Zhili Zhou

Orcid: 0000-0002-5641-7169

According to our database1, Zhili Zhou authored at least 176 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vehicle routing Problem for cold chain logistics based on data fusion technology to predict travel time.
Oper. Res., December, 2024

Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation.
IEEE Trans. Mob. Comput., August, 2024

Generative Steganography Based on Long Readable Text Generation.
IEEE Trans. Comput. Soc. Syst., August, 2024

Variable Active Antennas-Aided Channel Modulation.
IEEE Wirel. Commun. Lett., March, 2024

Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications.
IEEE Trans. Consumer Electron., February, 2024

Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks.
IEEE Trans. Wirel. Commun., January, 2024

A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic.
Neural Comput. Appl., January, 2024

Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024

The effect of fixed physical usage patterns on the engagement of physical activity apps: a real-world data analysis.
Behav. Inf. Technol., January, 2024

ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning.
IEEE Trans. Multim., 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Reliable and Sustainable Product Evaluation Management System Based on Blockchain.
IEEE Trans. Engineering Management, 2024

Meta Security Metric Learning for Secure Deep Image Hiding.
IEEE Trans. Dependable Secur. Comput., 2024

Joint Multiple Constellations and Variable Active Antennas Selection for Signal Spaces Design in MIMO Systems.
IEEE Trans. Commun., 2024

An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection.
IET Biom., 2024

A proximal policy optimization approach for food delivery problem with reassignment due to order cancellation.
Expert Syst. Appl., 2024

ContextBLIP: Doubly Contextual Alignment for Contrastive Image Retrieval from Linguistically Complex Descriptions.
CoRR, 2024

A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography.
CoRR, 2024

FIL-FLD: Few-Shot Incremental Learning with EMD Metric for High Generalization Fingerprint Liveness Detection.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
Minimum conflict consensus models for group decision-making based on social network analysis considering non-cooperative behaviors.
Inf. Fusion, November, 2023

Irregular Euclidean Distance Constellation Design for Quadrature Index Modulation.
IEEE Commun. Lett., November, 2023

Dual efficient reversible data hiding using Hamming code and OPAP.
J. Inf. Secur. Appl., August, 2023

Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023

A Minimum Adjustment Cost Consensus Framework Considering Harmony Degrees and Trust Propagation for Social Network Group Decision Making.
IEEE Trans. Syst. Man Cybern. Syst., March, 2023

GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos.
IEEE Trans. Image Process., 2023

Generative Steganography via Auto-Generation of Semantic Object Contours.
IEEE Trans. Inf. Forensics Secur., 2023

Secret-to-Image Reversible Transformation for Generative Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023

Geometric correction code-based robust image watermarking.
IET Image Process., 2023

GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023

Glow Model-Based Latent Vector Optimization for Generative Image Steganography in Edge and Cloud Computing Environment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Blockchain in Big Data Security for Intelligent Transportation With 6G.
IEEE Trans. Intell. Transp. Syst., 2022

A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System.
IEEE Trans. Intell. Transp. Syst., 2022

Spatio-Temporal Feature Encoding for Traffic Accident Detection in VANET Environment.
IEEE Trans. Intell. Transp. Syst., 2022

Improving Generalization by Commonality Learning in Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Circuits/cutsets duality and theoretical foundation of a structural approach to survivable logical topology mapping in IP-over-WDM optical networks.
Opt. Switch. Netw., 2022

Dynamic Marketing Resource Allocation with Two-Stage Decisions.
J. Theor. Appl. Electron. Commer. Res., 2022

Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022

Traceable and Authenticable Image Tagging for Fake News Detection.
CoRR, 2022

Auto-Focus Contrastive Learning for Image Manipulation Detection.
CoRR, 2022

Real-World Image Super Resolution via Unsupervised Bi-directional Cycle Domain Transfer Learning based Generative Adversarial Network.
CoRR, 2022

Continual Learning for Steganalysis.
CoRR, 2022

Secret-to-Image Reversible Transformation for Generative Steganography.
CoRR, 2022

Learning Hierarchical Graph Representation for Image Manipulation Detection.
CoRR, 2022

Minimum conflict consensus with budget constraint based on social network analysis.
Comput. Ind. Eng., 2022

Generalized Quadrature Index Modulation With Multi-Index and Dimension-Extended Constellation.
IEEE Access, 2022

Broad Learning with Uniform Local Binary Pattern for Fingerprint Liveness Detection.
Proceedings of the Neural Computing for Advanced Applications, 2022

2021
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search.
IEEE Trans. Big Data, 2021

Improved CNN-Based Hashing for Encrypted Image Retrieval.
Secur. Commun. Networks, 2021

Residual visualization-guided explainable copy-relationship learning for image copy detection in social networks.
Knowl. Based Syst., 2021

Analysis and optimisation of perishable inventory with stocks-sensitive stochastic demand and two-stage pricing: A discrete-event simulation study.
J. Simulation, 2021

A minimum adjustment consensus framework with compromise limits for social network group decision making under incomplete information.
Inf. Sci., 2021

Geometric rectification-based neural network architecture for image manipulation detection.
Int. J. Intell. Syst., 2021

Blockchain-based decentralized reputation system in E-commerce environment.
Future Gener. Comput. Syst., 2021

Architecture Modeling and Test of Tractor Power Shift Transmission.
IEEE Access, 2021

Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

A Novel Approach for DDoS Attack Detection Using Big Data and Machine Learning.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

Blind Equalization Algorithms Applied to Dispersion Compensation in POLMUX Coherent Optical Communication System.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Minimizing Redundancy to Satisfy Reliability Requirement for a Parallel Application on Heterogeneous Service-Oriented Systems.
IEEE Trans. Serv. Comput., 2020

Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Robust network function virtualization.
Networks, 2020

Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020

Real-time image carrier generation based on generative adversarial network and fast object detection.
J. Real Time Image Process., 2020

Reaching a minimum adjustment consensus in social network group decision-making.
Inf. Fusion, 2020

Partial-duplicate image retrieval using spatial and visual contextual clues.
Int. J. Embed. Syst., 2020

Coverless information hiding based on the generation of anime characters.
EURASIP J. Image Video Process., 2020

A Partial Amplify and Forward Cooperative Communication Strategy Based on Blind Signal Detection.
IEEE Access, 2020

Privacy-aware Cold-Start Recommendation based on Collaborative Filtering and Enhanced Trust.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

2019
Coverless image steganography using partial-duplicate image retrieval.
Soft Comput., 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Secur. Commun. Networks, 2019

Feature selection based on correlation deflation.
Neural Comput. Appl., 2019

Implementing real-time RCF-Retinex image enhancement method using CUDA.
J. Real Time Image Process., 2019

Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography.
Int. J. High Perform. Comput. Netw., 2019

Partial-duplicate image retrieval based on HSV colour space for coverless information hiding.
Int. J. Comput. Sci. Eng., 2019

Original image tracing with image relational graph for near-duplicate image elimination.
Int. J. Comput. Sci. Eng., 2019

Working capital optimization in a supply chain perspective.
Eur. J. Oper. Res., 2019

Two heuristics for the capacitated multi-period cutting stock problem with pattern setup cost.
Comput. Oper. Res., 2019

Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019

A bi-objective model for location planning of electric vehicle charging stations with GPS trajectory data.
Comput. Ind. Eng., 2019

Boolean Operation Based Visual Cryptography.
IEEE Access, 2019

Video Copy Detection Using Spatio-Temporal CNN Features.
IEEE Access, 2019

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment.
IEEE Access, 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Quadrature Index Modulation With Three-Dimension Constellation.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

The Effect Factors on Sustained Use of Physical Activity apps.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

A Location and Intention Oriented Recommendation Method for Accuracy Enhancement over Big Data.
Proceedings of the Mobile Computing, Applications, and Services, 2019

Real- Time Accurate Measurement Algorithm for Tractor Driving Wheel Slip Rate.
Proceedings of the 13th International Conference on Sensing Technology, 2019

Real- Time Recognition Algorithm of Tractor Random Dynamic Load Characteristics for Control.
Proceedings of the 13th International Conference on Sensing Technology, 2019

Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
Network Community Detection Based on the Physarum-Inspired Computational Framework.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Image contrast enhancement using an artificial bee colony algorithm.
Swarm Evol. Comput., 2018

Multiple dictionary pairs learning and sparse representation-based infrared image super-resolution with improved fuzzy clustering.
Soft Comput., 2018

Retinex-based image enhancement framework by using region covariance filter.
Soft Comput., 2018

An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment.
Sensors, 2018

Hybrid computation offloading for smart home automation in mobile cloud computing.
Pers. Ubiquitous Comput., 2018

Encoding multiple contextual clues for partial-duplicate image retrieval.
Pattern Recognit. Lett., 2018

MCRS: A course recommendation system for MOOCs.
Multim. Tools Appl., 2018

Pairwise IPVO-based reversible data hiding.
Multim. Tools Appl., 2018

Enhancing heterogeneous similarity estimation via neighborhood reversibility.
Multim. Tools Appl., 2018

New SMVQ scheme with exactly the same PSNR of VQ by introducing extend state codebook.
Multim. Tools Appl., 2018

Deriving heterogeneous experts weights from incomplete linguistic preference relations based on uninorm consistency.
Knowl. Based Syst., 2018

A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network.
J. Inf. Sci. Eng., 2018

A discriminative multi-class feature selection method via weighted l<sub>2, 1</sub>-norm and Extended Elastic Net.
Neurocomputing, 2018

Spatial descriptor embedding for near-duplicate image retrieval.
Int. J. Embed. Syst., 2018

Multi-scale image fusion through rolling guidance filter.
Future Gener. Comput. Syst., 2018

Modeling the minimum cost consensus problem in an asymmetric costs context.
Eur. J. Oper. Res., 2018

A new aspect on P2P online lending default prediction using meta-level phone usage data in China.
Decis. Support Syst., 2018

Combined cutting stock and lot-sizing problem with pattern setup.
Comput. Oper. Res., 2018

Complex network measurement and optimization of Chinese domestic movies with internet of things technology.
Comput. Electr. Eng., 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

Robust Virtual Network Function Provisioning Under Random Failures on Network Function Enabled Nodes.
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018

NFV-Enabled Network Slicing.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks.
Wirel. Commun. Mob. Comput., 2017

Novel Survivable Logical Topology Routing by Logical Protecting Spanning Trees in IP-Over-WDM Networks.
IEEE/ACM Trans. Netw., 2017

Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Inf. Forensics Secur., 2017

Local Adaptive Binary Patterns Using Diamond Sampling Structure for Texture Classification.
IEEE Signal Process. Lett., 2017

An Invocation Cost Optimization Method for Web Services in Cloud Environment.
Sci. Program., 2017

Multi-sensor image super-resolution with fuzzy cluster by using multi-scale and multi-view sparse coding for infrared image.
Multim. Tools Appl., 2017

A novel scheme for infrared image enhancement by using weighted least squares filter and fuzzy plateau histogram equalization.
Multim. Tools Appl., 2017

Optimal PPVO-based reversible data hiding.
J. Vis. Commun. Image Represent., 2017

An optimized design of CAN FD for automotive cyber-physical systems.
J. Syst. Archit., 2017

A novel prediction model based on particle swarm optimization and adaptive neuro-fuzzy inference system.
J. Intell. Fuzzy Syst., 2017

Group prioritisation with unknown expert weights in incomplete linguistic context.
Int. J. Syst. Sci., 2017

Lagrangean relaxation and hybrid simulated annealing tabu search procedure for a two-echelon capacitated facility location problem with plant size selection.
Int. J. Prod. Res., 2017

Ordinal pyramid coding for rotation invariant feature extraction.
Neurocomputing, 2017

Fast and accurate near-duplicate image elimination for visual sensor networks.
Int. J. Distributed Sens. Networks, 2017

"Time-Location-Frequency"-aware Internet of things service selection based on historical records.
Int. J. Distributed Sens. Networks, 2017

Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering.
IEICE Trans. Inf. Syst., 2017

Naturalization of Screen Content Images for Enhanced Quality Evaluation.
IEICE Trans. Inf. Syst., 2017

A novel search method based on artificial bee colony algorithm for block motion estimation.
EURASIP J. Image Video Process., 2017

Blind sequence detection using reservoir computing.
Digit. Signal Process., 2017

Survivable Probability of Network Slicing with Random Physical Link Failure.
CoRR, 2017

Survivable Probability of SDN-enabled Cloud Networking with Random Physical Link Failure.
CoRR, 2017

CLASS: Collaborative Low-Rank and Sparse Separation for Moving Object Detection.
Cogn. Comput., 2017

2016
Time-Aware IoE Service Recommendation on Sparse Data.
Mob. Inf. Syst., 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Trans. Inf. Syst., 2016

Essential secret image sharing scheme with the same size of shadows.
Digit. Signal Process., 2016

Survivable Cloud Network Design Against Multiple Failures Through Protecting Spanning Trees.
CoRR, 2016

Improved Reversible Image Authentication Scheme.
Cogn. Comput., 2016

Coverless Information Hiding Method Based on Multi-keywords.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Original Image Tracing with Image Relational Graph for Near-Duplicate Image Elimination.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Cross-Layer Network Survivability Under Multiple Cross-Layer Metrics.
JOCN, 2015

The design of tractor CAN bus intelligent node based on dual-core processor.
Int. J. Grid Util. Comput., 2015

A Lagrangean Relaxation Approach for a Two-Stage Capacitated Facility Location Problem with Choice of Facility Size.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

A lagrangean relaxation approach for a two-stage capacitated facility location problem with choice of depot size.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

Coverless Image Steganography Without Embedding.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Coverless Information Hiding Method Based on the Chinese Mathematical Expression.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Survivable cloud network mapping with multiple failures.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Optimal Network Function Virtualization Realizing End-to-End Requests.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014

Knowledge diffusion path analysis of data quality literature: A main path analysis.
J. Informetrics, 2014

Unified Mathematical Programming Frameworks for Survivable Logical Topology Routing in IP-over-WDM Optical Networks.
JOCN, 2014

Parallel machines scheduling with simple linear job deterioration and non-simultaneous machine available times.
Comput. Ind. Eng., 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

An inventory control and pricing model for smart building load management.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

2013
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
J. Syst. Softw., 2013

Several flow shop scheduling problems with truncated position-based learning effect.
Comput. Oper. Res., 2013

Two-stage stochastic lot-sizing problem under cost uncertainty.
Ann. Oper. Res., 2013

The crane scheduling problem: models and solution approaches.
Ann. Oper. Res., 2013

Optimum logical topology routing in an IP-over-WDM optical network and physical link failure localization: An integrated approach.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

Optimal relay node placement in wireless sensor network for smart buildings metering and control.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

2012
Optimal cyclic single crane scheduling for two parallel train oilcan repairing lines.
Comput. Oper. Res., 2012

Novel survivable logical topology routing in IP-over-WDM networks by logical protecting spanning tree set.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Robustness of logical topology mapping algorithms for survivability against multiple failures in an IP-over-WDM optical network.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
Logical topology survivability in IP-over-WDM networks: Survivable lightpath routing for maximum logical topology capacity and minimum spare capacity requirements.
Proceedings of the 8th International Workshop on the Design of Reliable Communication Networks, 2011

2010
Stochastic lot-sizing problem with deterministic demands and Wagner-Whitin costs.
Oper. Res. Lett., 2010

The production scheduling problem in a multi-page invoice printing system.
Comput. Oper. Res., 2010

2009
A solution for cyclic scheduling of multi-hoists without overlapping.
Ann. Oper. Res., 2009

2003
Single hoist cyclic scheduling with multiple tanks: a material handling solution.
Comput. Oper. Res., 2003


  Loading...