default search action
Lu Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Renhao Lu, Weizhe Zhang, Hui He, Qiong Li, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Lu Shi, Yuelin Guo, Zejun Wang:
Two-Stage Client Selection for Federated Learning Against Free-Riding Attack: A Multiarmed Bandits and Auction-Based Approach. IEEE Internet Things J. 11(20): 33773-33787 (2024) - [j15]Zhen Gao, Lu Shi, Pedro Reviriego:
Enhancing data protection with a distributed storage system based on the redundant residue number system. Wirel. Networks 30(6): 5601-5612 (2024) - [i12]Weidong Gao, Lu Shi, Lie-Liang Yang:
Molecular Code-Division Multiple-Access: Signaling, Detection, and Performance. CoRR abs/2402.16097 (2024) - [i11]Zifan Wang, Yufei Jia, Lu Shi, Haoyu Wang, Haizhou Zhao, Xueyang Li, Jinni Zhou, Jun Ma, Guyue Zhou:
Arm-Constrained Curriculum Learning for Loco-Manipulation of the Wheel-Legged Robot. CoRR abs/2403.16535 (2024) - [i10]Hao Shen, Lu Shi, Wanru Xu, Yigang Cen, Linna Zhang, Gaoyun An:
Patch Spatio-Temporal Relation Prediction for Video Anomaly Detection. CoRR abs/2403.19111 (2024) - [i9]Lu Shi, Masih Haseli, Giorgos Mamakoukas, Daniel Bruder, Ian Abraham, Todd D. Murphey, Jorge Cortés, Konstantinos Karydis:
Koopman Operators in Robot Learning. CoRR abs/2408.04200 (2024) - [i8]Haozhe Lou, Yurong Liu, Yike Pan, Yiran Geng, Jianteng Chen, Wenlong Ma, Chenglong Li, Lin Wang, Hengzhen Feng, Lu Shi, Liyi Luo, Yongliang Shi:
Robo-GS: A Physics Consistent Spatial-Temporal Model for Robotic Arm with Hybrid Representation. CoRR abs/2408.14873 (2024) - [i7]Hansheng Wang, Lu Shi, Zhekai duan, Panruo Wu, Liwei Guo, Shaoshuai Zhang:
Extracting the Potential of Emerging Hardware Accelerators for Symmetric Eigenvalue Decomposition. CoRR abs/2410.02170 (2024) - 2023
- [j14]Lu Shi, Yuefeng Zhao:
Edge Detection of High-Resolution Remote Sensing Image Based on Multi-Directional Improved Sobel Operator. IEEE Access 11: 135979-135993 (2023) - [j13]Lu Shi, Jing Fang, Yue-feng Zhao:
Automatic shadow detection in high-resolution multispectral remote sensing images. Comput. Electr. Eng. 105: 108557 (2023) - [j12]Lu Shi, Xiaoran Di:
A recognition method of learning behaviour in English online classroom based on feature data mining. Int. J. Reason. based Intell. Syst. 15(1): 8-14 (2023) - [i6]Lu Shi, Zhichao Liu, Konstantinos Karydis:
Koopman Operators for Modeling and Control of Soft Robotics. CoRR abs/2301.09708 (2023) - [i5]Haixing Dai, Yiwei Li, Zhengliang Liu, Lin Zhao, Zihao Wu, Suhang Song, Ye Shen, Dajiang Zhu, Xiang Li, Sheng Li, Xiaobai Yao, Lu Shi, Quanzheng Li, Zhuo Chen, Donglan Zhang, Gengchen Mai, Tianming Liu:
AD-AutoGPT: An Autonomous GPT for Alzheimer's Disease Infodemiology. CoRR abs/2306.10095 (2023) - 2022
- [j11]Xuan Zhang, Lan Mu, Donglan Zhang, Yuping Mao, Lu Shi, Janani Rajbhandari-Thapa, Zhuo Chen, Yan Li, José A. Pagán:
Geographical and Temporal Analysis of Tweets Related to COVID-19 and Cardiovascular Disease in the US. Ann. GIS 28(4): 491-500 (2022) - [j10]Lu Shi, Konstantinos Karydis:
ACD-EDMD: Analytical Construction for Dictionaries of Lifting Functions in Koopman Operator-Based Nonlinear Robotic Systems. IEEE Robotics Autom. Lett. 7(2): 906-913 (2022) - [j9]Degang Zhang, Bo Cheng, Lu Shi, Jie Gao, Tengfei Long, Bo Chen, Guizhou Wang:
A Destriping Algorithm for SDGSAT-1 Nighttime Light Images Based on Anomaly Detection and Spectral Similarity Restoration. Remote. Sens. 14(21): 5544 (2022) - [c14]Lu Shi, Caio Mucchiani, Konstantinos Karydis:
Online Modeling and Control of Soft Multi-fingered Grippers via Koopman Operator Theory. CASE 2022: 1946-1952 - [i4]Lu Shi, Caio Mucchiani, Konstantinos Karydis:
Online Modeling and Control of Soft Multi-fingered Grippers via Koopman Operator Theory. CoRR abs/2206.10707 (2022) - 2021
- [j8]Lu Shi, Changyuan Wang, Hongbo Jia, Xiuhua Hu:
EPS: Robust Pupil Edge Points Selection with Haar Feature and Morphological Pixel Patterns. Int. J. Pattern Recognit. Artif. Intell. 35(6): 2156002:1-2156002:15 (2021) - [j7]Lu Shi, Changyuan Wang, Feng Tian, Hongbo Jia:
An integrated neural network model for pupil detection and tracking. Soft Comput. 25(15): 10117-10127 (2021) - [c13]Lu Shi, Jiangang Shu, Weizhe Zhang, Yang Liu:
HFL-DP: Hierarchical Federated Learning with Differential Privacy. GLOBECOM 2021: 1-7 - [c12]Lu Shi, Konstantinos Karydis:
Enhancement for Robustness of Koopman Operator-based Data-driven Mobile Robotic Systems. ICRA 2021: 2503-2510 - [c11]Lu Shi, Nader Moayeri, Chang Li:
On the Use of Lookahead to Improve Wi-Fi Fingerprinting Indoor Localization Accuracy. IPIN 2021: 1-8 - [i3]Lu Shi, Konstantinos Karydis:
Enhancement for Robustness of Koopman Operator-based Data-driven Mobile Robotic Systems. CoRR abs/2103.00812 (2021) - [i2]Lu Shi, Konstantinos Karydis:
ACD-EDMD: Analytical Construction for Dictionaries of Lifting Functions in Koopman Operator-based Nonlinear Robotic Systems. CoRR abs/2111.12256 (2021) - 2020
- [j6]Lu Shi, Lie-Liang Yang:
Performance of diffusive molecular communication systems with binary molecular shift keying modulation. IET Commun. 14(2): 262-273 (2020) - [j5]Lu Shi, Lie-Liang Yang:
Equalisation and performance of diffusive molecular communication systems with binary molecular-shift keying modulation. IET Commun. 14(4): 549-555 (2020) - [c10]Lu Shi, Hanzhe Teng, Xinyue Kan, Konstantinos Karydis:
A Data-driven Hierarchical Control Structure for Systems with Uncertainty. CCTA 2020: 57-63 - [i1]Lu Shi, Hanzhe Teng, Xinyue Kan, Konstantinos Karydis:
A Data-driven Hierarchical Control Structure for Systems with Uncertainty. CoRR abs/2009.05914 (2020)
2010 – 2019
- 2019
- [c9]Nader Moayeri, Chang Li, Lu Shi:
Indoor Localization Accuracy of Major Smartphone Location Apps. WCNC 2019: 1-8 - 2018
- [c8]Youping Zhao, Lu Shi, Xin Guo, Chen Sun:
Aggregate Interference Prediction Based on Back-Propagation Neural Network. DySPAN 2018: 1-5 - [c7]Nader Moayeri, Chang Li, Lu Shi:
PerfLoc (Part 2): Performance Evaluation of the Smartphone Indoor Localization Apps. IPIN 2018: 1-8 - 2017
- [j4]Lu Shi, Lie-Liang Yang:
Error Performance Analysis of Diffusive Molecular Communication Systems With On-Off Keying Modulation. IEEE Trans. Mol. Biol. Multi Scale Commun. 3(4): 224-238 (2017) - 2016
- [c6]Lu Shi, Lie-Liang Yang:
Diffusion-based molecular communications: Inter-symbol interference cancellation and system performance. ICCC 2016: 1-6 - 2015
- [j3]Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks. IEEE Internet Things J. 2(1): 52-62 (2015) - [c5]Lu Shi, Sergey Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko:
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems. AINA Workshops 2015: 582-586 - 2014
- [j2]Lei Han, Lu Shi, Yiling Yang, Dalei Song:
Thermal Physical Property-Based Fusion of Geostationary Meteorological Satellite Visible and Infrared Channel Images. Sensors 14(6): 10187-10202 (2014) - 2013
- [j1]Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan:
BANA: Body Area Network Authentication Exploiting Channel Characteristics. IEEE J. Sel. Areas Commun. 31(9): 1803-1816 (2013) - [c4]Lu Shi, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
SybilShield: An agent-aided social network-based Sybil defense among multiple communities. INFOCOM 2013: 1034-1042 - [c3]Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. WISEC 2013: 155-166 - 2012
- [c2]Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li:
Authenticated secret key extraction using channel characteristics for body area networks. CCS 2012: 1028-1030 - [c1]Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan:
BANA: body area network authentication exploiting channel characteristics. WISEC 2012: 27-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint