Follow
Shiyu Ji
Title
Cited by
Cited by
Year
Wormhole attack detection algorithms in wireless network coding systems
S Ji, T Chen, S Zhong
IEEE transactions on mobile computing 14 (3), 660-674, 2014
772014
Efficient interaction-based neural ranking with locality sensitive hashing
S Ji, J Shao, T Yang
The World Wide Web Conference, 2858-2864, 2019
222019
Incentive mechanisms for discretized mobile crowdsensings
S Ji, T Chen
IEEE Transactions on Wireless Communications 15 (1), 146-161, 2015
222015
DAWN: Defending against wormhole attacks in wireless network coding systems
S Ji, T Chen, S Zhong, S Kak
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 664-672, 2014
182014
Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator
S Ji, X Tong, M Zhang
arXiv preprint arXiv:1208.0999, 2012
152012
Privacy-aware ranking with tree ensembles on the cloud
S Ji, J Shao, D Agun, T Yang
The 41st international ACM SIGIR conference on research & development in …, 2018
142018
Privacy-aware document ranking with neural signals
J Shao, S Ji, T Yang
Proceedings of the 42nd International ACM SIGIR Conference on Research and …, 2019
112019
Refining Approximating Betweenness Centrality Based on Samplings
S Ji, Z Yan
https://arxiv.org/abs/1608.04472, 2016
112016
On designing collusion-resistant incentive mechanisms for mobile crowdsensing systems
S Ji, T Chen
2017 IEEE Trustcom/BigDataSE/ICESS, 162-169, 2017
102017
Privacy and Efficiency Tradeoffs for Multiword Top K Search with Linear Additive Rank Scoring
D Agun, J Shao, S Ji, S Tessaro, T Yang
Proceedings of the 2018 world wide web conference, 1725-1734, 2018
72018
Crowdsensing incentive mechanisms for mobile systems with finite precisions
S Ji, T Chen
2014 IEEE International Conference on Communications (ICC), 2544-2549, 2014
62014
Index obfuscation for oblivious document retrieval in a trusted execution environment
J Shao, S Ji, AO Glova, Y Qiao, T Yang, T Sherwood
Proceedings of the 29th ACM International Conference on Information …, 2020
52020
Window navigation with adaptive probing for executing blockmax wand
J Shao, Y Qiao, S Ji, T Yang
Proceedings of the 44th international ACM SIGIR conference on research and …, 2021
42021
Crowdsourcing with trembles: Incentive mechanisms for mobile phones with uncertain sensing time
S Ji, T Chen, F Wu
2015 IEEE International Conference on Communications (ICC), 3546-3551, 2015
42015
Adaptive Modular Exponentiation Methods vs Python's Power Function
S Ji, K Wan
arXiv preprint arXiv:1707.01898, 2017
32017
On the correctness of inverted index based public-key searchable encryption scheme for multi-time search
S Ji
arXiv preprint arXiv:1608.06753, 2016
32016
Image encryption schemes for joint photographic experts group and graphics interchange format formats based on three-dimensional baker with compound chaotic sequence generator
S Ji, X Tong, M Zhang
Journal of Electronic Imaging 22 (1), 013017-013017, 2013
22013
k-Anonymously Private Search over Encrypted Data
S Ji, K Wan
arXiv preprint arXiv:1703.08269, 2017
12017
Privacy-aware document retrieval with two-level inverted indexing
Y Qiao, S Ji, C Wang, J Shao, T Yang
Information Retrieval Journal 26 (1), 12, 2023
2023
Privacy-aware Indexing and Ranking for Cloud Document Search
S Ji
University of California, Santa Barbara, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20