default search action
BibTeX records: Shuli Zheng
@article{DBLP:journals/tods/HuWYLLZ23, author = {Donghui Hu and Qing Wang and Song Yan and Xiaojun Liu and Meng Li and Shuli Zheng}, title = {Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing}, journal = {{ACM} Trans. Database Syst.}, volume = {48}, number = {2}, pages = {5:1--5:25}, year = {2023}, url = {https://doi.org/10.1145/3589761}, doi = {10.1145/3589761}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tods/HuWYLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdst/ZhengSL22, author = {Shuli Zheng and Yuyan Shen and Luming Liu}, title = {Knowledge Management Capability, Organizational Resilience, and the Growth of SMEs}, journal = {Int. J. Distributed Syst. Technol.}, volume = {13}, number = {4}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdst.313053}, doi = {10.4018/IJDST.313053}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdst/ZhengSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCZHLC22, author = {Meng Li and Yifei Chen and Shuli Zheng and Donghui Hu and Chhagan Lal and Mauro Conti}, title = {Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1133--1148}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3017534}, doi = {10.1109/TDSC.2020.3017534}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCZHLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuLPLZ21, author = {Donghui Hu and Yifan Li and Lixuan Pan and Meng Li and Shuli Zheng}, title = {A blockchain-based trading system for big data}, journal = {Comput. Networks}, volume = {191}, pages = {107994}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.107994}, doi = {10.1016/J.COMNET.2021.107994}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HuLPLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HongLZH21, author = {Tao Hong and Mingming Lv and Shuli Zheng and Haohui Hong}, title = {Key Technologies in 6G {SAGS} IoT: Shape-Adaptive Antenna and Radar-Communication Integration}, journal = {{IEEE} Netw.}, volume = {35}, number = {5}, pages = {150--157}, year = {2021}, url = {https://doi.org/10.1109/MNET.001.2100148}, doi = {10.1109/MNET.001.2100148}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/HongLZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/YuHZJLZ21, author = {Cong Yu and Donghui Hu and Shuli Zheng and Wenjie Jiang and Meng Li and Zhong{-}Qiu Zhao}, title = {An improved steganography without embedding based on attention {GAN}}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {3}, pages = {1446--1457}, year = {2021}, url = {https://doi.org/10.1007/s12083-020-01033-x}, doi = {10.1007/S12083-020-01033-X}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/YuHZJLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HongZLZ21, author = {Tao Hong and Shuli Zheng and Rongke Liu and Weiting Zhao}, title = {Design of mmWave Directional Antenna for Enhanced 5G Broadcasting Coverage}, journal = {Sensors}, volume = {21}, number = {3}, pages = {746}, year = {2021}, url = {https://doi.org/10.3390/s21030746}, doi = {10.3390/S21030746}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HongZLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengWH21, author = {Shuli Zheng and Yuzhao Wang and Donghui Hu}, title = {Lossless Data Hiding Based on Homomorphic Cryptosystem}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {692--705}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2913422}, doi = {10.1109/TDSC.2019.2913422}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/Zheng21, author = {Shuli Zheng}, title = {Research on the Effect of Knowledge Network Embedding on the Dynamic Capabilities of Small and Micro Enterprises}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {5522788:1--5522788:13}, year = {2021}, url = {https://doi.org/10.1155/2021/5522788}, doi = {10.1155/2021/5522788}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/Zheng21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/YanZLH21, author = {Song Yan and Shuli Zheng and Baohong Ling and Donghui Hu}, title = {Lossless Database Watermarking Based on Order-preserving Encryption}, booktitle = {{ACM} {TURC} 2021: {ACM} Turing Award Celebration Conference - Hefei, China, 30 July 2021 - 1 August 2021}, pages = {216--223}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3472634.3474075}, doi = {10.1145/3472634.3474075}, timestamp = {Mon, 11 Oct 2021 17:13:06 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/YanZLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ChenLZLC21, author = {Yifei Chen and Meng Li and Shuli Zheng and Chhagan Lal and Mauro Conti}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {43--61}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_3}, doi = {10.1007/978-3-030-91859-0\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ChenLZLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ChenZHZHC20, author = {Hangyu Chen and Jingcheng Zhao and Tao Hong and Shuli Zheng and Haohui Hong and Mohamed Cheriet}, title = {A measurement method of fifth-generation multiple-input multiple-output antenna based on microwave imaging}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {6}, pages = {155014772093714}, year = {2020}, url = {https://doi.org/10.1177/1550147720937148}, doi = {10.1177/1550147720937148}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ChenZHZHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/ChenZ0TZC20, author = {Hangyu Chen and Jingcheng Zhao and Tao Hong and Tao Tang and Shuli Zheng and Xu Chao}, title = {Microwave One-dimensional Imaging Measurement in 5G {MIMO}}, booktitle = {{IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2020, Paris, France, October 27-29, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BMSB49480.2020.9379728}, doi = {10.1109/BMSB49480.2020.9379728}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmsb/ChenZ0TZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/Zheng0MH20, author = {Shuli Zheng and Tao Hong and Fanjie Meng and Haohui Hong}, title = {The Design of Antenna for Tunnel Broadcasting Based on {SIW} Technology}, booktitle = {{IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2020, Paris, France, October 27-29, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BMSB49480.2020.9379919}, doi = {10.1109/BMSB49480.2020.9379919}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmsb/Zheng0MH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ShiHLZZ20, author = {Pengfei Shi and Donghui Hu and Yuchen Li and Shuli Zheng and Zhongqiu Zhao}, editor = {De{-}Shuang Huang and Vitoantonio Bevilacqua and Abir Hussain}, title = {A Novel Approach of Steganalysis to Deal with Steganographic Algorithm Mismatch}, booktitle = {Intelligent Computing Theories and Application - 16th International Conference, {ICIC} 2020, Bari, Italy, October 2-5, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12463}, pages = {413--422}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60799-9\_36}, doi = {10.1007/978-3-030-60799-9\_36}, timestamp = {Fri, 16 Oct 2020 14:32:08 +0200}, biburl = {https://dblp.org/rec/conf/icic/ShiHLZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenLZHLC20, author = {Yifei Chen and Meng Li and Shuli Zheng and Donghui Hu and Chhagan Lal and Mauro Conti}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {350--365}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_20}, doi = {10.1007/978-3-030-61078-4\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenLZHLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhengPH0F20, author = {Shuli Zheng and Lixuan Pan and Donghui Hu and Meng Li and Yuqi Fan}, title = {A Blockchain-Based Trading Platform for Big Data}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {991--996}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162759}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9162759}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhengPH0F20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuZSZZF19, author = {Donghui Hu and Shengnan Zhou and Qiang Shen and Shuli Zheng and Zhongqiu Zhao and Yuqi Fan}, title = {Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning}, journal = {{IEEE} Access}, volume = {7}, pages = {25924--25935}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2900076}, doi = {10.1109/ACCESS.2019.2900076}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuZSZZF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cogsr/HuHJZZ19, author = {Donghui Hu and Xiaoxia Hu and Wenjie Jiang and Shuli Zheng and Zhong{-}Qiu Zhao}, title = {Intelligent digital image firewall system for filtering privacy or sensitive images}, journal = {Cogn. Syst. Res.}, volume = {53}, pages = {85--97}, year = {2019}, url = {https://doi.org/10.1016/j.cogsys.2018.03.003}, doi = {10.1016/J.COGSYS.2018.03.003}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cogsr/HuHJZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuMFZYW19, author = {Donghui Hu and Zhongjin Ma and Yuqi Fan and Shuli Zheng and Dengpan Ye and Lina Wang}, title = {Study on the interaction between the cover source mismatch and texture complexity in steganalysis}, journal = {Multim. Tools Appl.}, volume = {78}, number = {6}, pages = {7643--7666}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6497-0}, doi = {10.1007/S11042-018-6497-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuMFZYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/HuZZ19, author = {Donghui Hu and Dan Zhao and Shuli Zheng}, title = {A New Robust Approach for Reversible Database Watermarking with Distortion Control}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {31}, number = {6}, pages = {1024--1037}, year = {2019}, url = {https://doi.org/10.1109/TKDE.2018.2851517}, doi = {10.1109/TKDE.2018.2851517}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/HuZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/GeHXLZ19, author = {Hui Ge and Donghui Hu and Haiyan Xu and Meng Li and Shuli Zheng}, editor = {Hongxia Wang and Xianfeng Zhao and Yunqing Shi and Hyoung Joong Kim and Alessandro Piva}, title = {New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization}, booktitle = {Digital Forensics and Watermarking - 18th International Workshop, {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12022}, pages = {337--351}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43575-2\_28}, doi = {10.1007/978-3-030-43575-2\_28}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/GeHXLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuWJZL18, author = {Donghui Hu and Liang Wang and Wenjie Jiang and Shuli Zheng and Bin Li}, title = {A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {38303--38314}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2852771}, doi = {10.1109/ACCESS.2018.2852771}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuWJZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuHZLCSW18, author = {Xiaoxia Hu and Donghui Hu and Shuli Zheng and Wangwang Li and Fan Chen and Zhaopin Shu and Lina Wang}, title = {How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18163--18185}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4402-x}, doi = {10.1007/S11042-017-4402-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuHZLCSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/HuXMZL18, author = {Donghui Hu and Haiyan Xu and Zhongjin Ma and Shuli Zheng and Bin Li}, title = {A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization}, journal = {{IEEE} Signal Process. Lett.}, volume = {25}, number = {9}, pages = {1364--1368}, year = {2018}, url = {https://doi.org/10.1109/LSP.2018.2856630}, doi = {10.1109/LSP.2018.2856630}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/HuXMZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ZhengWLH17, author = {Shuli Zheng and Liang Wang and Baohong Ling and Donghui Hu}, editor = {De{-}Shuang Huang and Abir Hussain and Kyungsook Han and M. Michael Gromiha}, title = {Coverless Information Hiding Based on Robust Image Hashing}, booktitle = {Intelligent Computing Methodologies - 13th International Conference, {ICIC} 2017, Liverpool, UK, August 7-10, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10363}, pages = {536--547}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63315-2\_47}, doi = {10.1007/978-3-319-63315-2\_47}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icic/ZhengWLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhengLHYWW16, author = {Shuli Zheng and Dandan Li and Donghui Hu and Dengpan Ye and Lina Wang and Jinwei Wang}, title = {Lossless data hiding algorithm for encrypted images with high capacity}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13765--13778}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2920-y}, doi = {10.1007/S11042-015-2920-Y}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhengLHYWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/HuSZZWW15, author = {Donghui Hu and Bin Su and Shuli Zheng and Zhong{-}Qiu Zhao and Xintao Wu and Xindong Wu}, title = {Security and privacy protocols for perceptual image hashing}, journal = {Int. J. Sens. Networks}, volume = {17}, number = {3}, pages = {146--162}, year = {2015}, url = {https://doi.org/10.1504/IJSNET.2015.068178}, doi = {10.1504/IJSNET.2015.068178}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/HuSZZWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZHZ13, author = {Jiajia Zhang and Shuli Zheng and Donghui Hu and Yunling Zhang}, title = {Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions}, booktitle = {Ninth International Conference on Computational Intelligence and Security, {CIS} 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013}, pages = {545--549}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CIS.2013.121}, doi = {10.1109/CIS.2013.121}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangZHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuSZZ13, author = {Donghui Hu and Bin Su and Shuli Zheng and Zhuang Zhang}, title = {Secure Architecture and Protocols for Robust Perceptual Hashing}, booktitle = {Ninth International Conference on Computational Intelligence and Security, {CIS} 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013}, pages = {550--554}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CIS.2013.122}, doi = {10.1109/CIS.2013.122}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.