Photo Gallery


You are now here Home > Academics > Professors >

IS:ZHOU Shijie

published: 2016-12-27 14:38:31       hits: 

name : ZHOU Shijie Gender: Male phone: 13980969005
email: office-address: Office 413, School of Information and Software engineering, Chengdu
PH.D  Supervisor: YES Master Supervisor: YES
major: Software Engineering
research interst: Distrubuted computing, Intellitent Trasporation, Network Security, RFID, Big data
Biography: Dr. Shijie Zhou received his Ph.D. degree from the University Electronic Science and Technology of China (UESTC) in 2004. Currently, he is the professor in the school of computer science and engineering in UESETC. He had been the visiting scholar of Hong Kong university and Purdue University respectively in 2006 and 2010. He has published more than 50 papers and edited two book.
Education experience: Visiting scholar, Purdue University, 2009.12-2010.12
Visiting scholar, Hong Kong University, 2006.10-2007.4
Ph. D. Degree: School of Computer Science & Engineering, UESTC,2001-2004
M. Sc. Degree: School of Computer Science & Engineering, UESTC,1998-2001
B.Sc. Degree: Department of Material Engineering, University of Gansu Technology,1991-1995
Selected Publications: [1] Shijie Zhou, Yun Liu and Jin Xu. Modeling RFID readers deployment in three-dimensional space. International Journal of RF Technologies, 2016
[2] Shijie zhou, Jiaqing Luo. A general approach for the intensive RFID reader deployment, International Journal of Ad Hoc and Ubiquitous Computing, Vol.16, No.3, 2014
[3] Luo, Jiaqing; Xiao, Bin; Bu, Kai; Zhou, Shijie. Understanding and improving piece-related algorithms in the BitTorrent protocol, IEEE Transactions on Parallel and Distributed Systems, v 24, n 12, p 2526-2537, 2013
[4] Luo, Jiaqing; Xiao, Bin; Zhou, Shijie. A bottom-up model for heterogeneous BitTorrent systems, Journal of Parallel and Distributed Computing, v 73, n 8, p 1116-1126, 2013
[5] Zhou, Shijie, Zhang, Zhen, Luo, Zongwei. A Lightweight Anti-desynchronization RFID Authentication Protocol, Journal of Information Systems Frontiers, Vol.12, No.5, 2010
[6] Shijie Zhou, Zhen Zhang, Zongwei Luo, Edward C. Wong, CJ Tan,Lightweight Anti-desynchronization RFID Authentication Protocol, Journal of Information Systems Frontiers, 2010
[7] Shijie Zhou, Liu, Yun; Luo, Jiaqing. A cube based model for RFID coverage problem in three-dimensional space, Proc. of IEEE MSN 2013, p.115-120
[8] Zhou, Shijie, Deng, Weiwei; Luo, Jiaqing. A distributed simulator for large-scale peer-to-peer systems, Proceedings of 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012, p 130-135, 2012
[9] Sheng YU, Shijie Zhou, Leyuan LIU, Jiaqing LUO, and Yang RUI, "Malware Variants Identification Based on Byte Frequency", in proceeding of the 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, v 2, p 32-35, Wuhan China, 2010.
[10] Sheng YU, and Shijie Zhou, "A Survey on Metric of Software Complexity", in proceeding of the 2nd IEEE International Conference on Information Management and Engineering, v 2, p 352-356, Chengdu China, 2010.
Books: [1] Stephane Jaffard, Yves Meyer, Robert D.Ryan. Wavelets Tools for Science and Technology. Translated Chapter 9, 10, 11, National Defence Industry Press, Beijing, China, May 2006, ISBN:978711804363/7118043567, 269 pages, prices: RMB 35
[2] Jianping Li, etc. Un-traditional Wavelet Transform and Military Biological Information Security. Edited Chapter 4, UESTC Press, 2008