Zhijie Jerry Shi
Orcid: 0000-0002-6773-8371Affiliations:
- University of Connecticut, USA
According to our database1,
Zhijie Jerry Shi
authored at least 68 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Placenta segmentation in magnetic resonance imaging: Addressing position and shape of uncertainty and blurred placenta boundary.
Biomed. Signal Process. Control., February, 2024
2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
2021
IEEE Internet Things J., 2021
2019
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants.
IACR Cryptol. ePrint Arch., 2019
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage.
IACR Cryptol. ePrint Arch., 2019
An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System.
IEEE Access, 2019
Quality Monitoring and Root Cause Diagnosis for Industrial Processes Based on Lasso-SAE-CCA.
IEEE Access, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
2017
2016
Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems.
IEEE Trans. Wirel. Commun., 2016
Phys. Commun., 2016
RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements.
IEEE Commun. Mag., 2016
2015
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks.
Secur. Commun. Networks, 2015
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015
2014
Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks.
IEEE Trans. Mob. Comput., 2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014
Ad Hoc Networks, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Uncooperative localization improves attack performance in Underwater Acoustic Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014
2013
J. Syst. Softw., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013
Proceedings of the Conference on Underwater Networks and Systems, 2013
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Performance Comparison of Doppler Scale Estimation Methods for Underwater Acoustic OFDM.
J. Electr. Comput. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
Ad Hoc Networks, 2012
Proceedings of the Conference on Under Water Networks, 2012
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the 15th International Conference on Compilers, 2012
2011
Efficient multipath communication for time-critical applications in underwater acoustic sensor networks.
IEEE/ACM Trans. Netw., 2011
IEEE Trans. Mob. Comput., 2011
Proceedings of the Sixth ACM International Workshop on Underwater Networks, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
2010
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Ad Hoc Networks, 2010
Proceedings of the Global Communications Conference, 2010
2009
Proceedings of the Wireless Algorithms, 2009
Proceedings of the 4th Workshop on Embedded Systems Security, 2009
2008
Alternative application-specific processor architectures for fast arbitrary bit permutations.
Int. J. Embed. Syst., 2008
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the 26th International Conference on Computer Design, 2008
2007
Proceedings of the Second Workshop on Underwater Networks, 2007
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors.
Proceedings of the 25th International Conference on Computer Design, 2007
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007
2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
2005
2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003
2002
Proceedings of the 20th International Conference on Computer Design (ICCD 2002), 2002
Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments.
Proceedings of the 13th IEEE International Conference on Application-Specific Systems, 2002
2001
2000
Proceedings of the 12th IEEE International Conference on Application-Specific Systems, 2000