Jie Shi
Jie Shi
Security Expert in Huawei Singapore Research Centre
Verified email at - Homepage
Cited by
Cited by
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
European symposium on research in computer security, 419-435, 2014
SecTTS: A secure track & trace system for RFID-enabled supply chains
J Shi, Y Li, W He, D Sim
Computers in Industry, 2012
Bdpl: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
European Symposium on Research in Computer Security, 66-83, 2019
A fine-grained access control model for relational databases
J Shi, H Zhu
Journal of Zhejiang University-Science C 11 (8), 575-586, 2010
SecDS: a secure EPC discovery service system in EPCglobal network
J Shi, D Sim, Y Li, R Deng
Proceedings of the second ACM conference on Data and Application Security …, 2012
Constructing plausible innocuous pseudo queries to protect user query intention
Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip
Information Sciences 325, 215-226, 2015
A Secure and Efficient Discovery Service System in EPCglobal Network
J Shi, Y Li, RH Deng
Computers & Security, 2012
Batch clone detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs
J Shi, H Zhu, G Fu, T Jiang
Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS …, 2009
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
Effect of ultrasound therapy for knee osteoarthritis: A meta-analysis of randomized, double-blind, placebo-controlled clinical trials
C Zhang, J Shi, C Zhu, T Xiang, Z Yi, Y Kong
Int J Clin Exp Med 9 (11), 30552-20561, 2016
Fine grained transaction log for data recovery in database systems
G Fu, H Zhu, Y Feng, Y Zhu, J Shi, M Chen, X Wang
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 123-131, 2008
Controlling information leakage of fine-grained access model in dbmss
H Zhu, J Shi, Y Wang, Y Feng
2008 The Ninth International Conference on Web-Age Information Management …, 2008
Formal specification and verification of an extended security policy model for database systems
Z Hong, Z Yi, L Chenyang, S Jie, F Ge, W Yuanzhen
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 132-141, 2008
Game-theoretic understanding of adversarially learned features
J Ren, D Zhang, Y Wang, L Chen, Z Zhou, X Cheng, X Wang, Y Chen, ...
arXiv preprint arXiv:2103.07364, 2021
In situ visualization and real-time tracking of emulsion and miniemulsion polymerization at the microscale via fluorescence imaging
H Liu, J Shi, Y Pu, JX Wang, D Wang, JF Chen
Chemical Engineering Science 211, 115288, 2020
Dynamic data recovery for database systems based on fine grained transaction log
H Zhu, G Fu, Y Zhu, R Jin, K Lü, J Shi
Proceedings of the 2008 international symposium on Database engineering …, 2008
Kinetics of catalytic oxidation of sodium ethyl mercaptide
YY Zhan, J Shi, MJ Su, Y Luo, GW Chu, HK Zou, JF Chen
Chemical Engineering Science 217, 115516, 2020
Lightweight management of authorization update on cloud data
Z Cui, H Zhu, J Shi, L Chi, K Yan
2013 international conference on parallel and distributed systems, 456-461, 2013
The system can't perform the operation now. Try again later.
Articles 1–20