Zhili Chen

Orcid: 0000-0002-8272-156X

According to our database1, Zhili Chen authored at least 143 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ALI-DPFL: Differentially Private Federated Learning with Adaptive Local Iterations.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
STDPNet: a dual-path surface defect detection neural network based on shearlet transform.
Vis. Comput., August, 2024

DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels.
ACM Trans. Sens. Networks, March, 2024

DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release.
Proc. VLDB Endow., February, 2024

Privacy-preserving logistic regression with improved efficiency.
J. Inf. Secur. Appl., 2024

Single-cell Curriculum Learning-based Deep Graph Embedding Clustering.
CoRR, 2024

Differentially Private Federated Learning: A Systematic Review.
CoRR, 2024

FOBNN: Fast Oblivious Binarized Neural Network Inference.
CoRR, 2024

FedFDP: Federated Learning with Fairness and Differential Privacy.
CoRR, 2024

Multi-Party Private Set Intersection: A Circuit-Based Protocol with Jaccard Similarity for Secure and Efficient Anomaly Detection in Network Traffic.
CoRR, 2024

On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

On the Complexity of Isomorphism Problems for Tensors, Groups, and Polynomials III: Actions by Classical Groups.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Cross-Cluster Shifting for Efficient and Effective 3D Object Detection in Autonomous Driving.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

DP-DCAN: Differentially Private Deep Contrastive Autoencoder Network for Single-Cell Clustering.
Proceedings of the Advanced Intelligent Computing in Bioinformatics, 2024

Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection.
Proceedings of the Computer Security - ESORICS 2024, 2024

PPAD: Iterative Interactions of Prediction and Planning for End-to-End Autonomous Driving.
Proceedings of the Computer Vision - ECCV 2024, 2024

Learning High-Resolution Vector Representation from Multi-camera Images for 3D Object Detection.
Proceedings of the Computer Vision - ECCV 2024, 2024

Breast Mass Classification in Mammograms Based on the Fusion of Traditional and Deep Features.
Proceedings of the Web Information Systems and Applications, 2024

2023
An Improved YOLOv5-Based Lightweight Submarine Target Detection Algorithm.
Sensors, December, 2023

Differentially Private Combinatorial Cloud Auction.
IEEE Trans. Cloud Comput., 2023

DeepEMplanner: An End-to-End EM Motion Planner with Iterative Interactions.
CoRR, 2023

Truncated Laplace and Gaussian mechanisms of RDP.
CoRR, 2023

Secure and Scalable Circuit-based Protocol for Multi-Party Private Set Intersection.
CoRR, 2023

Adaptive Local Steps Federated Learning with Differential Privacy Driven by Convergence Analysis.
CoRR, 2023

2022
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments.
IEEE Trans. Emerg. Top. Comput., 2022

Anatomy-Aware 3D Human Pose Estimation With Bone-Based Pose Decomposition.
IEEE Trans. Circuits Syst. Video Technol., 2022

On digital signatures based on isomorphism problems: QROM security and ring signatures.
IACR Cryptol. ePrint Arch., 2022

SA-DPSGD: Differentially Private Stochastic Gradient Descent based on Simulated Annealing.
CoRR, 2022

LDP-FPMiner: FP-Tree Based Frequent Itemset Mining with Local Differential Privacy.
CoRR, 2022

Efficient reversible data hiding via two layers of double-peak embedding.
CoRR, 2022

Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise.
Proceedings of the IEEE International Conference on Trust, 2022

Persistent Items Tracking in Large Data Streams Based on Adaptive Sampling.
Proceedings of the IEEE INFOCOM 2022, 2022

AbitBridge: A cross-chain protocol based on main-sub-chain architecture.
Proceedings of the 5th IEEE International Conference on Information Systems and Computer Aided Education, 2022

Point Cloud Compression with Sibling Context and Surface Priors.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2021

A reversible data hiding scheme for encrypted images with pixel difference encoding.
Knowl. Based Syst., 2021

Utility-efficient differentially private K-means clustering based on cluster merging.
Neurocomputing, 2021

Differentially private user-based collaborative filtering recommendation based on k-means clustering.
Expert Syst. Appl., 2021

Regionalized location obfuscation mechanism with personalized privacy levels.
CoRR, 2021

On the differential privacy of dynamic location obfuscation with personalized error bounds.
CoRR, 2021

Fair auctioning and trading framework for cloud virtual machines based on blockchain.
Comput. Commun., 2021

Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing.
Ad Hoc Networks, 2021

Pixel-level segmentation method of concrete cracks based on MU-Net.
Proceedings of the ACAI 2021: 4th International Conference on Algorithms, Computing and Artificial Intelligence, Sanya, China, December 22, 2021

