Jiantao Shi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j9]Jeremy Ferlic
, Jiantao Shi, Thomas O. McDonald, Franziska Michor:
DIFFpop: a stochastic computational approach to simulate differentiation hierarchies with single cell barcoding. Bioinformatics 35(19): 3849-3851 (2019) - [j8]Jiantao Shi, Xin Liu, Yuhao Yang, Jun Sun, Ning Wang:
Comments on "Deceptive jamming suppression with frequency diverse MIMO radar". Signal Processing 158: 1-3 (2019) - [c10]Likun Liu, Hongli Zhang, Jiantao Shi, Xiangzhan Yu, Haixiao Xu:
I2P Anonymous Communication Network Measurement and Analysis. SmartCom 2019: 105-115 - 2018
- [j7]Jiantao Shi, Donghua Zhou, Yuhao Yang, Jun Sun:
Fault tolerant multivehicle formation control framework with applications in multiquadrotor systems. SCIENCE CHINA Information Sciences 61(12): 124201:1-124201:3 (2018) - [c9]Likun Liu, Jiantao Shi, Hongli Zhang, Xiangzhan Yu:
Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 751-758 - 2016
- [j6]Jiantao Shi, Xiao He, Donghua Zhou:
Iterative learning control for nonlinear stochastic systems with variable pass length. J. Franklin Institute 353(15): 4016-4038 (2016) - [j5]Hongli Zhang, Zhikai Xu, Xiaojiang Du, Zhigang Zhou, Jiantao Shi:
CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing. Wireless Communications and Mobile Computing 16(15): 2179-2193 (2016) - [c8]Keyu Lu, Zhengmin Li, Zhaoxin Zhang, Jiantao Shi:
DNS recursive server health evaluation model. APNOMS 2016: 1-4 - 2015
- [j4]Emmanuel Dimont, Jiantao Shi, Rory Kirchner
, Winston Hide
:
edgeRun: an R package for sensitive, functionally relevant differential expression discovery using an unconditional exact test. Bioinformatics 31(15): 2589-2590 (2015) - [c7]Hongli Zhang, Zhikai Xu, Zhigang Zhou, Jiantao Shi, Xiaojiang Du:
CLPP: Context-aware location privacy protection for location-based social network. ICC 2015: 1164-1169 - [c6]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi:
An ICN-Oriented Name-Based Routing Scheme. ICYCSEE 2015: 101-108 - 2014
- [j3]Jiantao Shi, Xiao He, Zidong Wang
, Donghua Zhou:
Iterative Consensus for a Class of Second-order Multi-agent Systems. Journal of Intelligent and Robotic Systems 73(1-4): 655-664 (2014) - [j2]Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Mohsen Guizani:
Verifying cloud service-level agreement by a third-party auditor. Security and Communication Networks 7(3): 492-502 (2014) - 2013
- [j1]Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Hsiao-Hwa Chen:
Preventing Piracy Content Propagation in Peer-to-Peer Networks. IEEE Journal on Selected Areas in Communications 31(9-Supplement): 105-114 (2013) - [c5]Hongli Zhang, Jiantao Shi, Lin Ye, Xiaojiang Du:
PPBD: A piracy preventing system for BT DHT networks. INFOCOM 2013: 1806-1814 - 2012
- [c4]Lin Ye, Hongli Zhang, Jiantao Shi, Xiaojiang Du:
Verifying cloud Service Level Agreement. GLOBECOM 2012: 777-782 - [c3]Dong Wang, Hui He, Jiantao Shi:
The Measurement and Analysis of KAD Network. ISCTCS 2012: 117-123 - 2011
- [c2]Jiantao Shi, Hongli Zhang, Xiang-Zhan Yu, Jianhong Zhai:
Reliable object rating framework for content sharing system. CSS 2011: 27-32
2000 – 2009
- 2009
- [c1]Jiantao Shi, Kankan Wang, Ji Zhang:
Framework for Knowledge-Based Integrative Analysis of Microarray Data. IJCBS 2009: 56-59
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-05 23:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint