Follow
zhili zhou
zhili zhou
Nanjing University of Information Science and Technology
No verified email
Title
Cited by
Cited by
Year
Effective and efficient global context verification for image copy detection
Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun
IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016
3842016
Coverless image steganography without embedding
Z Zhou, H Sun, R Harit, X Chen, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
1962015
Coverless image steganography using partial-duplicate image retrieval
Z Zhou, Y Mu, QMJ Wu
Soft Computing 23 (13), 4927-4938, 2019
1472019
Effective and efficient image copy detection with resistance to arbitrary rotation
Z Zhou, CN Yang, B Chen, X Sun, Q Liu, J QM
IEICE Transactions on information and systems 99 (6), 1531-1540, 2016
1402016
MCRS: A course recommendation system for MOOCs
H Zhang, T Huang, Z Lv, SY Liu, Z Zhou
Multimedia Tools and Applications 77, 7051-7069, 2018
1252018
Coverless information hiding based on the molecular structure images of material.
Y Cao, Z Zhou, X Sun, C Gao
Computers, Materials & Continua 54 (2), 2018
1192018
Image contrast enhancement using an artificial bee colony algorithm
J Chen, W Yu, J Tian, L Chen, Z Zhou
Swarm and Evolutionary Computation 38, 287-294, 2018
1092018
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors
X Chen, X Sun, H Sun, Z Zhou, J Zhang
Journal of Systems and Software 86 (10), 2620-2626, 2013
1062013
Coverless information hiding based on bag-of-words model of image
ZL Zhou, Y Cao, XM Sun
J. Appl. Sci 34 (5), 527-536, 2016
1052016
Spatio-temporal feature encoding for traffic accident detection in VANET environment
Z Zhou, X Dong, Z Li, K Yu, C Ding, Y Yang
IEEE Transactions on Intelligent Transportation Systems 23 (10), 19772-19781, 2022
1012022
Minimizing redundancy to satisfy reliability requirement for a parallel application on heterogeneous service-oriented systems
G Xie, G Zeng, Y Chen, Y Bai, Z Zhou, R Li, K Li
IEEE Transactions on Services Computing 13 (5), 871-886, 2017
862017
Coverless information hiding method based on the Chinese mathematical expression
X Chen, H Sun, Y Tobe, Z Zhou, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
862015
Fast and accurate near-duplicate image elimination for visual sensor networks
Z Zhou, QMJ Wu, F Huang, X Sun
International Journal of Distributed Sensor Networks 13 (2), 1550147717694172, 2017
842017
Gan-siamese network for cross-domain vehicle re-identification in intelligent transport systems
Z Zhou, Y Li, J Li, K Yu, G Kou, M Wang, BB Gupta
IEEE transactions on network science and engineering, 2022
752022
Blockchain-based decentralized reputation system in E-commerce environment
Z Zhou, M Wang, CN Yang, Z Fu, X Sun, QMJ Wu
Future Generation Computer Systems 124, 155-167, 2021
712021
Multi-scale image fusion through rolling guidance filter
L Jian, X Yang, Z Zhou, K Zhou, K Liu
Future Generation Computer Systems 83, 310-325, 2018
702018
Hybrid computation offloading for smart home automation in mobile cloud computing
J Zhang, Z Zhou, S Li, L Gan, X Zhang, L Qi, X Xu, W Dou
Personal and Ubiquitous Computing 22, 121-134, 2018
662018
A new keypoint-based copy-move forgery detection for small smooth regions
XY Wang, S Li, YN Liu, Y Niu, HY Yang, Z Zhou
Multimedia Tools and Applications 76, 23353-23382, 2017
622017
Improving generalization by commonality learning in face forgery detection
P Yu, J Fei, Z Xia, Z Zhou, J Weng
IEEE Transactions on Information Forensics and Security 17, 547-558, 2022
582022
Secret-to-image reversible transformation for generative steganography
Z Zhou, Y Su, J Li, K Yu, QMJ Wu, Z Fu, Y Shi
IEEE Transactions on Dependable and Secure Computing, 2022
572022
The system can't perform the operation now. Try again later.
Articles 1–20