Zhili Zhou

According to our database1, Zhili Zhou authored at least 85 papers between 2003 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Coverless image steganography using partial-duplicate image retrieval.
Soft Comput., 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Security and Communication Networks, 2019

Implementing real-time RCF-Retinex image enhancement method using CUDA.
J. Real-Time Image Processing, 2019

Partial-duplicate image retrieval based on HSV colour space for coverless information hiding.
IJCSE, 2019

Original image tracing with image relational graph for near-duplicate image elimination.
IJCSE, 2019

Working capital optimization in a supply chain perspective.
European Journal of Operational Research, 2019

Two heuristics for the capacitated multi-period cutting stock problem with pattern setup cost.
Computers & OR, 2019

A bi-objective model for location planning of electric vehicle charging stations with GPS trajectory data.
Computers & Industrial Engineering, 2019

Video Copy Detection Using Spatio-Temporal CNN Features.
IEEE Access, 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

Network Community Detection Based on the Physarum-Inspired Computational Framework.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Image contrast enhancement using an artificial bee colony algorithm.
Swarm and Evolutionary Computation, 2018

Multiple dictionary pairs learning and sparse representation-based infrared image super-resolution with improved fuzzy clustering.
Soft Comput., 2018

Retinex-based image enhancement framework by using region covariance filter.
Soft Comput., 2018

An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment.
Sensors, 2018

Hybrid computation offloading for smart home automation in mobile cloud computing.
Personal and Ubiquitous Computing, 2018

Encoding multiple contextual clues for partial-duplicate image retrieval.
Pattern Recognition Letters, 2018

MCRS: A course recommendation system for MOOCs.
Multimedia Tools Appl., 2018

Pairwise IPVO-based reversible data hiding.
Multimedia Tools Appl., 2018

Enhancing heterogeneous similarity estimation via neighborhood reversibility.
Multimedia Tools Appl., 2018

New SMVQ scheme with exactly the same PSNR of VQ by introducing extend state codebook.
Multimedia Tools Appl., 2018

Deriving heterogeneous experts weights from incomplete linguistic preference relations based on uninorm consistency.
Knowl.-Based Syst., 2018

A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network.
J. Inf. Sci. Eng., 2018

A discriminative multi-class feature selection method via weighted l2, 1-norm and Extended Elastic Net.
Neurocomputing, 2018

Spatial descriptor embedding for near-duplicate image retrieval.
IJES, 2018

Multi-scale image fusion through rolling guidance filter.
Future Generation Comp. Syst., 2018

Modeling the minimum cost consensus problem in an asymmetric costs context.
European Journal of Operational Research, 2018

A new aspect on P2P online lending default prediction using meta-level phone usage data in China.
Decision Support Systems, 2018

Combined cutting stock and lot-sizing problem with pattern setup.
Computers & OR, 2018

Complex network measurement and optimization of Chinese domestic movies with internet of things technology.
Computers & Electrical Engineering, 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

Robust Virtual Network Function Provisioning Under Random Failures on Network Function Enabled Nodes.
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018

NFV-Enabled Network Slicing.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks.
Wireless Communications and Mobile Computing, 2017

Novel Survivable Logical Topology Routing by Logical Protecting Spanning Trees in IP-Over-WDM Networks.
IEEE/ACM Trans. Netw., 2017

Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Information Forensics and Security, 2017

Local Adaptive Binary Patterns Using Diamond Sampling Structure for Texture Classification.
IEEE Signal Process. Lett., 2017

An Invocation Cost Optimization Method for Web Services in Cloud Environment.
Scientific Programming, 2017

Multi-sensor image super-resolution with fuzzy cluster by using multi-scale and multi-view sparse coding for infrared image.
Multimedia Tools Appl., 2017

A novel scheme for infrared image enhancement by using weighted least squares filter and fuzzy plateau histogram equalization.
Multimedia Tools Appl., 2017

Optimal PPVO-based reversible data hiding.
J. Visual Communication and Image Representation, 2017

An optimized design of CAN FD for automotive cyber-physical systems.
Journal of Systems Architecture - Embedded Systems Design, 2017

A novel prediction model based on particle swarm optimization and adaptive neuro-fuzzy inference system.
Journal of Intelligent and Fuzzy Systems, 2017

Group prioritisation with unknown expert weights in incomplete linguistic context.
Int. J. Systems Science, 2017

Ordinal pyramid coding for rotation invariant feature extraction.
Neurocomputing, 2017

Fast and accurate near-duplicate image elimination for visual sensor networks.
IJDSN, 2017

"Time-Location-Frequency"-aware Internet of things service selection based on historical records.
IJDSN, 2017

Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering.
IEICE Transactions, 2017

Naturalization of Screen Content Images for Enhanced Quality Evaluation.
IEICE Transactions, 2017

A novel search method based on artificial bee colony algorithm for block motion estimation.
EURASIP J. Image and Video Processing, 2017

Blind sequence detection using reservoir computing.
Digital Signal Processing, 2017

CLASS: Collaborative Low-Rank and Sparse Separation for Moving Object Detection.
Cognitive Computation, 2017

Time-Aware IoE Service Recommendation on Sparse Data.
Mobile Information Systems, 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Transactions, 2016

Essential secret image sharing scheme with the same size of shadows.
Digital Signal Processing, 2016

Improved Reversible Image Authentication Scheme.
Cognitive Computation, 2016

Coverless Information Hiding Method Based on Multi-keywords.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Original Image Tracing with Image Relational Graph for Near-Duplicate Image Elimination.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

The design of tractor CAN bus intelligent node based on dual-core processor.
IJGUC, 2015

A Lagrangean Relaxation Approach for a Two-Stage Capacitated Facility Location Problem with Choice of Facility Size.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

A lagrangean relaxation approach for a two-stage capacitated facility location problem with choice of depot size.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

Coverless Image Steganography Without Embedding.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Coverless Information Hiding Method Based on the Chinese Mathematical Expression.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Survivable cloud network mapping with multiple failures.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Optimal Network Function Virtualization Realizing End-to-End Requests.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A novel signature based on the combination of global and local signatures for image copy detection.
Security and Communication Networks, 2014

Knowledge diffusion path analysis of data quality literature: A main path analysis.
J. Informetrics, 2014

Parallel machines scheduling with simple linear job deterioration and non-simultaneous machine available times.
Computers & Industrial Engineering, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

An inventory control and pricing model for smart building load management.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
Journal of Systems and Software, 2013

Several flow shop scheduling problems with truncated position-based learning effect.
Computers & OR, 2013

Two-stage stochastic lot-sizing problem under cost uncertainty.
Annals OR, 2013

The crane scheduling problem: models and solution approaches.
Annals OR, 2013

Optimum logical topology routing in an IP-over-WDM optical network and physical link failure localization: An integrated approach.
Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2013

Optimal relay node placement in wireless sensor network for smart buildings metering and control.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

Optimal cyclic single crane scheduling for two parallel train oilcan repairing lines.
Computers & OR, 2012

Novel survivable logical topology routing in IP-over-WDM networks by logical protecting spanning tree set.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Robustness of logical topology mapping algorithms for survivability against multiple failures in an IP-over-WDM optical network.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Logical topology survivability in IP-over-WDM networks: Survivable lightpath routing for maximum logical topology capacity and minimum spare capacity requirements.
Proceedings of the 8th International Workshop on the Design of Reliable Communication Networks, 2011

Stochastic lot-sizing problem with deterministic demands and Wagner-Whitin costs.
Oper. Res. Lett., 2010

The production scheduling problem in a multi-page invoice printing system.
Computers & OR, 2010

A solution for cyclic scheduling of multi-hoists without overlapping.
Annals OR, 2009

Single hoist cyclic scheduling with multiple tanks: a material handling solution.
Computers & OR, 2003