Zhili Zhou

Orcid: 0000-0002-5641-7169

Affiliations:
  • Guangzhou University, Institute of Artificial Intelligence, Guangdong Key Laboratory of Blockchain Security, China
  • Nanjing University of Information Science and Technology, School of Computer and Software, China
  • University of Windsor, Department of Electrical and Computer Engineering, Canada
  • Hunan University, School of Information Science and Engineering, China (2014)


According to our database1, Zhili Zhou authored at least 94 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DGeC: Dynamically and Globally Enhanced Convolution.
IEEE Trans. Artif. Intell., April, 2025

Evidencing Unauthorized Training Data from AI Generated Content using Information Isotopes.
CoRR, March, 2025

Efficient Streaming Voice Steganalysis in Challenging Detection Scenarios.
IEEE Trans. Inf. Forensics Secur., 2025

Side-Channel Attacks and New Principles in the Shuffle Model of Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2025

Google Map-Based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2025

Compressed Domain Invariant Adversarial Representation Learning for Robust Audio Deepfake Detection.
IEEE Signal Process. Lett., 2025

A trigger-perceivable backdoor attack framework driven by image steganography.
Pattern Recognit., 2025

Dual-Population Watermark Vaccine: Efficient and Imperceptible Adversarial Attack for Watermarked Image Protection.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

TGCA: A Transformer GNN-based Approach with Cross-Attention Mechanism for Steganographic Text Detection in Social Networks.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

SCF-Stega: Controllable Linguistic Steganography Based on Semantic Communications Framework.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

SECC-Stega: Generative Linguistic Steganographic Framework Based on Error Correcting Codes.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

DAEF-VS: An Efficient Universal VoIP Steganalysis Framework Based on Domain-Aware Knowledge.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

STLC-KG: A Social Text Steganalysis Method Combining Large-Scale Language Models and Common-Sense Knowledge Graphs.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation.
IEEE Trans. Mob. Comput., August, 2024

Generative Steganography Based on Long Readable Text Generation.
IEEE Trans. Comput. Soc. Syst., August, 2024

RTRGAN: Ridge Texture Rendering-Based Generative Adversarial Fingerprint Attack for Portable Consumer Electronics Devices.
IEEE Trans. Consumer Electron., August, 2024

Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications.
IEEE Trans. Consumer Electron., February, 2024

Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks.
IEEE Trans. Wirel. Commun., January, 2024

A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic.
Neural Comput. Appl., January, 2024

Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024

ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning.
IEEE Trans. Multim., 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Reliable and Sustainable Product Evaluation Management System Based on Blockchain.
IEEE Trans. Engineering Management, 2024

Meta Security Metric Learning for Secure Deep Image Hiding.
IEEE Trans. Dependable Secur. Comput., 2024

An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection.
IET Biom., 2024

Efficient object detector via dynamic prior and dynamic feature fusion.
Comput. J., 2024

Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model.
Proceedings of the Artificial Intelligence Security and Privacy, 2024

Lightweight Attention-CycleGAN for Nighttime-Daytime Image Transformation.
Proceedings of the Artificial Intelligence Security and Privacy, 2024

2023
Dual efficient reversible data hiding using Hamming code and OPAP.
J. Inf. Secur. Appl., August, 2023

Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023

GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Sequential Order-Aware Coding-Based Robust Subspace Clustering for Human Action Recognition in Untrimmed Videos.
IEEE Trans. Image Process., 2023

Generative Steganography via Auto-Generation of Semantic Object Contours.
IEEE Trans. Inf. Forensics Secur., 2023

Secret-to-Image Reversible Transformation for Generative Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

Deepfake Fingerprint Detection Model Intellectual Property Protection via Ridge Texture Enhancement.
IEEE Signal Process. Lett., 2023

Geometric correction code-based robust image watermarking.
IET Image Process., 2023

GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023

Towards Heterogeneous Federated Learning: Analysis, Solutions, and Future Directions.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Blockchain in Big Data Security for Intelligent Transportation With 6G.
IEEE Trans. Intell. Transp. Syst., 2022

A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System.
IEEE Trans. Intell. Transp. Syst., 2022

Spatio-Temporal Feature Encoding for Traffic Accident Detection in VANET Environment.
IEEE Trans. Intell. Transp. Syst., 2022

Improving Generalization by Commonality Learning in Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022

Auto-Focus Contrastive Learning for Image Manipulation Detection.
CoRR, 2022

Secret-to-Image Reversible Transformation for Generative Steganography.
CoRR, 2022

Learning Hierarchical Graph Representation for Image Manipulation Detection.
CoRR, 2022

2021
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search.
IEEE Trans. Big Data, 2021

Improved CNN-Based Hashing for Encrypted Image Retrieval.
Secur. Commun. Networks, 2021

Residual visualization-guided explainable copy-relationship learning for image copy detection in social networks.
Knowl. Based Syst., 2021

Geometric rectification-based neural network architecture for image manipulation detection.
Int. J. Intell. Syst., 2021

Blockchain-based decentralized reputation system in E-commerce environment.
Future Gener. Comput. Syst., 2021

Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

A Novel Approach for DDoS Attack Detection Using Big Data and Machine Learning.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021

2020
Minimizing Redundancy to Satisfy Reliability Requirement for a Parallel Application on Heterogeneous Service-Oriented Systems.
IEEE Trans. Serv. Comput., 2020

Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020

Real-time image carrier generation based on generative adversarial network and fast object detection.
J. Real Time Image Process., 2020

Coverless information hiding based on the generation of anime characters.
EURASIP J. Image Video Process., 2020

Privacy-aware Cold-Start Recommendation based on Collaborative Filtering and Enhanced Trust.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

2019
Coverless image steganography using partial-duplicate image retrieval.
Soft Comput., 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Secur. Commun. Networks, 2019

Original image tracing with image relational graph for near-duplicate image elimination.
Int. J. Comput. Sci. Eng., 2019

Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019

Boolean Operation Based Visual Cryptography.
IEEE Access, 2019

Video Copy Detection Using Spatio-Temporal CNN Features.
IEEE Access, 2019

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment.
IEEE Access, 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

A Location and Intention Oriented Recommendation Method for Accuracy Enhancement over Big Data.
Proceedings of the Mobile Computing, Applications, and Services, 2019

2018
An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment.
Sensors, 2018

Hybrid computation offloading for smart home automation in mobile cloud computing.
Pers. Ubiquitous Comput., 2018

Encoding multiple contextual clues for partial-duplicate image retrieval.
Pattern Recognit. Lett., 2018

MCRS: A course recommendation system for MOOCs.
Multim. Tools Appl., 2018

Spatial descriptor embedding for near-duplicate image retrieval.
Int. J. Embed. Syst., 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

2017
Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Inf. Forensics Secur., 2017

An Invocation Cost Optimization Method for Web Services in Cloud Environment.
Sci. Program., 2017

An optimized design of CAN FD for automotive cyber-physical systems.
J. Syst. Archit., 2017

Fast and accurate near-duplicate image elimination for visual sensor networks.
Int. J. Distributed Sens. Networks, 2017

"Time-Location-Frequency"-aware Internet of things service selection based on historical records.
Int. J. Distributed Sens. Networks, 2017

Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering.
IEICE Trans. Inf. Syst., 2017

2016
Time-Aware IoE Service Recommendation on Sparse Data.
Mob. Inf. Syst., 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Trans. Inf. Syst., 2016

Essential secret image sharing scheme with the same size of shadows.
Digit. Signal Process., 2016

Coverless Information Hiding Method Based on Multi-keywords.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Coverless Image Steganography Without Embedding.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Coverless Information Hiding Method Based on the Chinese Mathematical Expression.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
J. Syst. Softw., 2013


  Loading...