Detection of Microcalcifications in Mammograms Based on Hyper Faster R-CNN.
Proceedings of the ACAI 2021: 4th International Conference on Algorithms, Computing and Artificial Intelligence, Sanya, China, December 22, 2021

2020
Interactive liquid splash modeling by user sketches.
ACM Trans. Graph., 2020

Quadruple Cross-Coupled Dual-Interlocked-Storage-Cells-Based Multiple-Node-Upset-Tolerant Latch Designs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020

Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment.
IEEE Trans. Computers, 2020

Design of a Triple-Node-Upset Self-Recoverable Latch for Aerospace Applications in Harsh Radiation Environments.
IEEE Trans. Aerosp. Electron. Syst., 2020

Design of Double-Upset Recoverable and Transient-Pulse Filterable Latches for Low-Power and Low-Orbit Aerospace Applications.
IEEE Trans. Aerosp. Electron. Syst., 2020

DCDChain: A Credible Architecture of Digital Copyright Detection Based on Blockchain.
CoRR, 2020

A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning.
CoRR, 2020

HoliCity: A City-Scale Data Platform for Learning Holistic 3D Structures.
CoRR, 2020

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries.
CoRR, 2020

Anatomy-aware 3D Human Pose Estimation in Videos.
CoRR, 2020

Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain.
CoRR, 2020

Two-stage index-based central keyword-ranked searches over encrypted cloud data.
Sci. China Inf. Sci., 2020

TCNN: Two-Way Convolutional Neural Network for Image Steganalysis.
Proceedings of the Security and Privacy in Communication Networks, 2020

Lightweight Proofs of Storage with Public Verifiability from Lattices.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Intuitive, Interactive Beard and Hair Synthesis With Generative Models.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
PATH: privacy-preserving auction for heterogeneous spectrum allocations.
Wirel. Networks, 2019

Motion parallax for 360° RGBD video.
IEEE Trans. Vis. Comput. Graph., 2019

Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization.
IEEE Trans. Inf. Forensics Secur., 2019

Probabilistic matrix factorization with personalized differential privacy.
Knowl. Based Syst., 2019

A Water-saving Irrigation Decision-making Model for Greenhouse Tomatoes based on Genetic Optimization T-S Fuzzy Neural Network.
KSII Trans. Internet Inf. Syst., 2019

Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks.
CoRR, 2019

Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose.
CoRR, 2019

Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics.
CoRR, 2019

Multiscale connected chain topological modelling for microcalcification classification.
Comput. Biol. Medicine, 2019

A Lattice-Based Incremental Signature Scheme.
IEEE Access, 2019

A Novel Triple-Node-Upset-Tolerant CMOS Latch Design using Single-Node-Upset-Resilient Cells.
Proceedings of the IEEE International Test Conference in Asia, 2019

Learning to Reconstruct 3D Manhattan Wireframes From a Single Image.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Speckle Reduction in Optical Coherence Tomography via Super-Resolution Reconstruction.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Automated Iris Segmentation from Anterior Segment OCT Images with Occludable Angles via Local Phase Tensor.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Solar Cell Defect Recognition based on Orthogonal Learning Strategy.
Proceedings of the DMIP 2019: 2nd International Conference on Digital Medicine and Image Processing, 2019

Novel Radiation Hardened Latch Design with Cost-Effectiveness for Safety-Critical Terrestrial Applications.
Proceedings of the 28th IEEE Asian Test Symposium, 2019

2018
Discriminative feature selection for on-line signature verification.
Pattern Recognit., 2018

Minimum-latency data aggregation scheduling based on multi-path routing structures under physical interference model.
Int. J. Distributed Sens. Networks, 2018

NeuralDrop: DNN-based Simulation of Small-Scale Liquid Flows on Solids.
CoRR, 2018

Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter.
CoRR, 2018

Learning to Sketch with Deep Q Networks and Demonstrated Strokes.
CoRR, 2018

Immersive Trip Reports.
Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology, 2018

Brush stroke synthesis with a generative adversarial network driven by physically based simulation.
Proceedings of the 7th Joint Symposium on Computational Aesthetics, 2018

Uniqueness-Driven Saliency Analysis for Automated Lesion Detection with Applications to Retinal Diseases.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Traditional and Deep Learning Based Methods for Mammographic Image Analysis.
Proceedings of the 14th International Conference on Natural Computation, 2018

PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Differentially Private Location Protection with Continuous Time Stamps for VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Learning to Doodle with Stroke Demonstrations and Deep Q-Networks.
Proceedings of the British Machine Vision Conference 2018, 2018

Aging-Temperature-and-Propagation Induced Pulse-Broadening Aware Soft Error Rate Estimation for nano-Scale CMOS.
Proceedings of the 27th IEEE Asian Test Symposium, 2018

2017
Signature alignment based on GMM for on-line signature verification.
Pattern Recognit., 2017

Modeling, Evaluation and Optimization of Interlocking Shell Pieces.
Comput. Graph. Forum, 2017

6-DOF VR videos with a single 360-camera.
Proceedings of the 2017 IEEE Virtual Reality, 2017

Secure, efficient and practical double spectrum auction.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Field Information Recommendation Based on Context-Aware and Collaborative Filtering Algorithm.
Proceedings of the Computer and Computing Technologies in Agriculture XI, 2017

Towards Secure and Verifiable Database-Driven Spectrum Sharing.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Multiple rules with game theoretic analysis for flexible flow shop scheduling problem with component altering times.
Int. J. Model. Identif. Control., 2016

On Privacy-Preserving Cloud Auction.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Towards secure spectrum auction: both bids and bidder locations matter: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

2015
Level-set-based partitioning and packing optimization of a printable model.
ACM Trans. Graph., 2015

Wetbrush: GPU-based 3D painting simulation at the bristle level.
ACM Trans. Graph., 2015

Topological Modeling and Classification of Mammographic Microcalcification Clusters.
IEEE Trans. Biomed. Eng., 2015

ITSEC: An information-theoretically secure framework for truthful spectrum auctions.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Physics-inspired adaptive fracture refinement.
ACM Trans. Graph., 2014

SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications.
Pers. Ubiquitous Comput., 2014

Modelling mammographic microcalcification clusters using persistent mereotopology.
Pattern Recognit. Lett., 2014

Two Simple Attacks on a Blind Signature Scheme.
Int. J. Netw. Secur., 2014

Analysis of Mammographic Microcalcification Clusters Using Topological Features.
Proceedings of the Breast Imaging - 12th International Workshop, IWDM 2014, Gifu City, Japan, June 29, 2014

PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions.
IEEE Trans. Wirel. Commun., 2013

Modeling friction and air effects between cloth and deformable bodies.
ACM Trans. Graph., 2013

Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets
CoRR, 2013

A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2013

Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Steganalysis of Compressed Speech Based on Markov and Entropy.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Automated Mammographic Risk Classification Based on Breast Density Estimation.
Proceedings of the Pattern Recognition and Image Analysis - 6th Iberian Conference, 2013

A Multiscale Blob Representation of Mammographic Parenchymal Patterns and Mammographic Risk Assessment.
Proceedings of the Computer Analysis of Images and Patterns, 2013

2012
Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks.
J. Networks, 2012

Design of Three-axis ED Milling Machine Based on the PMAC Motion Card.
J. Comput., 2012

A Redundant FPGA Based Controller for Subsea Blowout Preventer Stack.
J. Comput., 2012

More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis
CoRR, 2012

True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions
CoRR, 2012

A new scheme for covert communication via 3G encoded speech.
Comput. Electr. Eng., 2012

Classification of Microcalcification Clusters Based on Morphological Topology Analysis.
Proceedings of the Breast Imaging, 2012

Topographic representation based breast density segmentation for mammographic risk assessment.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

A combined method for automatic identification of the breast boundary in mammograms.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Detection of substitution-based linguistic steganography by relative frequency analysis.
Digit. Investig., 2011

Steganalysis against substitution-based linguistic steganography based on context clusters.
Comput. Electr. Eng., 2011

Modelling Breast Tissue in Mammograms for Mammographic Risk Assessment.
Proceedings of the Medical Image Understanding and Analysis, 2011

LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011

Performance Analysis of Location Based Service Using TPEG&MBMS in 3G Mobile Networks.
Proceedings of the Information Computing and Applications, 2011

Local feature based mammographic tissue pattern modelling and breast density classification.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
Blind Linguistic Steganalysis against Translation Based Steganography.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

2009
Steganalysis on Character Substitution Using Support Vector Machine.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Hiding Information by Context-Based Synonym Substitution.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
Detection of word shift steganography in PDF document.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Statistical Attack on a Kind of Word-Shift Text-Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Detection of Synonym-Substitution Modified Articles Using Context Information.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Proceedings of the The Third International Conference on Availability, 2008

2007
Quantum Oblivious Transfer Using Tripartite Entangled States.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Cramer-Rao Lower Bound for Harmonic and Subharmonic Estimation.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006


  Loading...