Effective and efficient global context verification for image copy detection Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016 | 384 | 2016 |
Coverless image steganography without embedding Z Zhou, H Sun, R Harit, X Chen, X Sun Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015 | 194 | 2015 |
Coverless image steganography using partial-duplicate image retrieval Z Zhou, Y Mu, QMJ Wu Soft Computing 23 (13), 4927-4938, 2019 | 144 | 2019 |
Effective and efficient image copy detection with resistance to arbitrary rotation Z Zhou, CN Yang, B Chen, X Sun, Q Liu, J QM IEICE Transactions on information and systems 99 (6), 1531-1540, 2016 | 140 | 2016 |
MCRS: A course recommendation system for MOOCs H Zhang, T Huang, Z Lv, SY Liu, Z Zhou Multimedia Tools and Applications 77, 7051-7069, 2018 | 125 | 2018 |
Coverless information hiding based on the molecular structure images of material. Y Cao, Z Zhou, X Sun, C Gao Computers, Materials & Continua 54 (2), 2018 | 119 | 2018 |
Image contrast enhancement using an artificial bee colony algorithm J Chen, W Yu, J Tian, L Chen, Z Zhou Swarm and Evolutionary Computation 38, 287-294, 2018 | 108 | 2018 |
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors X Chen, X Sun, H Sun, Z Zhou, J Zhang Journal of Systems and Software 86 (10), 2620-2626, 2013 | 106 | 2013 |
Coverless information hiding based on bag-of-words model of image ZL Zhou, Y Cao, XM Sun J. Appl. Sci 34 (5), 527-536, 2016 | 104 | 2016 |
Spatio-temporal feature encoding for traffic accident detection in VANET environment Z Zhou, X Dong, Z Li, K Yu, C Ding, Y Yang IEEE Transactions on Intelligent Transportation Systems 23 (10), 19772-19781, 2022 | 101 | 2022 |
Minimizing redundancy to satisfy reliability requirement for a parallel application on heterogeneous service-oriented systems G Xie, G Zeng, Y Chen, Y Bai, Z Zhou, R Li, K Li IEEE Transactions on Services Computing 13 (5), 871-886, 2017 | 86 | 2017 |
Coverless information hiding method based on the Chinese mathematical expression X Chen, H Sun, Y Tobe, Z Zhou, X Sun Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015 | 86 | 2015 |
Fast and accurate near-duplicate image elimination for visual sensor networks Z Zhou, QMJ Wu, F Huang, X Sun International Journal of Distributed Sensor Networks 13 (2), 1550147717694172, 2017 | 84 | 2017 |
Gan-siamese network for cross-domain vehicle re-identification in intelligent transport systems Z Zhou, Y Li, J Li, K Yu, G Kou, M Wang, BB Gupta IEEE transactions on network science and engineering, 2022 | 74 | 2022 |
Blockchain-based decentralized reputation system in E-commerce environment Z Zhou, M Wang, CN Yang, Z Fu, X Sun, QMJ Wu Future Generation Computer Systems 124, 155-167, 2021 | 70 | 2021 |
Multi-scale image fusion through rolling guidance filter L Jian, X Yang, Z Zhou, K Zhou, K Liu Future Generation Computer Systems 83, 310-325, 2018 | 70 | 2018 |
Hybrid computation offloading for smart home automation in mobile cloud computing J Zhang, Z Zhou, S Li, L Gan, X Zhang, L Qi, X Xu, W Dou Personal and Ubiquitous Computing 22, 121-134, 2018 | 66 | 2018 |
A new keypoint-based copy-move forgery detection for small smooth regions XY Wang, S Li, YN Liu, Y Niu, HY Yang, Z Zhou Multimedia Tools and Applications 76, 23353-23382, 2017 | 61 | 2017 |
Secret-to-image reversible transformation for generative steganography Z Zhou, Y Su, J Li, K Yu, QMJ Wu, Z Fu, Y Shi IEEE Transactions on Dependable and Secure Computing, 2022 | 57 | 2022 |
Improving generalization by commonality learning in face forgery detection P Yu, J Fei, Z Xia, Z Zhou, J Weng IEEE Transactions on Information Forensics and Security 17, 547-558, 2022 | 57 | 2022 |