Shuli Zheng

Orcid: 0000-0002-0247-909X

According to our database1, Shuli Zheng authored at least 30 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing.
ACM Trans. Database Syst., June, 2023

2022
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Knowledge Management Capability, Organizational Resilience, and the Growth of SMEs.
Int. J. Distributed Syst. Technol., 2022

2021
Research on the Effect of Knowledge Network Embedding on the Dynamic Capabilities of Small and Micro Enterprises.
Wirel. Commun. Mob. Comput., 2021

Lossless Data Hiding Based on Homomorphic Cryptosystem.
IEEE Trans. Dependable Secur. Comput., 2021

Design of mmWave Directional Antenna for Enhanced 5G Broadcasting Coverage.
Sensors, 2021

An improved steganography without embedding based on attention GAN.
Peer-to-Peer Netw. Appl., 2021

Key Technologies in 6G SAGS IoT: Shape-Adaptive Antenna and Radar-Communication Integration.
IEEE Netw., 2021

A blockchain-based trading system for big data.
Comput. Networks, 2021

Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Lossless Database Watermarking Based on Order-preserving Encryption.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
A measurement method of fifth-generation multiple-input multiple-output antenna based on microwave imaging.
Int. J. Distributed Sens. Networks, 2020

A Blockchain-Based Trading Platform for Big Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Novel Approach of Steganalysis to Deal with Steganographic Algorithm Mismatch.
Proceedings of the Intelligent Computing Theories and Application, 2020

The Design of Antenna for Tunnel Broadcasting Based on SIW Technology.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2020

Microwave One-dimensional Imaging Measurement in 5G MIMO.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2020

2019
A New Robust Approach for Reversible Database Watermarking with Distortion Control.
IEEE Trans. Knowl. Data Eng., 2019

Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multim. Tools Appl., 2019

Intelligent digital image firewall system for filtering privacy or sensitive images.
Cogn. Syst. Res., 2019

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning.
IEEE Access, 2019

New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization.
IEEE Signal Process. Lett., 2018

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control.
Multim. Tools Appl., 2018

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks.
IEEE Access, 2018

2017
Coverless Information Hiding Based on Robust Image Hashing.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
Lossless data hiding algorithm for encrypted images with high capacity.
Multim. Tools Appl., 2016

2015
Security and privacy protocols for perceptual image hashing.
Int. J. Sens. Networks, 2015

2013
Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Secure Architecture and Protocols for Robust Perceptual Hashing.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013


  Loading...