Xiaoyi Zhou

Orcid: 0000-0002-8926-9078

According to our database1, Xiaoyi Zhou authored at least 58 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A metaheuristic image cryptosystem using improved parallel model and many-objective optimization.
IET Image Process., September, 2024

General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

SecNLP: An NLP classification model watermarking framework based on multi-task learning.
Comput. Speech Lang., 2024

Towards the Transferable Reversible Adversarial Example via Distribution-Relevant Attack.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

TRAE: Reversible Adversarial Example with Traceability.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

2023
Robust Reversible Watermarking by Fractional Order Zernike Moments and Pseudo-Zernike Moments.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Reversible robust fragile multi-watermarking scheme for color images.
Multim. Tools Appl., October, 2023

Intelligent Task Offloading and Resource Allocation in Digital Twin Based Aerial Computing Networks.
IEEE J. Sel. Areas Commun., October, 2023

Multiple Subformulae Cooperative Control for Multiagent Systems Under Conflicting Signal Temporal Logic Tasks.
IEEE Trans. Ind. Electron., September, 2023

Unsupervised anomaly analysis-based manufacturing quality test and grading method for combine harvesters.
Comput. Electron. Agric., July, 2023

Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2.
Symmetry, April, 2023

Corrigendum to A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding <i>Signal Processing</i>, <i>205</i>, 108890].
Signal Process., 2023

A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding.
Signal Process., 2023

RAEDiff: Denoising Diffusion Probabilistic Models Based Reversible Adversarial Examples Self-Generation and Self-Recovery.
CoRR, 2023

A Sensor-Based Modified FMD Method to Identify Fault Feature for Mechanical Fault Diagnosis of Ship-Borne Antennae.
IEEE Access, 2023

Balancing Robustness and Covertness in NLP Model Watermarking: A Multi-Task Learning Approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Intelligent UAV Charging Station Deployment and Path Planning in Smart City.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

Trusted Task Offloading in Vehicular Edge Computing Networks: A Reinforcement Learning Based Solution.
Proceedings of the IEEE Global Communications Conference, 2023

Hiding patient information in medical images:A high-capacity and reversible hiding algorithm for E-healthcare.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

A Visually Meaningful Image Encryption Algorithm with Attention Mechanism and Artificial Bee Colony Optimization.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Vehicular intelligence in 6G: Networking, communications, and computing.
Veh. Commun., 2022

A self-embedding secure fragile watermarking scheme with high quality recovery.
J. Vis. Commun. Image Represent., 2022

Exploiting LSB Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud.
J. Inf. Secur. Appl., 2022

Computation Bits Maximization in UAV-Assisted MEC Networks With Fairness Constraint.
IEEE Internet Things J., 2022

Achieve Load Balancing in Multi-UAV Edge Computing IoT Networks: A Dynamic Entry and Exit Mechanism.
IEEE Internet Things J., 2022

Image Security Based on Three-Dimensional Chaotic System and Random Dynamic Selection.
Entropy, 2022

DeepHider: A Multi-module and Invisibility Watermarking Scheme for Language Model.
CoRR, 2022

PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN Model.
CoRR, 2022

DA-Bi-SRU for water quality prediction in smart mariculture.
Comput. Electron. Agric., 2022

Reversible watermarking based on extreme prediction using modified differential evolution.
Appl. Intell., 2022

A Few Samples Underwater Fish Tracking Method Based on Semi-supervised and Attention Mechanism.
Proceedings of the 6th International Conference on Robotics, Control and Automation, 2022

A real time video object tracking method for fish.
Proceedings of the ICMLSC 2022: The 6th International Conference on Machine Learning and Soft Computing, Haikou, China, January 15, 2022

2021
An implicit difference scheme for the time-fractional Cahn-Hilliard equations.
Math. Comput. Simul., 2021

Computation Rate Maximum for Mobile Terminals in UAV-assisted Wireless Powered MEC Networks with Fairness Constraint.
CoRR, 2021

Science Games and Verbal Interaction in Preschool Science Classroom.
Proceedings of the CIPAE 2021: 2nd International Conference on Computers, 2021

2020
A Novel Comprehensive Watermarking Scheme for Color Images.
Secur. Commun. Networks, 2020

Accident Prediction Accuracy Assessment for Highway-Rail Grade Crossings Using Random Forest Algorithm Compared with Decision Tree.
Reliab. Eng. Syst. Saf., 2020

Designing and Analysis of A Wi-Fi Data Offloading Strategy Catering for the Preference of Mobile Users.
CoRR, 2020

Occlusion Based Discriminative Feature Mining for Vehicle Re-identification.
Proceedings of the Data Science, 2020

A Problem-Driven Discussion Teaching Method Based on Progressive Cycle.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

2019
A deep Convolutional Neural Network for topology optimization with strong generalization ability.
CoRR, 2019

The Effect of Mobility on Delayed Data Offloading.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations.
Int. J. Softw. Innov., 2018

A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

An analysis of the health care platform in the cloud environment.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Multi-query Optimization via Common Sub Query Elimination for SPARQL.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Electrocardiogram System Performance Evaluation Based on the LabVIEW Virtual Instruments Development Platform.
Proceedings of the Communications, Signal Processing, and Systems, 2017

2016
Differential Privacy of Big Data: An Overview.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2014
A Dynamic Multiple Digital Watermarking Model based on Temporal Series.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2012
Information security based on temporal order and ergodic matrix.
PhD thesis, 2012

2011
Temporal Ordered Image Encryption.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

2010
Efficient and Effective State-based Framework for News Video Retrival.
Int. J. Adv. Comp. Techn., 2010

BMQE System - A MQ Equations System based on Ergodic Matrix.
Proceedings of the SECRYPT 2010, 2010

Cryptanalysis of the Bisectional MQ Equations System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...