default search action
Ce Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Jie Yang, Ce Shi, Yueyan Chu, Wenbin Guo:
Graph signal reconstruction based on spatio-temporal features learning. Digit. Signal Process. 148: 104414 (2024) - [j24]Ce Shi, Yan-Peng Cui, Yueyan Chu, Weijie Yuan, Wenbin Guo:
Joint Subcarrier and Power Allocation Scheme for Sum-Rate Maximization in OTFS-NOMA System. IEEE Commun. Lett. 28(8): 1889-1893 (2024) - [j23]Qing Yu, Ce Shi:
An image classification approach for painting using improved convolutional neural algorithm. Soft Comput. 28(1): 847-873 (2024) - [j22]Ce Shi, Lei Zhao, Yan-Peng Cui, Yueyan Chu, Wenbin Guo, Wenbo Wang:
Joint Detection and Channel Estimation for MIMO-OTFS Systems. IEEE Trans. Veh. Technol. 73(8): 11568-11579 (2024) - [c6]Hao Jin, Ce Shi, Tatsuhiro Tsuchiya:
Summary of Constrained Detecting Arrays: Mathematical Structures for Fault Identification in Combinatorial Interaction Testing. ICSTW 2024: 215-216 - 2023
- [j21]Kejie Zhang, Yu Xin, Zhijun Xie, Ce Shi:
A swimming crab portunus trituberculatus re-identification method based on RNN encoding of striped key regions. Eng. Appl. Artif. Intell. 120: 105900 (2023) - [j20]Yueyan Chu, Wenxin Ma, Ce Shi, Jie Yang, Wenbin Guo:
Joint Localization and Passive Beamforming Exploiting Reconfigurable Intelligence Surface. IEEE Commun. Lett. 27(10): 2618-2622 (2023) - [j19]Hao Jin, Ce Shi, Tatsuhiro Tsuchiya:
Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing. Inf. Softw. Technol. 153: 107045 (2023) - [j18]Wei Liu, Yancong Zhu, Ruonan Huang, Takumi Ohashi, Jan Auernhammer, Xiaonan Zhang, Ce Shi, Lu Wang:
Designing interactive glazing through an engineering psychology approach: Six augmented reality scenarios that envision future car human-machine interface. Virtual Real. Intell. Hardw. 5(2): 157-170 (2023) - [c5]Yanpeng Cui, Qixun Zhang, Zhiyong Feng, Fan Liu, Ce Shi, Jinpo Fan, Ping Zhang:
Specific Beamforming for Multi-UAV Networks: A Dual Identity-Based ISAC Approach. ICC 2023: 4979-4985 - [i4]Yanpeng Cui, Qixun Zhang, Zhiyong Feng, Zhiqing Wei, Ce Shi, Jinpo Fan, Ping Zhang:
Dual Identities Enabled Low-Latency Visual Networking for UAV Emergency Communication. CoRR abs/2306.16304 (2023) - [i3]Yanpeng Cui, Qixun Zhang, Zhiyong Feng, Zhiqing Wei, Ce Shi, Heng Yang:
Topology-Aware Resilient Routing Protocol for FANETs: An Adaptive Q-Learning Approach. CoRR abs/2306.17360 (2023) - 2022
- [j17]Jian-Ning Sun, Ai-Xiang Zhu, Ce Shi, Bei Zhang, Guang-Sheng Tang, De-Guang Wang, Wang Bing:
Axial and frontal X-ray fluoroscopy technique of the sustentaculum tali can improve the accuracy of sustentacular screw placement. BMC Medical Imaging 22(1): 170 (2022) - [j16]Lei Wang, Meixiao Shen, Ce Shi, Yuheng Zhou, Yang Chen, Jiantao Pu, Hao Chen:
EE-Net: An edge-enhanced deep learning network for jointly identifying corneal micro-layers from optical coherence tomography. Biomed. Signal Process. Control. 71(Part): 103213 (2022) - [j15]Ce Shi, Juan Zhang, Xin Zhang, Meixiao Shen, Hao Chen, Lei Wang:
A recurrent skip deep learning network for accurate image segmentation. Biomed. Signal Process. Control. 74: 103533 (2022) - [j14]Yan-Peng Cui, Qixun Zhang, Zhiyong Feng, Zhiqing Wei, Ce Shi, Heng Yang:
Topology-Aware Resilient Routing Protocol for FANETs: An Adaptive Q-Learning Approach. IEEE Internet Things J. 9(19): 18632-18649 (2022) - [c4]Yanpeng Cui, Qixun Zhang, Zhiyong Feng, Zhiqing Wei, Ce Shi, Jinpo Fan, Ping Zhang:
Dual Identities Enabled Low-Latency Visual Networking for UAV Emergency Communication. GLOBECOM 2022: 474-479 - [c3]Yuhao Li, Lei Zhao, Ce Shi, Wenbin Guo:
Enhanced Channel-Grouping Based Rendezvous Algorithm for Cognitive Radio Ad Hoc Networks. icWCSN 2022: 71-77 - 2021
- [j13]Ce Shi, Jianfeng Fu, Chengmin Wang, Jie Yan:
Upper Bounds and Constructions of Locating Arrays. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(5): 827-833 (2021) - [j12]Wentao Wang, Ce Shi, Wei Chen:
Stochastic Nicholson-type delay differential system. Int. J. Control 94(5): 1426-1433 (2021) - [j11]Lei Wang, Meixiao Shen, Qian Chang, Ce Shi, Yang Chen, Yuheng Zhou, Yanchun Zhang, Jiantao Pu, Hao Chen:
Automated delineation of corneal layers on OCT images using a boundary-guided CNN. Pattern Recognit. 120: 108158 (2021) - [i2]Hao Jin, Ce Shi, Tatsuhiro Tsuchiya:
Constrained Detecting Arrays: Mathematical Structures for Fault Identification in Combinatorial Interaction Testing. CoRR abs/2110.06449 (2021) - 2020
- [j10]Ce Shi, Ling Jiang, Aiyuan Tao:
Consecutive Detecting Arrays for Interaction Faults. Graphs Comb. 36(4): 1203-1218 (2020) - [c2]Lei Wang, Meixiao Shen, Qian Chang, Ce Shi, Yuheng Zhou, Jiantao Pu:
BG-CNN: A Boundary Guided Convolutional Neural Network for Corneal Layer Segmentation from Optical Coherence Tomography. ICBIP 2020: 1-6 - [c1]Hao Jin, Ce Shi, Tatsuhiro Tsuchiya:
Constrained detecting arrays for fault localization in combinatorial testing. SAC 2020: 1971-1978 - [i1]Ce Shi, Hao Jin, Tatsuhiro Tsuchiya:
Locating arrays with mixed alphabet sizes. CoRR abs/2001.11712 (2020)
2010 – 2019
- 2019
- [j9]Yi Hu, Muhammad Awais Umar, Mustafa Habib, Ce Shi, Ghulam Rasool, Zijiang Zhu:
Antimagicness of mCn-Path and Its Disjoint Union. IEEE Access 7: 155299-155303 (2019) - [j8]Guangzhou Chen, Ce Shi, Yue Guo:
Ideal ramp schemes and augmented orthogonal arrays. Discret. Math. 342(2): 405-411 (2019) - 2017
- [j7]Ce Shi, Lin Zhang, Jingeng Mai, Zhen Zhao:
3D printing process selection model based on triangular intuitionistic fuzzy numbers in cloud manufacturing. Int. J. Model. Simul. Sci. Comput. 8(2): 1750028:1-1750028:19 (2017) - 2015
- [j6]Maria V. Chistiakova, Ce Shi, Andrea M. Armani:
Label-Free, Single Molecule Resonant Cavity Detection: A Double-Blind Experimental Study. Sensors 15(3): 6324-6341 (2015) - 2014
- [j5]Ce Shi, Jianxing Yin:
Existence of super-simple OA $$_{\lambda }(3, 5, v)^{\prime }$$ s. Des. Codes Cryptogr. 72(2): 369-380 (2014) - 2012
- [j4]Ce Shi, Yu Tang, Jianxing Yin:
The equivalence between optimal detecting arrays and super-simple OAs. Des. Codes Cryptogr. 62(2): 131-142 (2012) - 2011
- [j3]Bin Wen, Yang Li, Ce Shi:
A construction of optimal sets of FH sequences. Australas. J Comb. 50: 37-44 (2011) - 2010
- [j2]Xiongli Gu, Peng Liu, Zhiyuan Xu, Bingjie Xia, Cheng Li, Qingdong Yao, Ce Shi:
A synergetic operating unit on NoC layer for CMP system. Int. J. High Perform. Syst. Archit. 2(3/4): 145-155 (2010)
2000 – 2009
- 2009
- [j1]Wenzhe Zhang, Steve Hranilovic, Ce Shi:
Soft-switching hybrid FSO/RF links using short-length raptor codes: design and implementation. IEEE J. Sel. Areas Commun. 27(9): 1698-1708 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint