default search action
Weiren Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c6]Ying Zhao, Weiren Shi, Pengjie Qin, Wenbin Tian:
A Study on Wireless Sensor Network Layout Strategy in the Stable Temperature and Humidity Region. RCAR 2021: 1349-1354 - 2020
- [j19]Xin Shi, Pengjie Qin, Jiaqing Zhu, Maqiang Zhai, Weiren Shi:
Feature Extraction and Classification of Lower Limb Motion Based on sEMG Signals. IEEE Access 8: 132882-132892 (2020)
2010 – 2019
- 2019
- [j18]Xiaogang Wang, Weiren Shi, Dan Liu:
A Group Key Management Scheme for WSN Based on Lagrange Interpolation Polynomial Characteristic. KSII Trans. Internet Inf. Syst. 13(7): 3690-3713 (2019) - 2018
- [j17]Xiaogang Wang, Weiren Shi:
Secure Time Synchronization Protocol for Wireless Sensor Network Based on µTESLA Protocol. Int. J. Netw. Secur. 20(3): 536-546 (2018) - [j16]Tiejun Li, Guifang Shao, Yue Sun, Weiren Shi:
Contrast enhancement for cDNA microarray image based on fourth-order moment. Signal Image Video Process. 12(6): 1069-1077 (2018) - 2017
- [j15]Yong Feng, Qingyu Xiong, Weiren Shi:
Deep Nonlinear Metric Learning for Speaker Verification in the I-Vector Space. IEICE Trans. Inf. Syst. 100-D(1): 215-219 (2017) - 2016
- [j14]Wenjie Zhang, Qingyu Xiong, Weiren Shi, Shuhan Chen:
Region saliency detection via multi-feature on absorbing Markov chain. Vis. Comput. 32(3): 275-287 (2016) - 2015
- [j13]Xiaogang Wang, Weiren Shi:
A Mutual Broadcast Authentication Protocol for Wireless Sensor Networks Based on Fourier Series. Int. J. Distributed Sens. Networks 11: 397130:1-397130:10 (2015) - [j12]Yan Zhou, Weiren Shi, Wei Chen, Yong-Lin Chen, Ying Li, Li-Wen Tan, Dai-Qiang Chen:
Active contours driven by localizing region and edge-based intensity fitting energy with application to segmentation of the left ventricle in cardiac CT images. Neurocomputing 156: 199-210 (2015) - [j11]Jingpei Dan, Wenbo Guo, Weiren Shi, Bin Fang, Tingping Zhang:
PSO Based Deterministic ESN Models for Stock Price Forecasting. J. Adv. Comput. Intell. Intell. Informatics 19(2): 312-318 (2015) - [j10]Shuhan Chen, Weiren Shi, Xiao Lv:
Feature coding for image classification combining global saliency and local difference. Pattern Recognit. Lett. 51: 44-49 (2015) - 2014
- [j9]Yisong Jiang, Weiren Shi, Xiaogang Wang, Hongbing Li:
A distributed routing for wireless sensor networks with mobile sink based on the greedy embedding. Ad Hoc Networks 20: 150-162 (2014) - [j8]Hongbing Li, Qingyu Xiong, Weiren Shi, Cheng Zeng, Min Fan:
Gradient Based Multipath Reliable Transmission Strategy with Fault Tolerance for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j7]Peng Gao, Weiren Shi, Wei Zhou, Hongbing Li, Xiaogang Wang:
A Location Predicting Method for Indoor Mobile Target Localization in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j6]Hongbing Li, Qingyu Xiong, Weiren Shi, Liwan Chen, Xin Shi, Qiang Chen:
Mechanism of Immune System Based Multipath Fault Tolerant Routing Algorithm for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j5]Hongbing Li, Peng Gao, Qingyu Xiong, Weiren Shi, Qiang Chen:
A Vascular-Network-Based Nonuniform Hierarchical Fault-Tolerant Routing Algorithm for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j4]Wei Zhou, Weiren Shi, Xiaogang Wang, Kai Wang:
Adaptive Sensor Activation Algorithm for Target Tracking in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012)
2000 – 2009
- 2009
- [j3]Zuojin Li, Weiren Shi, Xin Shi, Zhi Zhong:
A supervised manifold learning method. Comput. Sci. Inf. Syst. 6(2): 205-215 (2009) - [j2]Weiren Shi, Kai Wang, Simon X. Yang:
A Fuzzy-Neural Network Approach To Multisensor Integration For Obstacle Avoidance Of A Mobile Robot. Intell. Autom. Soft Comput. 15(2): 289-301 (2009) - [j1]Weiren Shi, Zuojin Li, Xin Shi, Zhi Zhong:
A Survey of Biologically Inspired Image Processing for Objects Recognition. Int. J. Image Graph. 9(4): 495-510 (2009) - 2008
- [c5]Min Xiang, Weiren Shi, Xiaohui Zhang, Zhiyong Luo, Xia Yang:
A New Clustering Algorithm Based on the Optimum One-Hop Distance in Wireless Sensor Networks. ICESS 2008: 35-39 - 2007
- [c4]Xiao Ni, Weiren Shi, Victor Foo Siang Fook:
AES Security Protocol Implementation for Automobile Remote Keyless System. VTC Spring 2007: 2526-2529 - 2005
- [c3]Qingyu Xiong, Yinlin Huang, Shan Liang, Weiren Shi, Songsong Tan, Yinhua Lin:
Application of Evidence Theory and Neural Network in Warning System of Financial Risk. ISNN (2) 2005: 910-915 - 2004
- [c2]Simon X. Yang, Weiren Shi, Jin Zeng:
Modelling the Supercritical Fluid Extraction of Lycopene from Tomato Paste Waste Using Neuro-Fuzzy Approaches. ISNN (2) 2004: 880-885 - 2003
- [c1]Weiren Shi, Lixu Qin, Li Zhang, Xin Shi:
A new neural network approach to evaluate the potential of public works. SMC 2003: 4688-4693
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 18:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint