关注
zhili zhou
zhili zhou
Nanjing University of Information Science and Technology
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
Effective and efficient global context verification for image copy detection
Z Zhou, Y Wang, QMJ Wu, CN Yang, X Sun
IEEE Transactions on Information Forensics and Security 12 (1), 48-63, 2016
3842016
Coverless image steganography without embedding
Z Zhou, H Sun, R Harit, X Chen, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
1942015
Coverless image steganography using partial-duplicate image retrieval
Z Zhou, Y Mu, QMJ Wu
Soft Computing 23 (13), 4927-4938, 2019
1442019
Effective and efficient image copy detection with resistance to arbitrary rotation
Z Zhou, CN Yang, B Chen, X Sun, Q Liu, J QM
IEICE Transactions on information and systems 99 (6), 1531-1540, 2016
1402016
MCRS: A course recommendation system for MOOCs
H Zhang, T Huang, Z Lv, SY Liu, Z Zhou
Multimedia Tools and Applications 77, 7051-7069, 2018
1252018
Coverless information hiding based on the molecular structure images of material.
Y Cao, Z Zhou, X Sun, C Gao
Computers, Materials & Continua 54 (2), 2018
1192018
Image contrast enhancement using an artificial bee colony algorithm
J Chen, W Yu, J Tian, L Chen, Z Zhou
Swarm and Evolutionary Computation 38, 287-294, 2018
1082018
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors
X Chen, X Sun, H Sun, Z Zhou, J Zhang
Journal of Systems and Software 86 (10), 2620-2626, 2013
1062013
Coverless information hiding based on bag-of-words model of image
ZL Zhou, Y Cao, XM Sun
J. Appl. Sci 34 (5), 527-536, 2016
1042016
Spatio-temporal feature encoding for traffic accident detection in VANET environment
Z Zhou, X Dong, Z Li, K Yu, C Ding, Y Yang
IEEE Transactions on Intelligent Transportation Systems 23 (10), 19772-19781, 2022
1012022
Minimizing redundancy to satisfy reliability requirement for a parallel application on heterogeneous service-oriented systems
G Xie, G Zeng, Y Chen, Y Bai, Z Zhou, R Li, K Li
IEEE Transactions on Services Computing 13 (5), 871-886, 2017
862017
Coverless information hiding method based on the Chinese mathematical expression
X Chen, H Sun, Y Tobe, Z Zhou, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
862015
Fast and accurate near-duplicate image elimination for visual sensor networks
Z Zhou, QMJ Wu, F Huang, X Sun
International Journal of Distributed Sensor Networks 13 (2), 1550147717694172, 2017
842017
Gan-siamese network for cross-domain vehicle re-identification in intelligent transport systems
Z Zhou, Y Li, J Li, K Yu, G Kou, M Wang, BB Gupta
IEEE transactions on network science and engineering, 2022
742022
Blockchain-based decentralized reputation system in E-commerce environment
Z Zhou, M Wang, CN Yang, Z Fu, X Sun, QMJ Wu
Future Generation Computer Systems 124, 155-167, 2021
702021
Multi-scale image fusion through rolling guidance filter
L Jian, X Yang, Z Zhou, K Zhou, K Liu
Future Generation Computer Systems 83, 310-325, 2018
702018
Hybrid computation offloading for smart home automation in mobile cloud computing
J Zhang, Z Zhou, S Li, L Gan, X Zhang, L Qi, X Xu, W Dou
Personal and Ubiquitous Computing 22, 121-134, 2018
662018
A new keypoint-based copy-move forgery detection for small smooth regions
XY Wang, S Li, YN Liu, Y Niu, HY Yang, Z Zhou
Multimedia Tools and Applications 76, 23353-23382, 2017
612017
Secret-to-image reversible transformation for generative steganography
Z Zhou, Y Su, J Li, K Yu, QMJ Wu, Z Fu, Y Shi
IEEE Transactions on Dependable and Secure Computing, 2022
572022
Improving generalization by commonality learning in face forgery detection
P Yu, J Fei, Z Xia, Z Zhou, J Weng
IEEE Transactions on Information Forensics and Security 17, 547-558, 2022
572022
系统目前无法执行此操作,请稍后再试。
文章 1–20