default search action
Kai Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Kai Shi 0001 — Texas A&M University, Wireless Communications Laboratory, College Station, TX, USA
- Kai Shi 0002 — Tianjin University, Department of Computer Science, China
- Kai Shi 0003 — University College London, Department of Electrical and Electronic Engineering, UK (and 1 more)
- Kai Shi 0004 — Xidian University, School of Computer Science and Technology, Xi'an, China (and 1 more)
- Kai Shi 0005 — Jiangsu University, Zhenjiang, China (and 1 more)
- Kai Shi 0006 — East China University of Science and Technology, Department of Computer Science and Engineering, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Wen Jiang, Mengyang Liu, Mingyan Xu, Shuoru Chen, Kai Shi, Pingping Liu, Caiming Zhang, Feng Zhao:
New reinforcement learning based on representation transfer for portfolio management. Knowl. Based Syst. 293: 111697 (2024) - 2023
- [j10]Jiansheng Li, Kai Shi, Xuejiao Wei, Yidai Xia:
Generating solutions to far analogies makes individuals tend to categorize information based on thematic relations. Cogn. Process. 24(4): 471-480 (2023) - [j9]Kai Shi, Jun Li, Gang Bao:
Shape perception of soft hand based on dual-signal comparison contact detection. Ind. Robot 50(6): 959-968 (2023) - [c18]Lu Li, Guanling Zhao, Kai Shi, Fengjun Zhang:
A Stochastic Game Model for Cloud Platform Security. ICISSP 2023: 152-162 - [c17]Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi:
Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings. ICISSP 2023: 651-658 - [c16]Kai Shi, Qichao Liu, Zhizhong Zheng, Liang Xiao:
Efficient Implementation for Composite CNN-Based HSI Classification Algorithm with Huawei Ascend Framework. WHISPERS 2023: 1-5 - [i1]Bo Yang, Zhihao Zhang, Kirisame Marisa, Kai Shi:
Monadic Deep Learning. CoRR abs/2307.12187 (2023) - 2022
- [c15]Qian Zhou, Hua Dai, Liang Liu, Kai Shi, Jie Chen, Hong Jiang:
The final security problem in IOT: Don't count on the canary! DSC 2022: 599-604 - 2020
- [j8]Qin Nie, Kai Shi, Yi Gong, Feipeng Ran, Zongmei Li, Runjing Chen, Lizhong Hua:
Spatial-Temporal Variability of Land Surface Temperature Spatial Pattern: Multifractal Detrended Fluctuation Analysis. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 2010-2018 (2020) - [c14]Bin Yan, Tianxiang Chen, Xiaohui Zhu, Yong Yue, Bing Xu, Kai Shi:
A Comprehensive Survey and Analysis on Path Planning Algorithms and Heuristic Functions. SAI (1) 2020: 581-598
2010 – 2019
- 2018
- [j7]Kai Shi, Haihan Ye, Wentao Song, Guanglei Zhou:
Virtual Inertia Control Strategy in Microgrid Based on Virtual Synchronous Generator Technology. IEEE Access 6: 27949-27957 (2018) - 2017
- [j6]Kai Shi, Ming Xu, Haoxia Jin, Tong Qiao, Xue Yang, Ning Zheng, Jian Xu, Kim-Kwang Raymond Choo:
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics. Digit. Investig. 23: 11-21 (2017) - [j5]Ruilian Tan, Zhe Li, Peng Bai, Kai Shi, Baoxiang Ren, Xuhua Wang:
Directional AF Cooperative Communication System Based on Outage Probability. Int. J. Bus. Data Commun. Netw. 13(2): 55-68 (2017) - [j4]Kai Shi, Luokun Ren, Yiming Peng, Huijia Li:
基于多节点社团意识系统的属性图聚类算法 (Attributed Graph Clustering Algorithm Based on Cluster-aware Multiagent System). 计算机科学 44(Z6): 433-437 (2017) - [j3]Zairan Li, Kai Shi, Nilanjan Dey, Amira S. Ashour, Dan Wang, Valentina Emilia Balas, Pamela McCauley, Fuqian Shi:
Rule-based back propagation neural networks for various precision rough set presented KANSEI knowledge prediction: a case study on shoe product form features extraction. Neural Comput. Appl. 28(3): 613-630 (2017) - [c13]Kai Shi, Hai Yu, Zhiliang Zhu, Jingde Cheng:
Anticipatory Runway Incursion Prevention Based on Inaccurate Position Surveillance Information. ACIIDS (2) 2017: 93-104 - [c12]Ming Xu, Jinkai Sun, Ning Zheng, Tong Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang:
A Novel File Carving Algorithm for EVTX Logs. ICDF2C 2017: 97-105 - [c11]Kai Shi:
Combining Evolutionary Algorithms with Constraint Solving for Configuration Optimization. ICSME 2017: 665-669 - [c10]Xiwei Liu, Kai Shi, Hai Yu, Zhiliang Zhu:
Relative health index of wind turbines based on kernel density estimation. IECON 2017: 5957-5961 - [c9]Yuechen Wang, Zhiliang Zhu, Hang Song, Kai Shi:
Wind turbine gearbox condition monitoring based on extreme gradient boosting. IECON 2017: 6017-6023 - 2016
- [c8]Zhe Li, Ruilian Tan, Kai Shi, Baoxiang Ren:
Research on Directional AF Cooperative Communication System Based on Outage Probability. 3PGCIC 2016: 497-505 - [c7]Haitao Du, Hang Song, Kai Shi, Zhiliang Zhu:
Wind Turbine Dynamic State Prediction Method Based on the Similarity of Historical Data. ISCID (2) 2016: 285-290 - [c6]Kai Shi, Hang Song, Hai Yu, Zhiliang Zhu:
Collaborative Contextual Anomaly Detection for Industrial Equipment Groups. ISCID (1) 2016: 381-385 - 2013
- [j2]Kai Shi, Yuichi Goto, Zhiliang Zhu, Jingde Cheng:
Anticipatory Runway Incursion Prevention Systems. IEICE Trans. Inf. Syst. 96-D(11): 2385-2396 (2013) - [j1]Weifeng Zhao, Xin Huang, Kai Shi, Lei Zhang:
TSBCC: Time Series-Based Congestion Control Algorithm for Wireless Network. J. Networks 8(5): 1058-1064 (2013) - [c5]Kai Shi, Yuichi Goto, Zhiliang Zhu, Jingde Cheng:
Anticipatory Emergency Elevator Evacuation Systems. ACIIDS (1) 2013: 117-126 - [c4]Hongbiao Gao, Kai Shi, Yuichi Goto, Jingde Cheng:
Finding Theorems in NBG Set Theory by Automated Forward Deduction Based on Strong Relevant Logic. COCOON 2013: 697-704 - 2012
- [c3]Hongbiao Gao, Kai Shi, Yuichi Goto, Jingde Cheng:
Automated theorem finding by forward deduction based on strong relevant logic: A case study in NBG set theory. ICMLC 2012: 1859-1865 - 2011
- [c2]Shahram Abdollahi-Alibeik, David Weber, Hakan Dogan, William W. Si, Burcin Baytekin, Abbas Komijani, Richard Chang, Babak Vakili-Amini, MeeLan Lee, Haitao Gan, Yashar Rajavi, Hirad Samavati, Brian J. Kaczynski, Sang-Min Lee, Sotirios Limotyrakis, Hyunsik Park, Phoebe Chen, Paul Park, Mike Shuo-Wei Chen, Andrew Chang, Yangjin Oh, Jerry Jian-Ming Yang, Eric Chien-Chih Lin, Lalitkumar Nathawad, Keith Onodera, Manolis Terrovitis, Sunetra Mendis, Kai Shi, Srenik S. Mehta, Masoud Zargari, David K. Su:
A 65nm dual-band 3-stream 802.11n MIMO WLAN SoC. ISSCC 2011: 170-172 - [c1]Youquan Liu, Kai Shi, Heng Deng, Enhua Wu:
A multi-GPU based semi-Lagrangian fluid solver. VRCAI 2011: 321-326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint