default search action
Kexin Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Kexin Shi, Yuanpeng Xiong, Yu Wang, Yifan Deng, Wenjia Wang, Bingyi Jing, Xin Gao:
PractiCPP: a deep learning approach tailored for extremely imbalanced datasets in cell-penetrating peptide prediction. Bioinform. 40(2) (2024) - [j7]Kexin Shi, Yaru Fu, Kevin Hung:
A Diversified Recommendation Scheme for Wireless Content Caching Networks. IEEE Internet Things J. 11(9): 15100-15112 (2024) - [j6]Kexin Shi, Jiangjun Peng, Jing Gao, Yisi Luo, Shuang Xu:
Hyperspectral Image Denoising via Double Subspace Deep Prior. IEEE Trans. Geosci. Remote. Sens. 62: 1-15 (2024) - [c7]Xuxin Cheng, Kexin Shi, Ananye Agarwal, Deepak Pathak:
Extreme Parkour with Legged Robots. ICRA 2024: 11443-11450 - [c6]Kexin Shi, Hanwen Liu, Yi Chen, Hong Qu:
HL-ESViT: High-Low Frequency Efficient Spiking Vision Transformer. IJCNN 2024: 1-8 - [c5]Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong:
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing. USENIX Security Symposium 2024 - [i7]Kexin Shi, Jing Zhang, Linjiajie Fang, Wenjia Wang, Bingyi Jing:
Enhanced Bayesian Personalized Ranking for Robust Hard Negative Sampling in Recommender Systems. CoRR abs/2403.19276 (2024) - [i6]Shuai Wang, Dehao Zhang, Kexin Shi, Yuchen Wang, Wenjie Wei, Jibin Wu, Malu Zhang:
Global-Local Convolution with Spiking Neural Networks for Energy-efficient Keyword Spotting. CoRR abs/2406.13179 (2024) - [i5]Jing Zhang, Linjiajie Fang, Kexin Shi, Wenjia Wang, Bing-Yi Jing:
Q-Distribution guided Q-learning for offline reinforcement learning: Uncertainty penalized Q-value via consistency model. CoRR abs/2410.20312 (2024) - 2023
- [j5]Ya Zhang, Kexin Shi, Xiaoling Luo, Yi Chen, Yucheng Wang, Hong Qu:
A biologically inspired auto-associative network with sparse temporal population coding. Neural Networks 166: 670-682 (2023) - [c4]Yunlong Song, Kexin Shi, Robert Penicka, Davide Scaramuzza:
Learning Perception-Aware Agile Flight in Cluttered Environments. ICRA 2023: 1989-1995 - [c3]Yuchen Wang, Kexin Shi, Chengzhuo Lu, Yuguo Liu, Malu Zhang, Hong Qu:
Spatial-Temporal Self-Attention for Asynchronous Spiking Neural Networks. IJCAI 2023: 3085-3093 - [i4]Xuxin Cheng, Kexin Shi, Ananye Agarwal, Deepak Pathak:
Extreme Parkour with Legged Robots. CoRR abs/2309.14341 (2023) - 2022
- [i3]Yunlong Song, Kexin Shi, Robert Penicka, Davide Scaramuzza:
Learning Perception-Aware Agile Flight in Cluttered Environments. CoRR abs/2210.01841 (2022) - [i2]Kexin Shi, Yun Zhang, Bingyi Jing, Wenjia Wang:
Soft BPR Loss for Dynamic Hard Negative Sampling in Recommender Systems. CoRR abs/2211.13912 (2022) - 2021
- [j4]Liangliang Shang, Kexin Shi, Chen Ma, Aibing Qiu, Liang Hua:
Fault Detection and Identification Based on Explicit Polynomial Mapping and Combined Statistic in Nonlinear Dynamic Processes. IEEE Access 9: 149050-149066 (2021) - 2020
- [j3]Liehuang Zhu, Baokun Zheng, Meng Shen, Feng Gao, Hongyu Li, Kexin Shi:
Data Security and Privacy in Bitcoin System: A Survey. J. Comput. Sci. Technol. 35(4): 843-862 (2020) - [j2]Kexin Shi, Liehuang Zhu, Can Zhang, Lei Xu, Feng Gao:
Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multim. Tools Appl. 79(11-12): 8085-8105 (2020) - [j1]Guifang Fu, Kexin Shi, Kai Ye:
The Influence of Social Support on College Students' Mobile Phone Dependence: The Mediating Role of Security. Netw. Commun. Technol. 5(1): 44-50 (2020)
2010 – 2019
- 2018
- [i1]Liehuang Zhu, Baokun Zheng, Meng Shen, Shui Yu, Feng Gao, Hongyu Li, Kexin Shi, Keke Gai:
Research on the Security of Blockchain Data: A Survey. CoRR abs/1812.02009 (2018) - 2016
- [c2]Yang Yang, Yuan Zhang, Kexin Shi, Jianjun Li:
Optimal power control for energy efficiency of device-to-device communication underlaying cellular networks. INDIN 2016: 1028-1031 - 2015
- [c1]Dong Liang, Jingkang Yang, Rui Xuan, Zhaojing Zhang, Zhifang Yang, Kexin Shi:
Principal Component Analysis and Clustering Based Indoor Localizaion. ICDM Workshops 2015: 1103-1108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint