Ke Zhou

According to our database1, Ke Zhou authored at least 112 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Semi-supervised clustering with deep metric learning and graph embedding.
World Wide Web, 2020

A low cost and un-cancelled laplace noise based differential privacy algorithm for spatial decompositions.
World Wide Web, 2020

Efficient SSD Cache for Cloud Block Storage via Leveraging Block Reuse Distances.
IEEE Trans. Parallel Distrib. Syst., 2020

Minority Disk Failure Prediction Based on Transfer Learning in Large Data Centers of Heterogeneous Disk Systems.
IEEE Trans. Parallel Distrib. Syst., 2020

Achieving high data reliability at low scrubbing cost via failure-aware scrubbing.
J. Parallel Distributed Comput., 2020

Unsupervised domain adaptation with adversarial learning for mass detection in mammogram.
Neurocomputing, 2020

Semantic-aware data quality assessment for image big data.
Future Gener. Comput. Syst., 2020

Cost-efficiency disk failure prediction via threshold-moving.
Concurr. Comput. Pract. Exp., 2020

HDDse: Enabling High-Dimensional Disk State Embedding for Generic Failure Detection System of Heterogeneous Disks in Large Data Centers.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

OSCA: An Online-Model Based Cache Allocation Scheme in Cloud Block Storage Systems.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Label-Attended Hashing for Multi-Label Image Retrieval.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

A Machine Learning Based Write Policy for SSD Cache in Cloud Block Storage.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Improving Cache Performance for Large-Scale Photo Stores via Heuristic Prefetching Scheme.
IEEE Trans. Parallel Distrib. Syst., 2019

Deep Self-Taught Hashing for Image Retrieval.
IEEE Trans. Cybern., 2019

Photo-realistic face age progression/regression using a single generative adversarial network.
Neurocomputing, 2019

Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learning.
Future Gener. Comput. Syst., 2019

Enhancing Attention-Based LSTM With Position Context for Aspect-Level Sentiment Classification.
IEEE Access, 2019

An End-to-End Automatic Cloud Database Tuning System Using Deep Reinforcement Learning.
Proceedings of the 2019 International Conference on Management of Data, 2019

Transfer Learning based Failure Prediction for Minority Disks in Large Data Centers of Heterogeneous Disk Systems.
Proceedings of the 48th International Conference on Parallel Processing, 2019

Lifelong Disk Failure Prediction via GAN-Based Anomaly Detection.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Scrub Unleveling: Achieving High Data Reliability at Low Scrubbing Cost.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Semi-supervised Clustering with Deep Metric Learning.
Proceedings of the Database Systems for Advanced Applications, 2019

Improved Review Sentiment Analysis with a Syntax-Aware Encoder.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

Analysis and Management to Hash-Based Graph and Rank.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

A Framework for Image Dark Data Assessment.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

2018
Alleviating Memory Refresh Overhead via Data Compression for High Performance and Energy Efficiency.
IEEE Trans. Parallel Distrib. Syst., 2018

A framework with data-centric accountability and auditability for cloud storage.
J. Supercomput., 2018

Dynamic and Public Auditing with Fair Arbitration for Cloud Data.
IEEE Trans. Cloud Comput., 2018

Automatic Pectoral Muscle Region Segmentation in Mammograms Using Genetic Algorithm and Morphological Selection.
J. Digit. Imaging, 2018

EFUI: An ensemble framework using uncertain inference for pornographic image recognition.
Neurocomputing, 2018

Deep sentiment hashing for text retrieval in social CIoT.
Future Gener. Comput. Syst., 2018

Full integrity and freshness for cloud data.
Future Gener. Comput. Syst., 2018

CAAE++: Improved CAAE for Age Progression/Regression.
IEEE Access, 2018

Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Optimized Implementation for Concurrent LSM-Structured Key-Value Stores.
Proceedings of the 2018 IEEE International Conference on Networking, 2018

LVFS: A Lightweight Video Storage File System for IP Camera-Based Surveillance Applications.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Demystifying Cache Policies for Photo Stores at Scale: A Tencent Case Study.
Proceedings of the 32nd International Conference on Supercomputing, 2018

Efficient SSD Caching by Avoiding Unnecessary Writes using Machine Learning.
Proceedings of the 47th International Conference on Parallel Processing, 2018

CACH-Dedup: Content Aware Clustered and Hierarchical Deduplication.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

LEA: A Lazy Eviction Algorithm for SSD Cache in Cloud Block Storage.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Using Blockchain for Data Auditing in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A More Secure Spatial Decompositions Algorithm via Indefeasible Laplace Noise in Differential Privacy.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Resemblance and mergence based indexing for high performance data deduplication.
J. Syst. Softw., 2017

2016
Feature aggregating hashing for image copy detection.
World Wide Web, 2016

DREAM-(L)G: A Distributed Grouping-Based Algorithm for Resource Assignment for Bandwidth-Intensive Applications in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2016

XI-Code: A Family of Practical Lowest Density MDS Array Codes of Distance 4.
IEEE Trans. Communications, 2016

Multi-view multi-label learning for image annotation.
Multim. Tools Appl., 2016

An Improved Decoding Algorithm for Generalized RDP Codes.
IEEE Communications Letters, 2016

CAR: A Compression-Aware Refresh Approach to Improve Memory Performance and Energy Efficiency.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Improve Restore Speed in Deduplication Systems Using Segregated Cache.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

LAMS: A latency-aware memory scheduling policy for modern DRAM systems.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

RMD: A Resemblance and Mergence Based Approach for High Performance Deduplication.
Proceedings of the 45th International Conference on Parallel Processing, 2016

ROP: Alleviating Refresh Overheads via Reviving the Memory System in Frozen Cycles.
Proceedings of the 45th International Conference on Parallel Processing, 2016

Exploiting Cluster-based Meta Paths for Link Prediction in Signed Networks.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Compact Image Fingerprint Via Multiple Kernel Hashing.
IEEE Trans. Multimedia, 2015

Supervised feature learning via l<sub>2</sub>-norm regularized logistic regression for 3D object recognition.
Neurocomputing, 2015

Lowest Density MDS Array Codes of Distance 3.
IEEE Communications Letters, 2015

Deep Self-taught Hashing for Image Retrieval.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

Adopting Multi-mode Access Control for Secure Data Sharing in Cloud.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Full Integrity and Freshness for Outsourced Storage.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Efficiently Representing Membershipfor Variable Large Data Sets.
IEEE Trans. Parallel Distrib. Syst., 2014

FlexECC: Partially Relaxing ECC of MLC SSD for Better Cache Performance.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Meeting service level agreement cost-effectively for video-on-demand applications in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

SFDS: A Security and Flexible Data Sharing Scheme in Cloud Environment.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

2013
Totoro: A Scalable and Fault-Tolerant Data Center Network by Using Backup Port.
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013

Improve Effective Capacity and Lifetime of Solid State Drives.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

A novel I/O scheduler for SSD with improved performance and lifetime.
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013

Medoop: A medical information platform based on Hadoop.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

2012
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]
Comput. Commun., 2012

Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography.
Comput. J., 2012

BVSSD: build built-in versioning flash-based solid state drives.
Proceedings of the 5th Annual International Systems and Storage Conference, 2012

An Empirical Study on the Interplay between Filesystems and SSD.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

State-based steganography in low bit rate speech.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Least-significant-digit steganography in low bitrate speech.
Proceedings of IEEE International Conference on Communications, 2012

2011
ShiftFlash: Make flash-based storage more resilient and robust.
Perform. Evaluation, 2011

Adaptive partial-matching steganography for voice over IP using triple M sequences.
Comput. Commun., 2011

Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

DBA: A Dynamic Bloom Filter Array for Scalable Membership Representation of Variable Large Data Sets.
Proceedings of the MASCOTS 2011, 2011

2010
Modeling the Impact of Disk Scrubbing on Storage System.
JCP, 2010

Capturing the object behaviour for storage system evaluation.
Int. J. High Perform. Comput. Netw., 2010

MAD2: A scalable high-throughput exact deduplication approach for network backup services.
Proceedings of the IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010

DEBAR: A scalable high-performance de-duplication storage system for backup and archiving.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

DSFS: Decentralized security for large parallel file systems.
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010

2009
A Novel Cost-Effective Disk Scrubbing Scheme.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Fault-Tolerant Online Backup Service: Formal Modeling and Reasoning.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Identification and Authentication in Large-Scale Storage Systems.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Digital logic based encoding strategies for steganography on voice-over-IP.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

An Adaptive Steganography Scheme for Voice Over IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

An M-Sequence Based Steganography Model for Voice over IP.
Proceedings of IEEE International Conference on Communications, 2009

Range Query Using Learning-Aware RPS in DHT-Based Peer-to-Peer Networks.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

2008
Goal-based Dependability Analysis and Improvement Framework for Network Storage Systems.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

PCOW: Pipelining-Based COW Snapshot Method to Decrease First Write Penalty.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

2007
FTRAID: A Fat-tree Based Parallel Storage Architecture for Very Large Disk Array.
Proceedings of the International Conference on Networking, 2007

Implementing and Evaluating Security Controls for an Object-Based Storage System.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

PRO: A Popularity-based Multi-threaded Reconstruction Optimization for RAID-Structured Storage Systems.
Proceedings of the 5th USENIX Conference on File and Storage Technologies, 2007

Studying of Multi-dimensional Based Replica Management in Object Storage System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Optimal Clustering Size of Small File Access in Network Attached Storage Device.
Parallel Process. Lett., 2006

Pipelining scheduling and hierarchical-volume management in a storage area network.
Proceedings of the 1st IEEE/SMC International Conference on System of Systems Engineering, 2006

Put mass storage into grid.
Proceedings of the 1st IEEE/SMC International Conference on System of Systems Engineering, 2006

Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid.
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006

Self-Similarity in Data Traffic for Object-Based Storage System.
Proceedings of the 2006 International Workshop on Networking, 2006

A Distributed Object Tracing System.
Proceedings of the 2006 International Workshop on Networking, 2006

A Domain-Based Storage Management Framework for the WAN.
Proceedings of the 2006 International Workshop on Networking, 2006

Decease I/O Mean Response Time Using Software Pipelining.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Cluster Computing and Grid 2005 Works in Progress.
IEEE Distributed Systems Online, 2005

SVR-Parameters Selection for Image Watermarking.
Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), 2005

A Strategy of Load Balancing in Object Storage System.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004


  Loading...