Zhitang Li
Orcid: 0000-0002-4437-4405
According to our database1,
Zhitang Li
authored at least 94 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The optimal encroachment strategy of private-label considering the quality effort and platform's e-word-of-mouth.
Electron. Commer. Res., September, 2024
Effectiveness analysis of the data-driven strategy of AI chips supply chain considering blockchain traceability with capacity constraints.
Comput. Ind. Eng., 2024
2023
Who benefits from offline investment: an analysis of strategic interactions between e-book pricing and bookstores' investment.
Electron. Commer. Res., December, 2023
Impact of regulatory intervention on green technology and innovation investment of the NEV automaker.
Comput. Ind. Eng., October, 2023
2022
Manufacturers' integrated strategies for emission reduction and recycling: The role of government regulations.
Comput. Ind. Eng., 2022
The optimal integration strategy and authorization mechanism of AI chip with the architecture design capacity.
Comput. Ind. Eng., 2022
2021
IT Prof., 2021
2018
2016
A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video.
Multim. Tools Appl., 2016
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
2015
Multim. Tools Appl., 2015
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
2014
A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC.
Multim. Tools Appl., 2014
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014
Proceedings of the International Conference on Audio, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
2012
J. Softw., 2012
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012
Proceedings of the Third FTRA International Conference on Mobile, 2012
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012
2011
Peer-to-Peer Netw. Appl., 2011
Application of Singular Spectrum Analysis to the Noise Reduction of Intrusion Detection Alarms.
J. Comput., 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the 2011 International Conference on Cyberworlds, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift.
IEEE Trans. Circuits Syst. Video Technol., 2010
J. Networks, 2010
The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection.
J. Networks, 2010
Int. J. High Perform. Comput. Netw., 2010
2009
Int. J. Distributed Sens. Networks, 2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the Fifth International Conference on Networking and Services, 2009
Proceedings of the International Conference on Computer Modeling and Simulation, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Design, modeling and simulation of a novel directional MAC protocol for ad hoc networks.
Kybernetes, 2008
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the Advances in Grid and Pervasive Computing, 2008
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Conference on Semantics, 2007
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Integrated Network Management, 2007
Proceedings of the Human Interface and the Management of Information. Methods, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Proceedings of the 2006 International Conference on Semantics, 2006
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006
Proceedings of the 2006 International Workshop on Networking, 2006
Proceedings of the 2006 International Workshop on Networking, 2006
Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function.
Proceedings of the Intelligent Computing, 2006
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Data Mining, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005