Zhijie Jerry Shi
Zhijie Jerry Shi
Verified email at
Cited by
Cited by
DBR: Depth-based routing for underwater sensor networks
H Yan, ZJ Shi, JH Cui
NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next …, 2008
Scalable localization with mobility prediction for underwater sensor networks
Z Zhou, Z Peng, JH Cui, Z Shi, A Bagtzoglou
IEEE Transactions on Mobile Computing 10 (3), 335-348, 2010
Aqua-Sim: An NS-2 based simulator for underwater sensor networks
P Xie, Z Zhou, Z Peng, H Yan, T Hu, JH Cui, Z Shi, Y Fei, S Zhou
OCEANS 2009, 1-7, 2009
Sok: Sharding on blockchain
G Wang, ZJ Shi, M Nixon, S Han
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
Bit permutation instructions for accelerating software cryptography
Z Shi, RB Lee
Proceedings IEEE International Conference on Application-Specific Systems …, 2000
Adaptive modulation and coding for underwater acoustic OFDM
L Wan, H Zhou, X Xu, Y Huang, S Zhou, Z Shi, JH Cui
IEEE Journal of Oceanic Engineering 40 (2), 327-336, 2014
Efficient permutation instructions for fast software cryptography
RB Lee, Z Shi, X Yang
IEEE Micro 21 (6), 56-69, 2001
Enlisting hardware architecture to thwart malicious code injection
RB Lee, DK Karig, JP McGregor, Z Shi
Security in Pervasive Computing: First International Conference, Boppard …, 2004
Chainsplitter: Towards blockchain-based industrial iot architecture for supporting hierarchical storage
G Wang, Z Shi, M Nixon, S Han
2019 IEEE International Conference on Blockchain (Blockchain), 166-175, 2019
DSP based receiver implementation for OFDM acoustic modems
H Yan, L Wan, S Zhou, Z Shi, JH Cui, J Huang, H Zhou
Physical Communication 5 (1), 22-32, 2012
SDRT: A reliable data transport protocol for underwater sensor networks
P Xie, Z Zhou, Z Peng, JH Cui, Z Shi
Ad Hoc Networks 8 (7), 708-722, 2010
Void avoidance in three-dimensional mobile underwater sensor networks
P Xie, Z Zhou, Z Peng, JH Cui, Z Shi
Wireless Algorithms, Systems, and Applications: 4th International Conference …, 2009
A processor architecture defense against buffer overflow attacks
JP McGregor, DK Karig, Z Shi, RB Lee
International Conference on Information Technology: Research and Education …, 2003
Efficient multipath communication for time-critical applications in underwater acoustic sensor networks
Z Zhou, Z Peng, JH Cui, Z Shi
IEEE/ACM transactions on networking 19 (1), 28-41, 2010
Aqua-Net: An underwater sensor network architecture: Design, implementation, and initial testing
Z Peng, Z Zhou, JH Cui, ZJ Shi
OCEANS 2009, 1-8, 2009
Efficient vector-based forwarding for underwater sensor networks
P Xie, Z Zhou, N Nicolaou, A See, JH Cui, Z Shi
EURASIP Journal on Wireless Communications and Networking 2010, 1-13, 2010
A DSP implementation of OFDM acoustic modem
H Yan, S Zhou, ZJ Shi, B Li
Proceedings of the 2nd Workshop on Underwater Networks, 89-92, 2007
Performance comparison of Doppler scale estimation methods for underwater acoustic OFDM
L Wan, Z Wang, S Zhou, TC Yang, Z Shi
Journal of Electrical and Computer Engineering 2012, 1-1, 2012
Distributed algorithms for energy-efficient even self-deployment in mobile sensor networks
Y Song, B Wang, Z Shi, KR Pattipati, S Gupta
IEEE Transactions on Mobile Computing 13 (5), 1035-1047, 2013
Comparing fast implementations of bit permutation instructions
Y Hilewitz, ZJ Shi, RB Lee
Conference Record of the Thirty-Eighth Asilomar Conference on Signals …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20