote. Sens. 12(13): 2131 (2020) - [j3]Shizhong Li, Kamal El-Sankary, Alireza Karami, Dmitri V. Truhachev:
Area- and Power-Efficient Staircase Encoder Implementation for High-Throughput Fiber-Optical Communications. IEEE Trans. Very Large Scale Integr. Syst. 28(3): 843-847 (2020)
2010 – 2019
- 2019
- [c5]Rongjie Duan, Shizhong Li, Zehui Yuan, Ya Zhang:
Object Recognition and Localization Base on Binocular Vision. IGTA 2019: 300-309 - 2017
- [j2]Shizhong Li, Hai Bing Yin, Xiangzhong Fang, Huijuan Lu:
Lossless image compression algorithm and hardware architecture for bandwidth reduction of external memory. IET Image Process. 11(6): 379-388 (2017) - [c4]Xuan He, Shizhong Li, Hongjun Wang, Quan Yuan:
The Scheme Design of RFID Anti-collision in Mobile Tag Environment. CSPS 2017: 1767-1775 - [c3]Yu Zhou, Hongjun Wang, Shizhong Li:
Research on the Deployment Algorithm of Distributed Detection Network. CSPS 2017: 2467-2475 - 2014
- [j1]Hai Bing Yin, Shizhong Li, Honggang Qi, Hongqi Hu:
A Regular VLSI Architecture of Motion Vector Prediction for Multiple-Standard MPEG-Like Video Codec. J. Signal Process. Syst. 76(1): 47-62 (2014) - [c2]Haifeng Zhao, Yan Guo, Ya Zhang, Shizhong Li:
Penetration signal adaptive cognitive filtering model based on wavelet analysis. ICCI*CC 2014: 514-519 - 2013
- [c1]Hai Bing Yin, Shizhong Li, Hongqi Hu:
Multiple target performance evaluation model for HD video encoder VLSI architecture design. VCIP 2013: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint