default search action
Zhicai Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Bo Huang, Shuai Zhang, Jitao Huang, Yijun Yu, Zhicai Shi, Yujie Xiong:
Knowledge distilled pre-training model for vision-language-navigation. Appl. Intell. 53(5): 5607-5619 (2023) - [j16]Paulo Neves, Kelly McClure, Jonas Verhoeven, Natalia Dyubankova, Ramil I. Nugmanov, Andrey Gedich, Sairam Menon, Zhicai Shi, Jörg K. Wegner:
Global reactivity models are impactful in industrial synthesis applications. J. Cheminformatics 15(1): 20 (2023) - [j15]Paulo Neves, Kelly McClure, Jonas Verhoeven, Natalia Dyubankova, Ramil I. Nugmanov, Andrey Gedich, Sairam Menon, Zhicai Shi, Jörg K. Wegner:
Correction: Global reactivity models are impactful in industrial synthesis applications. J. Cheminformatics 15(1): 30 (2023) - 2022
- [j14]Jiahao Zhang, Juan Zhang, Xing Wu, Zhicai Shi, Jenq-Neng Hwang:
Coarse-to-fine multiscale fusion network for single image deraining. J. Electronic Imaging 31(4) (2022) - [j13]Bo Huang, Ruyan Guo, Yimin Zhu, Zhijun Fang, Guohui Zeng, Jin Liu, Yini Wang, Hamido Fujita, Zhicai Shi:
Aspect-level sentiment analysis with aspect-specific context position information. Knowl. Based Syst. 243: 108473 (2022) - 2021
- [j12]Xin Zeng, Xiaomei Zhang, Shuqun Yang, Zhicai Shi, Chi-Hung Chi:
Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices. Sensors 21(13): 4592 (2021) - [j11]Chao Wang, Jiabin Yuan, Zebin Huang, Zhicai Shi:
Deep Learning-Based Correlation Analysis between Spine Surgery Lumbar Facet Joint and Lumbar Disc Herniation Using Magnetic Resonance Images. Sci. Program. 2021: 9623991:1-9623991:7 (2021) - 2020
- [j10]Fengting Yan, Yonghao Hu, Jinyuan Jia, Zihao Ai, Kai Tang, Zhicai Shi, Xiang Liu:
Interactive WebVR visualization for online fire evacuation training. Multim. Tools Appl. 79(41-42): 31541-31565 (2020) - [j9]Zhicai Shi, Xiaomei Zhang, Jin Liu:
The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security. Wirel. Commun. Mob. Comput. 2020: 8436917:1-8436917:12 (2020) - [c8]Yan Li, Zequn Li, Fengting Yan, Yu Wei, Linghong Kong, Zhicai Shi, Lei Qiao:
Simulation of Passenger Behavior in Virtual Subway Station Based on Multi-Agent. ICPCSEE (2) 2020: 393-408 - [c7]Jitao Huang, Bo Huang, Liangqi Zhu, Liyuan Ma, Jin Liu, Guohui Zeng, Zhicai Shi:
Real-time Vision-Language-Navigation based on a Lite Pre-training Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 399-404
2010 – 2019
- 2019
- [j8]Xiaomei Zhang, Chen Lyu, Zhicai Shi, Dongmei Li, Neal N. Xiong, Chi-Hung Chi:
Reliable Multiservice Delivery in Fog-Enabled VANETs: Integrated Misbehavior Detection and Tolerance. IEEE Access 7: 95762-95778 (2019) - 2018
- [j7]Shanshan Chen, Zhicai Shi, Fei Wu, Changzhi Wang, Jin Liu, Jiwei Chen:
Improved 3-D Indoor Positioning Based on Particle Swarm Optimization and the Chan Method. Inf. 9(9): 208 (2018) - 2017
- [j6]Changzhi Wang, Zhicai Shi, Fei Wu:
An Improved Particle Swarm Optimization-Based Feed-Forward Neural Network Combined with RFID Sensors to Indoor Localization. Inf. 8(1): 9 (2017) - [j5]Zhicai Shi, Xiaomei Zhang, Yihan Wang:
A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism. Inf. 8(3): 85 (2017) - [j4]Xiaomei Zhang, Qiang Chen, Zhicai Shi, Jianru Liang:
Fault-Aware Resource Allocation for Heterogeneous Data Sources with Multipath Routing. Sci. Program. 2017: 9749581:1-9749581:12 (2017) - [j3]Changzhi Wang, Zhicai Shi, Fei Wu:
Intelligent RFID Indoor Localization System Using a Gaussian Filtering Based Extreme Learning Machine. Symmetry 9(3): 30 (2017) - 2016
- [c6]Zhicai Shi, Fei Wu, Changzhi Wang, Shitao Ren:
A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier. SpaCCS 2016: 1-13 - 2015
- [j2]Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang:
A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags. J. Networks 10(6): 369-375 (2015) - 2014
- [j1]Zhicai Shi, Yongxiang Xia, Fei Wu, Jian Dai:
The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection. J. Networks 9(6): 1380-1387 (2014) - [c5]Zhicai Shi, Yongxiang Xia, Yu Zhang, Yihan Wang, Jian Dai:
A CRC-Based Lightweight Authentication Protocol for EPCglobal Class-1 Gen-2 Tags. ICA3PP (1) 2014: 632-643 - 2012
- [c4]Zhicai Shi:
A novel model for assessing network risks. FSKD 2012: 2088-2091 - 2010
- [c3]Zhicai Shi, Yongxiang Xia:
A novel hidden Markov model for detecting complicate network attacks. WCNIS 2010: 312-315
2000 – 2009
- 2007
- [c2]Dan Peng, Zhicai Shi, Longming Tao, Wu Ma:
Enhanced and Authenticated Deterministic Packet Marking for IP Traceback. APPT 2007: 508-517 - 2004
- [c1]Zhicai Shi, Zhenzhou Ji, Mingzeng Hu:
A novel distributed intrusion detection model based on mobile agent. InfoSecu 2004: 155-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint