


default search action
Zhili Zhou 0001
Person information
- affiliation: Guangzhou University, Institute of Artificial Intelligence, Guangdong Key Laboratory of Blockchain Security, China
- affiliation: Nanjing University of Information Science and Technology, School of Computer and Software, China
- affiliation: University of Windsor, Department of Electrical and Computer Engineering, Canada
- affiliation (2014): Hunan University, School of Information Science and Engineering, China
Other persons with the same name
- Zhili Zhou (aka: Zhi-li Zhou) — disambiguation page
- Zhili Zhou 0002
— Wuzhou University, College of Electrical and Electronic Engineering, Intelligent Lock Research Institute, China (and 1 more)
- Zhili Zhou 0003 — Grubhub Inc., Chicago, IL, USA (and 2 more)
- Zhili Zhou 0004
— Xi'an Jiaotong University, School of Management, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j72]Weixuan Tang
, Jiahao Li
, Yuan Rao
, Zhili Zhou
, Fei Peng
:
A trigger-perceivable backdoor attack framework driven by image steganography. Pattern Recognit. 161: 111262 (2025) - [j71]Chengsheng Yuan
, Yifei Chen
, Zhili Zhou
, Zhihua Xia
, Yongfeng Huang
:
Compressed Domain Invariant Adversarial Representation Learning for Robust Audio Deepfake Detection. IEEE Signal Process. Lett. 32: 1111-1115 (2025) - [j70]Zihang Zhang
, Yuling Liu
, Zhili Zhou
, Gaobo Yang
, Xin Liao
, Q. M. Jonathan Wu
:
DGeC: Dynamically and Globally Enhanced Convolution. IEEE Trans. Artif. Intell. 6(4): 921-933 (2025) - [j69]Zhili Zhou
, Ching-Nung Yang
, Shaowei Wang
, Guoshun Nan
, Stelvio Cimato
, Yifeng Zheng
, Qian Wang
:
Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 22(5): 4565-4579 (2025) - [j68]Pengcheng Zhou
, Zhengyang Fang
, Zhongliang Yang
, Zhili Zhou
, Linna Zhou:
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios. IEEE Trans. Inf. Forensics Secur. 20: 5966-5977 (2025) - [j67]Shaowei Wang, Jin Li, Changyu Dong, Jin Li, Zhili Zhou, Di Wang, Zikai Wen:
Side-Channel Attacks and New Principles in the Shuffle Model of Differential Privacy. IEEE Trans. Inf. Forensics Secur. 20: 6515-6528 (2025) - [j66]Xiaoxiao Li
, Yong Xie
, Cong Peng
, Entao Luo, Xiong Li
, Zhili Zhou
:
EPREAR:An Efficient Attribute-Based Proxy Re-Encryption Scheme With Fast Revocation for Data Sharing in AIoT. IEEE Trans. Mob. Comput. 24(10): 11005-11018 (2025) - [c20]Zhuang Wang, Linna Zhou, Xuekai Chen, Zhili Zhou, Zhongliang Yang:
STLC-KG: A Social Text Steganalysis Method Combining Large-Scale Language Models and Common-Sense Knowledge Graphs. AAAI 2025: 25461-25469 - [c19]Zhengyang Fang, Pengcheng Zhou
, Zhongliang Yang, Zhili Zhou, Linna Zhou:
DAEF-VS: An Efficient Universal VoIP Steganalysis Framework Based on Domain-Aware Knowledge. ICASSP 2025: 1-5 - [c18]Yuzhe Guo, Zhongliang Yang, Zhuang Wang, Zhili Zhou, Linna Zhou:
SECC-Stega: Generative Linguistic Steganographic Framework Based on Error Correcting Codes. ICASSP 2025: 1-5 - [c17]Yilin Long, Zhongliang Yang, Zhuang Wang, Zhili Zhou, Yongfeng Huang, Linna Zhou:
SCF-Stega: Controllable Linguistic Steganography Based on Semantic Communications Framework. ICASSP 2025: 1-5 - [c16]Junkai Lu, Zhongliang Yang, Kaibo Huang, Zhuang Wang, Zhili Zhou, Linna Zhou:
TGCA: A Transformer GNN-based Approach with Cross-Attention Mechanism for Steganographic Text Detection in Social Networks. ICASSP 2025: 1-5 - [c15]Zhili Zhou, Chunhui Zeng, Linna Zhou, Zhongliang Yang, Yujiang Li, Fei Peng, Yong Xie:
Dual-Population Watermark Vaccine: Efficient and Imperceptible Adversarial Attack for Watermarked Image Protection. ICASSP 2025: 1-5 - [i6]Tao Qi, Jinhua Yin, Dongqi Cai, Yueqi Xie, Huili Wang, Hu Zhiyang, Peiru Yang, Guoshun Nan, Zhili Zhou, Shangguang Wang, Lingjuan Lyu, Yongfeng Huang, Nicholas Donald Lane:
Evidencing Unauthorized Training Data from AI Generated Content using Information Isotopes. CoRR abs/2503.20800 (2025) - 2024
- [j65]Zihang Zhang
, Yuling Liu, Zhili Zhou
, Gaobo Yang
, Q. M. Jonathan Wu:
Efficient object detector via dynamic prior and dynamic feature fusion. Comput. J. 67(12): 3196-3206 (2024) - [j64]Chengsheng Yuan
, Zhenyu Xu, Xinting Li
, Zhili Zhou
, Junhao Huang, Ping Guo:
An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection. IET Biom. 2024(1) (2024) - [j63]Jingwang Huang, Qi Cui
, Zhili Zhou
, Keping Yu
, Ching-Nung Yang
, Kim-Kwang Raymond Choo
:
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment. IEEE Internet Things J. 11(2): 2382-2393 (2024) - [j62]Zhili Zhou, Akshat Gaurav, B. B. Gupta
, Hédi Hamdi, Nadia Nedjah:
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic. Neural Comput. Appl. 36(1): 1-14 (2024) - [j61]Zhili Zhou
, Zhipeng Bao, Weiwei Jiang
, Yuan Huang, Yun Peng, Achyut Shankar
, Carsten Maple
, Shitharth Selvarajan
:
Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications. IEEE Trans. Consumer Electron. 70(1): 4357-4366 (2024) - [j60]Chengsheng Yuan
, Baojie Cui, Zhili Zhou
, Yuming Liu
, Yimin Yang
, Q. M. Jonathan Wu
:
RTRGAN: Ridge Texture Rendering-Based Generative Adversarial Fingerprint Attack for Portable Consumer Electronics Devices. IEEE Trans. Consumer Electron. 70(3): 5471-5482 (2024) - [j59]Yi Cao
, Zhili Zhou
, Chinmay Chakraborty
, Meimin Wang
, Q. M. Jonathan Wu
, Xingming Sun, Keping Yu
:
Generative Steganography Based on Long Readable Text Generation. IEEE Trans. Comput. Soc. Syst. 11(4): 4584-4594 (2024) - [j58]Qi Cui
, Weixuan Tang
, Zhili Zhou
, Ruohan Meng
, Guoshun Nan
, Yun-Qing Shi:
Meta Security Metric Learning for Secure Deep Image Hiding. IEEE Trans. Dependable Secur. Comput. 21(5): 4907-4920 (2024) - [j57]Zhili Zhou
, Meimin Wang, Zewen Ni
, Zhihua Xia
, Brij Bhooshan Gupta
:
Reliable and Sustainable Product Evaluation Management System Based on Blockchain. IEEE Trans. Engineering Management 71: 12259-12271 (2024) - [j56]Weixuan Tang
, Zhili Zhou
, Bin Li
, Kim-Kwang Raymond Choo
, Jiwu Huang
:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. IEEE Trans. Inf. Forensics Secur. 19: 2826-2839 (2024) - [j55]Shaowei Wang
, Yuntong Li
, Yusen Zhong
, Kongyang Chen
, Xianmin Wang
, Zhili Zhou
, Fei Peng
, Yuqiu Qian
, Jiachun Du
, Wei Yang
:
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation. IEEE Trans. Mob. Comput. 23(8): 8050-8065 (2024) - [j54]Qi Cui
, Zhili Zhou
, Ruohan Meng
, Shaowei Wang
, Hongyang Yan
, Q. M. Jonathan Wu
:
ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning. IEEE Trans. Multim. 26: 6542-6553 (2024) - [j53]Zhili Zhou
, Yao Wan
, Qi Cui
, Keping Yu
, Shahid Mumtaz
, Ching-Nung Yang
, Mohsen Guizani
:
Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks. IEEE Trans. Wirel. Commun. 23(1): 423-435 (2024) - [c14]Junhao Huang, Xiangjun Xiao, Haojun Zhou, Affan Yasin, Zhili Zhou
:
Lightweight Attention-CycleGAN for Nighttime-Daytime Image Transformation. AIS&P 2024: 156-166 - [c13]Weisong Liu, Jianfeng Yang, Jiewen Huang, Ahmed A. Abd El-Latif, Zhili Zhou
:
Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model. AIS&P 2024: 167-179 - [c12]Weixuan Tang
, Haoyu Yang
, Yuan Rao
, Zhili Zhou
, Fei Peng
:
Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography. ACM Multimedia 2024: 10440-10448 - [c11]Chengsheng Yuan
, Wenqian Qiu, Zhili Zhou, Xinting Li, Xianyi Chen:
FIL-FLD: Few-Shot Incremental Learning with EMD Metric for High Generalization Fingerprint Liveness Detection. PRCV (15) 2024: 363-376 - [i5]Pengcheng Zhou, Zhengyang Fang, Zhongliang Yang, Zhili Zhou, Linna Zhou:
Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios. CoRR abs/2411.13612 (2024) - 2023
- [j52]Zhili Zhou
, Jianyu Zhu, Yuecheng Su, Meimin Wang
, Xingming Sun:
Geometric correction code-based robust image watermarking. IET Image Process. 17(13): 3660-3669 (2023) - [j51]Cheonshik Kim, Ching-Nung Yang
, Zhili Zhou
, Ki-Hyun Jung
:
Dual efficient reversible data hiding using Hamming code and OPAP. J. Inf. Secur. Appl. 76: 103544 (2023) - [j50]Chun Ding, Meimin Wang, Zhili Zhou
, Teng Huang, Xiaoliang Wang, Jin Li:
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval. Neural Comput. Appl. 35(11): 8125-8142 (2023) - [j49]Chengsheng Yuan
, Qiang Guo, Zhili Zhou
, Zhangjie Fu
, Zhihua Xia
:
Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement. IEEE Signal Process. Lett. 30: 843-847 (2023) - [j48]Zhili Zhou
, Yuecheng Su, Jin Li
, Keping Yu
, Q. M. Jonathan Wu
, Zhangjie Fu
, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. IEEE Trans. Dependable Secur. Comput. 20(5): 4118-4134 (2023) - [j47]Zhili Zhou
, Xiaohua Dong, Ruohan Meng
, Meimin Wang, Hongyang Yan, Keping Yu
, Kim-Kwang Raymond Choo
:
Generative Steganography via Auto-Generation of Semantic Object Contours. IEEE Trans. Inf. Forensics Secur. 18: 2751-2765 (2023) - [j46]Zhili Zhou
, Chun Ding
, Jin Li
, Eman Mohammadi
, Guangcan Liu, Yimin Yang
, Q. M. Jonathan Wu
:
Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos. IEEE Trans. Image Process. 32: 13-28 (2023) - [j45]Zhili Zhou
, Yujiang Li
, Jin Li
, Keping Yu
, Guang Kou, Meimin Wang, Brij Bhooshan Gupta
:
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2779-2790 (2023) - [c10]Yongwei Lin
, Yucheng Long
, Zhili Zhou
, Yan Pang
, Chunsheng Yang
:
Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions. AIS&P (1) 2023: 172-189 - [i4]Huali Ren, Anli Yan, Xiaojun Ren, Pei-Gen Ye, Chong-zhi Gao, Zhili Zhou, Jin Li:
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification. CoRR abs/2312.15617 (2023) - 2022
- [j44]Zhili Zhou
, Yuecheng Su
, Yulan Zhang, Zhihua Xia
, Shan Du
, Brij B. Gupta
, Lianyong Qi
:
Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment. IEEE Internet Things J. 9(12): 9332-9341 (2022) - [j43]Peipeng Yu
, Jianwei Fei
, Zhihua Xia
, Zhili Zhou
, Jian Weng
:
Improving Generalization by Commonality Learning in Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 17: 547-558 (2022) - [j42]Zhili Zhou
, Akshat Gaurav
, Brij Bhooshan Gupta
, Miltiadis D. Lytras
, Imran Razzak
:
A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System. IEEE Trans. Intell. Transp. Syst. 23(7): 9726-9735 (2022) - [j41]Zhili Zhou
, Meimin Wang
, Jingwang Huang, Shengliang Lin
, Zhihan Lv
:
Blockchain in Big Data Security for Intelligent Transportation With 6G. IEEE Trans. Intell. Transp. Syst. 23(7): 9736-9746 (2022) - [j40]Zhili Zhou
, Brij Bhooshan Gupta
, Akshat Gaurav
, Yujiang Li, Miltiadis D. Lytras
, Nadia Nedjah
:
An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System. IEEE Trans. Intell. Transp. Syst. 23(9): 16161-16169 (2022) - [j39]Zhili Zhou
, Xiaohua Dong, Zhetao Li
, Keping Yu
, Chun Ding, Yimin Yang
:
Spatio-Temporal Feature Encoding for Traffic Accident Detection in VANET Environment. IEEE Trans. Intell. Transp. Syst. 23(10): 19772-19781 (2022) - [j38]Ruohan Meng
, Qi Cui
, Zhili Zhou
, Zhetao Li
, Q. M. Jonathan Wu
, Xingming Sun
:
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks. IEEE Trans. Netw. Sci. Eng. 9(2): 848-862 (2022) - [c9]Mingyu Chen, Chengsheng Yuan, Xinting Li, Zhili Zhou:
Broad Learning with Uniform Local Binary Pattern for Fingerprint Liveness Detection. NCAA (1) 2022: 327-340 - [e1]Zhili Zhou, Kwok Tai Chui, Brij B. Gupta, Milad Taleby Ahvanooey, Justin Zhang:
Proceedings of International Conference on Smart Systems and Advanced Computing, New Delhi, India (Virtual Mode), December 26-27, 2021. CEUR Workshop Proceedings 3080, CEUR-WS.org 2022 [contents] - [i3]Wenyan Pan, Zhili Zhou, Miaogen Ling, Xin Geng, Q. M. Jonathan Wu:
Learning Hierarchical Graph Representation for Image Manipulation Detection. CoRR abs/2201.05730 (2022) - [i2]Zhili Zhou, Yuecheng Su, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. CoRR abs/2203.06598 (2022) - [i1]Wenyan Pan, Zhili Zhou, Guangcan Liu, Teng Huang, Hongyang Yan, Q. M. Jonathan Wu:
Auto-Focus Contrastive Learning for Image Manipulation Detection. CoRR abs/2211.10922 (2022) - 2021
- [j37]Zhili Zhou, Meimin Wang
, Ching-Nung Yang, Zhangjie Fu, Xingming Sun, Q. M. Jonathan Wu
:
Blockchain-based decentralized reputation system in E-commerce environment. Future Gener. Comput. Syst. 124: 155-167 (2021) - [j36]Zhili Zhou
, Wenyan Pan
, Q. M. Jonathan Wu
, Ching-Nung Yang
, Zhihan Lv
:
Geometric rectification-based neural network architecture for image manipulation detection. Int. J. Intell. Syst. 36(12): 6993-7016 (2021) - [j35]Zhili Zhou, Yujiang Li
, Yulan Zhang, Zihao Yin, Lianyong Qi, Rui Ma:
Residual visualization-guided explainable copy-relationship learning for image copy detection in social networks. Knowl. Based Syst. 228: 107287 (2021) - [j34]Wenyan Pan
, Meimin Wang
, Jiaohua Qin
, Zhili Zhou
:
Improved CNN-Based Hashing for Encrypted Image Retrieval. Secur. Commun. Networks 2021: 5556634:1-5556634:8 (2021) - [j33]Zhili Zhou
, Q. M. Jonathan Wu
, Xingming Sun:
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search. IEEE Trans. Big Data 7(3): 559-573 (2021) - [c8]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Zhili Zhou:
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks. SysCom 2021: 8-14 - [c7]Akshat Gaurav, Zhili Zhou, Kwok Tai Chui, Francesco Colace, Priyanka Chaurasia, Ching-Hsien Hsu:
A Novel Approach for DDoS Attack Detection Using Big Data and Machine Learning. SysCom 2021: 126-131 - 2020
- [j32]Yi Cao, Zhili Zhou
, Q. M. Jonathan Wu
, Chengsheng Yuan, Xingming Sun:
Coverless information hiding based on the generation of anime characters. EURASIP J. Image Video Process. 2020(1): 36 (2020) - [j31]Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato
:
Introduction to the special issue on deep learning for real-time information hiding and forensics. J. Real Time Image Process. 17(1): 1-5 (2020) - [j30]Chuanlong Li, Xingming Sun, Zhili Zhou, Yimin Yang
:
Real-time image carrier generation based on generative adversarial network and fast object detection. J. Real Time Image Process. 17(3): 655-665 (2020) - [j29]Zhili Zhou
, Q. M. Jonathan Wu
, Shaohua Wan
, Wendi Sun, Xingming Sun:
Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 593-604 (2020) - [j28]Zhili Zhou, Q. M. Jonathan Wu, Yimin Yang
, Xingming Sun:
Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search. ACM Trans. Multim. Comput. Commun. Appl. 16(2): 54:1-54:25 (2020) - [j27]Guoqi Xie
, Gang Zeng
, Yuekun Chen
, Yang Bai
, Zhili Zhou
, Renfa Li
, Keqin Li
:
Minimizing Redundancy to Satisfy Reliability Requirement for a Parallel Application on Heterogeneous Service-Oriented Systems. IEEE Trans. Serv. Comput. 13(5): 871-886 (2020) - [c6]Fan Wang, Weiyi Zhong, Xiaolong Xu, Wajid Rafique
, Zhili Zhou, Lianyong Qi:
Privacy-aware Cold-Start Recommendation based on Collaborative Filtering and Enhanced Trust. DSAA 2020: 655-662
2010 – 2019
- 2019
- [j26]Ruohan Meng
, Qi Cui
, Zhili Zhou
, Zhangjie Fu, Xingming Sun:
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things. IEEE Access 7: 90574-90584 (2019) - [j25]Qi Cui
, Zhili Zhou
, Zhangjie Fu, Ruohan Meng
, Xingming Sun, Q. M. Jonathan Wu
:
Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things. IEEE Access 7: 90815-90824 (2019) - [j24]Zhili Zhou
, Jingcheng Chen, Ching-Nung Yang, Xingming Sun:
Video Copy Detection Using Spatio-Temporal CNN Features. IEEE Access 7: 100658-100665 (2019) - [j23]Zhili Zhou
, Ching-Nung Yang, Song-Ruei Cai, Daoshun Wang:
Boolean Operation Based Visual Cryptography. IEEE Access 7: 165496-165508 (2019) - [j22]Zhili Zhou
, Yi Cao
, Meimin Wang
, Enming Fan, Q. M. Jonathan Wu
:
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment. IEEE Access 7: 179891-179897 (2019) - [j21]Zhili Zhou
, Ching-Nung Yang
, Yimin Yang
, Xingming Sun
:
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment. Complex. 2019: 2875676:1-2875676:8 (2019) - [j20]Fang Huang, Zhili Zhou, Ching-Nung Yang, Xiya Liu, Tao Wang:
Original image tracing with image relational graph for near-duplicate image elimination. Int. J. Comput. Sci. Eng. 18(3): 294-304 (2019) - [j19]Xuyun Zhang
, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi
, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. Secur. Commun. Networks 2019: 4529757:1-4529757:4 (2019) - [j18]Zhili Zhou
, Yan Mu, Q. M. Jonathan Wu
:
Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 23(13): 4927-4938 (2019) - [c5]Wajid Rafique
, Lianyong Qi, Zhili Zhou, Xuan Zhao, Wenda Tang, Wanchun Dou:
A Location and Intention Oriented Recommendation Method for Accuracy Enhancement over Big Data. MobiCASE 2019: 3-17 - 2018
- [j17]Zhili Zhou
, Ching-Nung Yang, Yi Cao, Xingming Sun:
Secret Image Sharing Based on Encrypted Pixels. IEEE Access 6: 15021-15025 (2018) - [j16]Yunlong Wang, Zhili Zhou:
Spatial descriptor embedding for near-duplicate image retrieval. Int. J. Embed. Syst. 10(3): 241-247 (2018) - [j15]Hao Zhang, Tao Huang, Zhihan Lv
, Sanya Liu, Zhili Zhou:
MCRS: A course recommendation system for MOOCs. Multim. Tools Appl. 77(6): 7051-7069 (2018) - [j14]Zhili Zhou
, Q. M. Jonathan Wu
, Xingming Sun:
Encoding multiple contextual clues for partial-duplicate image retrieval. Pattern Recognit. Lett. 109: 18-26 (2018) - [j13]Jie Zhang, Zhili Zhou, Shu Li, Leilei Gan, Xuyun Zhang
, Lianyong Qi, Xiaolong Xu
, Wanchun Dou:
Hybrid computation offloading for smart home automation in mobile cloud computing. Pers. Ubiquitous Comput. 22(1): 121-134 (2018) - [j12]Lianyong Qi, Shunmei Meng, Xuyun Zhang
, Ruili Wang, Xiaolong Xu
, Zhili Zhou, Wanchun Dou:
An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment. Sensors 18(7): 2037 (2018) - 2017
- [j11]Lianyong Qi, Zhili Zhou, Jiguo Yu, Qi Liu:
Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering. IEICE Trans. Inf. Syst. 100-D(9): 2092-2099 (2017) - [j10]Lianyong Qi, Peiqiang Dai, Jiguo Yu
, Zhili Zhou, Yanwei Xu:
"Time-Location-Frequency"-aware Internet of things service selection based on historical records. Int. J. Distributed Sens. Networks 13(1) (2017) - [j9]Zhili Zhou, Q. M. Jonathan Wu
, Fang Huang, Xingming Sun:
Fast and accurate near-duplicate image elimination for visual sensor networks. Int. J. Distributed Sens. Networks 13(2) (2017) - [j8]Yong Xie, Gang Zeng, Ryo Kurachi, Guoqi Xie, Yong Dou, Zhili Zhou:
An optimized design of CAN FD for automotive cyber-physical systems. J. Syst. Archit. 81: 101-111 (2017) - [j7]Lianyong Qi
, Jiguo Yu, Zhili Zhou:
An Invocation Cost Optimization Method for Web Services in Cloud Environment. Sci. Program. 2017: 4358536:1-4358536:9 (2017) - [j6]Zhili Zhou
, Yunlong Wang, Q. M. Jonathan Wu
, Ching-Nung Yang, Xingming Sun:
Effective and Efficient Global Context Verification for Image Copy Detection. IEEE Trans. Inf. Forensics Secur. 12(1): 48-63 (2017) - 2016
- [j5]Peng Li, Ching-Nung Yang
, Zhili Zhou:
Essential secret image sharing scheme with the same size of shadows. Digit. Signal Process. 50: 51-60 (2016) - [j4]Zhili Zhou, Ching-Nung Yang
, Beijing Chen, Xingming Sun, Qi Liu, Q. M. Jonathan Wu
:
Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation. IEICE Trans. Inf. Syst. 99-D(6): 1531-1540 (2016) - [j3]Lianyong Qi
, Xiaolong Xu
, Wanchun Dou, Jiguo Yu
, Zhili Zhou, Xuyun Zhang
:
Time-Aware IoE Service Recommendation on Sparse Data. Mob. Inf. Syst. 2016: 4397061:1-4397061:12 (2016) - [c4]Zhili Zhou, Yan Mu, Ningsheng Zhao, Q. M. Jonathan Wu
, Ching-Nung Yang
:
Coverless Information Hiding Method Based on Multi-keywords. ICCCS (1) 2016: 39-47 - 2015
- [c3]Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun:
Coverless Image Steganography Without Embedding. ICCCS 2015: 123-132 - [c2]Xianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun:
Coverless Information Hiding Method Based on the Chinese Mathematical Expression. ICCCS 2015: 133-143 - 2014
- [j2]Zhili Zhou, Xingming Sun, Xianyi Chen, Cheng Chang, Zhangjie Fu:
A novel signature based on the combination of global and local signatures for image copy detection. Secur. Commun. Networks 7(11): 1702-1711 (2014) - [c1]Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi:
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection. IWDW 2014: 60-71 - 2013
- [j1]Xianyi Chen, Xingming Sun, Huiyu Sun, Zhili Zhou, Jianjun Zhang:
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 86(10): 2620-2626 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-22 03:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint