
Zi Li
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j13]Rongling Lang, Wanyang Ye, Fei Zhao, Zi Li:
An Adaptive Algorithm for Calculating Crosstalk Error for Blind Source Separation. Informatica 31(2): 299-312 (2020) - [c30]Risheng Liu, Zi Li, Yuxi Zhang, Xin Fan, Zhongxuan Luo:
Bi-level Probabilistic Feature Learning for Deformable Image Registration. IJCAI 2020: 723-730 - [c29]Yuxi Zhang, Risheng Liu, Zi Li, Zhu Liu, Xin Fan, Zhongxuan Luo:
Coupling Principled Refinement with Bi-Directional Deep Estimation for Robust Deformable 3D Medical Image Registration. ISBI 2020: 86-90 - [i2]Risheng Liu, Zi Li, Yuxi Zhang, Chenying Zhao, Hao Huang, Zhongxuan Luo, Xin Fan:
A Multi-scale Optimization Learning Framework for Diffeomorphic Deformable Registration. CoRR abs/2004.14557 (2020)
2010 – 2019
- 2018
- [j12]Zi Li
, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. IEEE Trans. Inf. Forensics Secur. 13(3): 802-817 (2018) - [j11]Zi Li, Qingqi Pei, Ian D. Markwood
, Yao Liu, Miao Pan, Hongning Li:
Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking. IEEE Trans. Veh. Technol. 67(6): 5042-5053 (2018) - [j10]Zi Li
, Qingqi Pei, Yao Liu:
Spoofing attacks and countermeasures in fm indoor localization system. World Wide Web 21(1): 219-240 (2018) - [c28]Jinli Liu, Haokai Song, Qingqi Pei, Zi Li, Yang Zhan, Kefeng Fan:
TrustCF: A Hybrid Collaborative Filtering Recommendation Model with Trust Information. ICC 2018: 1-6 - 2017
- [j9]Zi Li, Wensheng Zhang, Daji Qiao, Yang Peng:
Lifetime balanced data aggregation for the internet of things. Comput. Electr. Eng. 58: 244-264 (2017) - [j8]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
A lifetime-balancing MAC protocol under the end-to-end delay requirement. J. Commun. Networks 19(1): 51-64 (2017) - [c27]Haokai Song, Qingqi Pei, Yang Xiao, Zi Li, Yong Wang:
A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks. NaNA 2017: 17-23 - [c26]Guojun Ma, Xing Li, Qingqi Pei, Zi Li:
A Security Routing Protocol for Internet of Things Based on RPL. NaNA 2017: 209-213 - 2016
- [j7]Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun Zhong, Qiaobin Fu, Zi Li, Gaogang Xie, Xiaoming Li:
A Shifting Bloom Filter Framework for Set Queries. Proc. VLDB Endow. 9(5): 408-419 (2016) - [c25]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
Dynamic sensing scheduling to prolong network lifetime under practical requirements. ICC 2016: 1-7 - [c24]Chen Tian, Junhua Yan, Alex X. Liu, Yizhou Tang, Yuankun Zhong, Zi Li:
Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters. ICNP 2016: 1-2 - [c23]Zi Li, Yao Liu, Qingqi Pei, Lei Bai:
Spoofing Attacks against FM Indoor Localization. NaNA 2016: 190-195 - 2015
- [j6]Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao:
A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks. Comput. J. 58(4): 627-643 (2015) - [c22]Qingqi Pei, Lichuan Ma, Hongning Li, Zi Li, Dingyu Yan, Zhao Li:
Reputation-based coalitional games for spectrum allocation in distributed Cognitive Radio networks. ICC 2015: 7269-7274 - [c21]Wenbo Wu, Rui Kang, Zi Li:
Risk assessment method for cybersecurity of cyber-physical systems based on inter-dependency of vulnerabilities. IEEM 2015: 1618-1622 - [i1]Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun Zhong, Qiaobin Fu, Zi Li, Gaogang Xie, Xiaoming Li:
A Shifting Bloom Filter Framework for Set Queries. CoRR abs/1510.03019 (2015) - 2014
- [c20]Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
Joint charging and rate allocation for utility maximization in sustainable sensor networks. SECON 2014: 459-467 - 2013
- [j5]Qingqi Pei, Zi Li
, Lichuan Ma:
A Trust Value-Based Spectrum Allocation Algorithm in CWSNs. Int. J. Distributed Sens. Networks 9 (2013) - [c19]Zi Li, Hongyang Zhao, Qingqi Pei:
A Path-Combination Based Routing Scheme for Cognitive Radio Networks. ICGEC 2013: 247-256 - [c18]Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
Joint Aggregation and MAC design to prolong sensor network lifetime. ICNP 2013: 1-10 - [c17]Qingqi Pei, Conglin Wang, Zi Li:
Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks. INCoS 2013: 528-534 - [c16]Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:
I2C: A holistic approach to prolong the sensor network lifetime. INFOCOM 2013: 2670-2678 - 2012
- [c15]Li-jun Xu, Zi Li, Jing Cheng:
The study of fuzzy PID control of dosing pump in sewerage system. FSKD 2012: 497-500 - [c14]Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks. INFOCOM 2012: 1844-1852 - [c13]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks. WASA 2012: 272-291 - 2011
- [j4]Zi Li, Xu Zhang, Gang Lu:
A Fortran program for calculating electron or hole mobility in disordered semiconductors from first-principles. Comput. Phys. Commun. 182(12): 2632-2637 (2011) - [j3]Zi Li
, Xian-zhong Mao
:
Global multiquadric collocation method for groundwater contaminant source identification. Environ. Model. Softw. 26(12): 1611-1621 (2011) - [c12]Zi Li, Yang Peng, Wensheng Zhang, Daji Qiao:
J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime. ICNP 2011: 373-382 - [c11]Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:
Delay-bounded MAC with minimal idle listening for sensor networks. INFOCOM 2011: 1314-1322 - 2010
- [c10]Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang:
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing. ICDCS 2010: 438-447 - [c9]Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang:
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks. INFOCOM 2010: 1891-1899 - [c8]Hua Qin, Zi Li, Yanfei Wang, Xuejia Lu, Wensheng Zhang, Guiling Wang:
An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. PerCom 2010: 79-87 - [c7]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
Prolonging Sensor Network Lifetime Through Wireless Charging. RTSS 2010: 129-139 - [c6]Zi Li, Yang Peng, Wensheng Zhang, Daji Qiao:
Study of Joint Routing and Wireless Charging Strategies in Sensor Networks. WASA 2010: 125-135
2000 – 2009
- 2009
- [c5]Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang:
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks. QSHINE 2009: 148-166 - 2008
- [j2]Zi Li, Yueming Cai:
Maximum-likelihood detection based on branch and bound algorithm for MIMO systems. Sci. China Ser. F Inf. Sci. 51(3): 306-319 (2008) - 2007
- [j1]Zi Li, Chengkang Pan, Yueming Cai, Youyun Xu:
A Novel Quadratic Programming Model for Soft-Input Soft-Output MIMO Detection. IEEE Signal Process. Lett. 14(12): 924-927 (2007) - [c4]Zi Li, Yueming Cai, Mingfang Ni:
Low Complexity MIMO Detection based on Branch and Bound Algorithm. PIMRC 2007: 1-5 - 2006
- [c3]Zi Li, Yueming Cai, Youyun Xu:
Optimal Training Signals Design for MIMO OFDM Systems with Guard Subcarriers. VTC Spring 2006: 1541-1544 - 2005
- [c2]Jie Tang, Yong Liang, Zi Li:
Multiple strategies detection in ontology mapping. WWW (Special interest tracks and posters) 2005: 1040-1041 - 2003
- [c1]Yue Li, Zi Li, Yueming Cai, Youyun Xu:
An improved channel estimation scheme for OFDM systems by tracking the subspace. PIMRC 2003: 1109-1113
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-12 22:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint