Zhili Zhou
Orcid: 0000-0002-5641-7169Affiliations:
- Guangzhou University, Institute of Artificial Intelligence, Guangdong Key Laboratory of Blockchain Security, China
- Nanjing University of Information Science and Technology, School of Computer and Software, China
- University of Windsor, Department of Electrical and Computer Engineering, Canada
- Hunan University, School of Information Science and Engineering, China (2014)
According to our database1,
Zhili Zhou
authored at least 94 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Artif. Intell., April, 2025
Evidencing Unauthorized Training Data from AI Generated Content using Information Isotopes.
CoRR, March, 2025
IEEE Trans. Inf. Forensics Secur., 2025
Side-Channel Attacks and New Principles in the Shuffle Model of Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2025
Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2025
Compressed Domain Invariant Adversarial Representation Learning for Robust Audio Deepfake Detection.
IEEE Signal Process. Lett., 2025
Pattern Recognit., 2025
Dual-Population Watermark Vaccine: Efficient and Imperceptible Adversarial Attack for Watermarked Image Protection.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
TGCA: A Transformer GNN-based Approach with Cross-Attention Mechanism for Steganographic Text Detection in Social Networks.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
SCF-Stega: Controllable Linguistic Steganography Based on Semantic Communications Framework.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
SECC-Stega: Generative Linguistic Steganographic Framework Based on Error Correcting Codes.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
DAEF-VS: An Efficient Universal VoIP Steganalysis Framework Based on Domain-Aware Knowledge.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
STLC-KG: A Social Text Steganalysis Method Combining Large-Scale Language Models and Common-Sense Knowledge Graphs.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
IEEE Trans. Mob. Comput., August, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
RTRGAN: Ridge Texture Rendering-Based Generative Adversarial Fingerprint Attack for Portable Consumer Electronics Devices.
IEEE Trans. Consumer Electron., August, 2024
Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications.
IEEE Trans. Consumer Electron., February, 2024
Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks.
IEEE Trans. Wirel. Commun., January, 2024
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic.
Neural Comput. Appl., January, 2024
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024
IEEE Trans. Multim., 2024
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Engineering Management, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IET Biom., 2024
Comput. J., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model.
Proceedings of the Artificial Intelligence Security and Privacy, 2024
Proceedings of the Artificial Intelligence Security and Privacy, 2024
2023
J. Inf. Secur. Appl., August, 2023
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023
Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos.
IEEE Trans. Image Process., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023
Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System.
IEEE Trans. Intell. Transp. Syst., 2022
Spatio-Temporal Feature Encoding for Traffic Accident Detection in VANET Environment.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022
CoRR, 2022
2021
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search.
IEEE Trans. Big Data, 2021
Secur. Commun. Networks, 2021
Residual visualization-guided explainable copy-relationship learning for image copy detection in social networks.
Knowl. Based Syst., 2021
Geometric rectification-based neural network architecture for image manipulation detection.
Int. J. Intell. Syst., 2021
Future Gener. Comput. Syst., 2021
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
2020
Minimizing Redundancy to Satisfy Reliability Requirement for a Parallel Application on Heterogeneous Service-Oriented Systems.
IEEE Trans. Serv. Comput., 2020
Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search.
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020
Real-time image carrier generation based on generative adversarial network and fast object detection.
J. Real Time Image Process., 2020
EURASIP J. Image Video Process., 2020
Privacy-aware Cold-Start Recommendation based on Collaborative Filtering and Enhanced Trust.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020
2019
Soft Comput., 2019
Secur. Commun. Networks, 2019
Original image tracing with image relational graph for near-duplicate image elimination.
Int. J. Comput. Sci. Eng., 2019
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019
IEEE Access, 2019
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019
Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019
A Location and Intention Oriented Recommendation Method for Accuracy Enhancement over Big Data.
Proceedings of the Mobile Computing, Applications, and Services, 2019
2018
An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment.
Sensors, 2018
Pers. Ubiquitous Comput., 2018
Pattern Recognit. Lett., 2018
Int. J. Embed. Syst., 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Sci. Program., 2017
J. Syst. Archit., 2017
Int. J. Distributed Sens. Networks, 2017
"Time-Location-Frequency"-aware Internet of things service selection based on historical records.
Int. J. Distributed Sens. Networks, 2017
Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering.
IEICE Trans. Inf. Syst., 2017
2016
IEICE Trans. Inf. Syst., 2016
Digit. Signal Process., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
2014
A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
2013
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
J. Syst. Softw., 2013