default search action
Ronghua Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Heyuan Shi, Binqi Zeng, Ruishi Yu, Yulin Yang, Zijian Zouxia, Chao Hu, Ronghua Shi:
H3NI: Non-target-specific node injection attacks on hypergraph neural networks via genetic algorithm. Neurocomputing 613: 128746 (2025) - 2024
- [j39]Muhammad Uzair, Jian Dong, Ronghua Shi, Husnain Mushtaq, Irshad Ullah:
Channelwise and Spatially Guided Multimodal Feature Fusion Network for 3-D Object Detection in Autonomous Vehicles. IEEE Trans. Geosci. Remote. Sens. 62: 1-15 (2024) - 2023
- [j38]Wenyu Li, Ronghua Shi, Jian Dong:
Harris hawks optimizer based on the novice protection tournament for numerical and engineering optimization problems. Appl. Intell. 53(6): 6133-6158 (2023) - [j37]Barakat AlBadani, Jian Dong, Ronghua Shi, Raeed Al-Sabri, Dhekra Saeed, Alaa Thobhani:
SMGNN: span-to-span multi-channel graph neural network for aspect-sentiment triplet extraction. J. Intell. Inf. Syst. 61(3): 695-715 (2023) - [j36]Jian Zhou, Leixin Wu, Yanyan Feng, Hui Li, Jinjing Shi, Ronghua Shi:
Four-state continuous-variable quantum key distribution with a hybrid linear amplifier. Quantum Inf. Process. 22(9): 356 (2023) - [j35]Jinjing Shi, Yongze Tang, Yuhu Lu, Yanyan Feng, Ronghua Shi, Shichao Zhang:
Quantum Circuit Learning With Parameterized Boson Sampling. IEEE Trans. Knowl. Data Eng. 35(2): 1965-1976 (2023) - [j34]Jinjing Shi, Zhenhuan Li, Wei Lai, Fangfang Li, Ronghua Shi, Yanyan Feng, Shichao Zhang:
Two End-to-End Quantum-Inspired Deep Neural Networks for Text Classification. IEEE Trans. Knowl. Data Eng. 35(4): 4335-4345 (2023) - 2022
- [j33]Jinjing Shi, Yuhu Lu, Yanyan Feng, Duan Huang, Xiaoping Lou, Qin Li, Ronghua Shi:
A quantum hash function with grouped coarse-grained boson sampling. Quantum Inf. Process. 21(2): 73 (2022) - [j32]Wei Zhao, Ronghua Shi, Xinchao Ruan, Ying Guo, Yiyu Mao, Yanyan Feng:
Monte Carlo-based security analysis for multi-mode continuous-variable quantum key distribution over underwater channel. Quantum Inf. Process. 21(5): 186 (2022) - [j31]Yanyan Feng, Jian Zhou, Jie Li, Wei Zhao, Jinjing Shi, Ronghua Shi, Wei Li:
SKC-CCCO: an encryption algorithm for quantum group signature. Quantum Inf. Process. 21(9): 328 (2022) - [c18]Hai Shu, Ronghua Shi, Qiran Jia, Hongtu Zhu, Ziqi Chen:
mFI-PSO: A Flexible and Effective Method in Adversarial Image Generation for Deep Neural Networks. IJCNN 2022: 1-8 - 2021
- [j30]Lin Wang, Ronghua Shi, Jian Dong:
A Hybridization of Dragonfly Algorithm Optimization and Angle Modulation Mechanism for 0-1 Knapsack Problems. Entropy 23(5): 598 (2021) - [j29]Hui Wang, Ronghua Shi, Kun Tang, Jian Dong, Shaowei Liao:
Performance Analysis and Optimization of a Cooperative Transmission Protocol in NOMA-Assisted Cognitive Radio Networks with Discrete Energy Harvesting. Entropy 23(6): 785 (2021) - [j28]Kun Tang, Shaowei Liao, Jian Dong, Ronghua Shi:
Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node. Peer-to-Peer Netw. Appl. 14(2): 837-851 (2021) - [j27]Wei Zhao, Ronghua Shi, Jinjing Shi, Xinchao Ruan, Ying Guo, Duan Huang:
Quantum digital signature based on measurement-device-independent continuous-variable scheme. Quantum Inf. Process. 20(7): 1-17 (2021) - [c17]Lin Wang, Ronghua Shi, Wenyu Li, Xia Yuan, Jian Dong:
An Improved Dragonfly Algorithm Based on Angle Modulation Mechanism for Solving 0-1 Knapsack Problems. ICSI (1) 2021: 83-93 - [c16]Wenyu Li, Ronghua Shi, Heng Zou, Jian Dong:
Fireworks Harris Hawk Algorithm Based on Dynamic Competition Mechanism for Numerical Optimization. ICSI (1) 2021: 441-450 - 2020
- [c15]Xingkai Ren, Ronghua Shi, Fangfang Li:
Distill BERT to Traditional Models in Chinese Machine Reading Comprehension (Student Abstract). AAAI 2020: 13901-13902 - [c14]Zengsheng Zhong, Shuirun Wei, Yeting Xu, Ying Zhao, Fangfang Zhou, Feng Luo, Ronghua Shi:
SilkViser: A Visual Explorer of Blockchain-based Cryptocurrency Transaction Data. IEEE VAST@IEEE VIS 2020: 95-106 - [i2]Ronghua Shi, Hai Shu, Hongtu Zhu, Ziqi Chen:
Adversarial Image Generation and Training for Deep Convolutional Neural Networks. CoRR abs/2006.03243 (2020) - [i1]Zengsheng Zhong, Shuirun Wei, Yeting Xu, Ying Zhao, Fangfang Zhou, Feng Luo, Ronghua Shi:
SilkViser: A Visual Explorer of Blockchain-based Cryptocurrency Transaction Data. CoRR abs/2009.02651 (2020)
2010 – 2019
- 2019
- [j26]Yanyan Feng, Ronghua Shi, Jinjing Shi, Jian Zhou, Ying Guo:
Arbitrated quantum signature scheme with quantum walk-based teleportation. Quantum Inf. Process. 18(5): 154 (2019) - [j25]Adnan Khurshid, Jian Dong, Ronghua Shi:
A Metamaterial-Based Compact Planar Monopole Antenna for Wi-Fi and UWB Applications. Sensors 19(24): 5426 (2019) - 2018
- [j24]Kun Tang, Ronghua Shi, Heyuan Shi, Md. Zakirul Alam Bhuiyan, Entao Luo:
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting. Ad Hoc Networks 81: 174-182 (2018) - [j23]Yang Shi, Ying Zhao, Fangfang Zhou, Ronghua Shi, Yaoxue Zhang:
A Novel Radial Visualization of Intrusion Detection Alerts. IEEE Computer Graphics and Applications 38(6): 83-95 (2018) - [j22]Kun Tang, Ronghua Shi, Jian Dong:
Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting. Future Gener. Comput. Syst. 86: 1218-1227 (2018) - [j21]Kun Tang, Ronghua Shi, Jingchun Xi, Heyuan Shi, Wentai Lei:
Cooperative spectrum sharing in cognitive radio networks with energy accumulation: design and analysis. IET Commun. 12(15): 1788-1796 (2018) - [j20]Kehua Guo, Zhonghe Liang, Ronghua Shi, Chao Hu, Zuoyong Li:
Transparent Learning: An Incremental Machine Learning Framework Based on Transparent Computing. IEEE Netw. 32(1): 146-151 (2018) - [j19]Jian Zhou, Ronghua Shi, Ying Guo:
Squeezed-state quantum key distribution with a Rindler observer. Quantum Inf. Process. 17(3): 47 (2018) - [j18]Zhaoyuan Zhang, Ronghua Shi, Guihua Zeng, Ying Guo:
Coherent attacking continuous-variable quantum key distribution with entanglement in the middle. Quantum Inf. Process. 17(6): 133 (2018) - [j17]Sheng Zhang, Ronghua Shi, Jue Zhao:
Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow. Wirel. Pers. Commun. 101(4): 2127-2142 (2018) - 2017
- [c13]Kun Tang, Ronghua Shi, Entao Luo:
Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks. ISPA/IUCC 2017: 428-432 - 2016
- [j16]Sheng Zhang, Ronghua Shi:
Visual fusion of multi-source network security data based on labelled treemap. Int. J. Netw. Virtual Organisations 16(3): 265-282 (2016) - [j15]Sheng Zhang, Ronghua Shi, Jue Zhao:
A Visualization System for Multiple Heterogeneous Network Security Data and Fusion Analysis. KSII Trans. Internet Inf. Syst. 10(6): 2801-2816 (2016) - [j14]Ronghua Shi, Mengjie Yang, Ying Zhao, Fangfang Zhou, Wei Huang, Sheng Zhang:
A Matrix-Based Visualization System for Network Traffic Forensics. IEEE Syst. J. 10(4): 1350-1360 (2016) - [c12]Yang Shi, Yaoxue Zhang, Fangfang Zhou, Ying Zhao, Guojun Wang, Ronghua Shi, Xing Liang:
IDSPlanet: A Novel Radial Visualization of Intrusion Detection Alerts. VINCI 2016: 25-29 - 2015
- [j13]Yin Li, Ronghua Shi:
An intelligent solar energy-harvesting system for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2015: 179 (2015) - [j12]Jinjing Shi, Ronghua Shi, Xiaoqi Peng, Ying Guo, Moon Ho Lee:
Quantum relay cooperative communication via space-time transmission. Quantum Inf. Comput. 15(7&8): 660-676 (2015) - [j11]Fangli Yang, Ronghua Shi, Ying Guo, Jinjing Shi, Guihua Zeng:
Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier. Quantum Inf. Process. 14(8): 3041-3056 (2015) - [c11]Yin Li, Chuyuan Guo, Ronghua Shi, Xiaoqun Liu, Yan Mei:
DBSCAN-M: An Intelligent Clustering Algorithm Based on Mutual Reinforcement. ICA3PP (2) 2015: 66-77 - [c10]Ronghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, Yunxiang Jiang:
TDD-Based Massive MIMO Systems: Overview and Development. ICA3PP (Workshops and Symposiums) 2015: 393-402 - 2014
- [j10]Jian Dong, Yi Jiang, Fang Liu, Xuanzi Zhu, Ronghua Shi:
MIMO radar antenna array synthesis with a hybrid approach based on GA and PSO. Int. J. Embed. Syst. 6(2/3): 108-113 (2014) - [j9]Jinjing Shi, Ronghua Shi, Yin Li, Ye Kang, Xiaoqi Peng:
Quantum states sharing in the relay system with teleportation of non-maximally entanglement. Int. J. Internet Protoc. Technol. 8(2/3): 143-149 (2014) - [j8]Wentai Lei, Ronghua Shi, Jian Dong, Yujia Shi:
A Multi-Scale Weighted Back Projection Imaging Technique for Ground Penetrating Radar Applications. Remote. Sens. 6(6): 5151-5163 (2014) - 2013
- [j7]Jinjing Shi, Ronghua Shi, Ying Guo, Xiaoqi Peng, Ying Tang:
Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56(5): 1-9 (2013) - [j6]Jinjing Shi, Ronghua Shi, Ying Guo, Xiaoqi Peng, Moon Ho Lee:
Probabilistic quantum relay communication in the noisy channel with analogous space-time code. Quantum Inf. Process. 12(5): 1859-1870 (2013) - [c9]Fangfang Zhou, Ronghua Shi, Ying Zhao, Yezi Huang, Xing Liang:
NetSecRadar: A Visualization System for Network Security Situational Awareness. CSS 2013: 403-416 - [c8]Ronghua Shi, Ye Kang, Zhaoyuan Zhang:
Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System. CSS 2013: 417-428 - 2012
- [c7]Ying Zhao, Fangfang Zhou, Ronghua Shi:
NetSecRadar: A real-time visualization system for network security: VAST 2012 Mini Challenge. Award: Honorable mention for interesting use of radial visualization technique. IEEE VAST 2012: 281-282 - [c6]Jinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee:
A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State. TrustCom 2012: 1038-1041 - 2011
- [j5]Jinjing Shi, Ronghua Shi, Ying Tang, Moon Ho Lee:
A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5): 653-670 (2011) - [c5]Ronghua Shi, Qian Su, Ying Guo, Moon Ho Lee:
Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem. TrustCom 2011: 900-904 - [c4]Ronghua Shi, Jinjing Shi, Ying Guo, Moon Ho Lee:
Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation. TrustCom 2011: 905-910 - 2010
- [j4]Ronghua Shi, Ying Guo, Moon Ho Lee:
Quantum codes based on fast pauli block transforms in the finite field. Quantum Inf. Process. 9(5): 611-628 (2010)
2000 – 2009
- 2009
- [c3]Feng Wang, Ronghua Shi:
Design and Implementation for Transport Dispatch System in Enterprise. WGEC 2009: 731-734 - 2008
- [c2]Ronghua Shi, Yongyan Deng:
An Improved Scheme for Reducing the Latency of AODV in Ad Hoc Networks. ICYCS 2008: 594-598 - [c1]Ronghua Shi, Yanhua Yan:
Protection against Mobile Adversaries in Mobile Ad-hoc Networks. ICYCS 2008: 2026-2031
1990 – 1999
- 1996
- [j3]Ronghua Shi:
A redundant binary algorithm for RSA. J. Comput. Sci. Technol. 11(4): 416-420 (1996) - 1992
- [j2]Ronghua Shi:
2-neighborhoods and hamiltonian conditions. J. Graph Theory 16(3): 267-271 (1992)
1980 – 1989
- 1985
- [j1]Feng Tian, Xiaotie Deng, Ronghua Shi:
Smallest regular graphs with girth pair (4, 2t+1). Graphs Comb. 1(1): 201-202 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint