Zhiliang Zhu

Orcid: 0000-0003-3422-5585

Affiliations:
  • Northeastern University, Software College, Shenyang, China


According to our database1, Zhiliang Zhu authored at least 115 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward.
IEEE Trans. Software Eng., 2023

Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem.
IEEE Trans. Software Eng., 2023

Toward Wearable Sensors: Advances, Trends, and Challenges.
ACM Comput. Surv., 2023

Can Machine Learning Pipelines Be Better Configured?
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

2022
Will Dependency Conflicts Affect My Program's Semantics?
IEEE Trans. Software Eng., 2022

Joint Security and Energy-Efficient Cooperative Architecture for 5G Underlaying Cellular Networks.
Symmetry, 2022

Devising optimal integration test orders using cost-benefit analysis.
Frontiers Inf. Technol. Electron. Eng., 2022

$\hbox {ABDF}^{2}$-Net: an adaptive bi-directional features fusion network for real-time detection of threat object.
J. Real Time Image Process., 2022

An Image Encryption Algorithm Based on an Epidemic Spreading Model.
Int. J. Bifurc. Chaos, 2022

Weighted zigzag decodable fountain codes for unequal error protection.
IET Commun., 2022

Duplicated zigzag decodable fountain codes with the unequal error protection property.
Comput. Commun., 2022

Insight: Exploring Cross-Ecosystem Vulnerability Impacts.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
Superpixels With Content-Adaptive Criteria.
IEEE Trans. Image Process., 2021

An ultrahigh-resolution image encryption algorithm using random super-pixel strategy.
Multim. Tools Appl., 2021

AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening.
J. Real Time Image Process., 2021

An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution.
J. Real Time Image Process., 2021

HERO: On the Chaos When PATH Meets Modules.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Watershed-Based Superpixels With Global and Local Boundary Marching.
IEEE Trans. Image Process., 2020

A novel compressive sensing-based framework for image compression-encryption with S-box.
Multim. Tools Appl., 2020

An Image Encryption Algorithm Based on Random Hamiltonian Path.
Entropy, 2020

A Naming Game-Based Method for the Location of Information Source in Social Networks.
Complex., 2020

Unified Quantile Regression Deep Neural Network with Time-Cognition for Probabilistic Residential Load Forecasting.
Complex., 2020

Watchman: monitoring dependency conflicts for Python library ecosystem.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding.
Multim. Tools Appl., 2019

A Symmetric Image Encryption Algorithm Based on a Coupled Logistic-Bernoulli Map and Cellular Automata Diffusion Strategy.
Entropy, 2019

Evolutionary Game Dynamics of the Competitive Information Propagation on Social Networks.
Complex., 2019

Hot Topic Detection Based on a Refined TF-IDF Algorithm.
IEEE Access, 2019

Efficient Feature Selection Algorithm Based on Particle Swarm Optimization With Learning Memory.
IEEE Access, 2019

Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture.
IEEE Access, 2019

Multi-Scale Convolutional Neural Network With Time-Cognition for Multi-Step Short-Term Load Forecasting.
IEEE Access, 2019

Could I have a stack trace to examine the dependency conflict issue?
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Automatic Software Refactoring via Weighted Clustering in Method-Level Networks.
IEEE Trans. Software Eng., 2018

Risk Analysis on Multi-Granular Flow Network for Software Integration Testing.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion.
Signal Process., 2018

Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption.
Signal Process., 2018

Using reliability risk analysis to prioritize test cases.
J. Syst. Softw., 2018

Improved online fountain codes.
IET Commun., 2018

SSCSMA-based random relay selection scheme for large-scale relay networks.
Comput. Commun., 2018

Hybrid method combining superpixel, random walk and active contour model for fast and accurate liver segmentation.
Comput. Medical Imaging Graph., 2018

The construction of Chinese microblog gender-specific thesauruses and user gender classification.
Appl. Netw. Sci., 2018

A Dynamic Personalized News Recommendation System Based on BAP User Profiling Method.
IEEE Access, 2018

Do the dependency conflicts in my project matter?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

A Collaborative Telemedicine Platform Focusing on Paranasal Sinus Segmentation.
Proceedings of the Intelligent Interactive Multimedia Systems and Services, 2018

Advanced Transmission Methods Applied in Remote Consultation and Diagnosis Platform.
Proceedings of the Intelligent Interactive Multimedia Systems and Services, 2018

2017
Analysis of the Dynamic Influence of Social Network Nodes.
Sci. Program., 2017

Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation.
IEEE Access, 2017

A distributed energy-efficient cooperative routing algorithm based on optimal power allocation.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Wind turbine gearbox condition monitoring based on extreme gradient boosting.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Relative health index of wind turbines based on kernel density estimation.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Anticipatory Runway Incursion Prevention Based on Inaccurate Position Surveillance Information.
Proceedings of the Intelligent Information and Database Systems - 9th Asian Conference, 2017

2016
Image encryption based on three-dimensional bit matrix permutation.
Signal Process., 2016

A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system.
Int. J. Comput. Sci. Eng., 2016

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System.
Entropy, 2016

Collaborative Contextual Anomaly Detection for Industrial Equipment Groups.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Wind Turbine Dynamic State Prediction Method Based on the Similarity of Historical Data.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Remote and collaborative medical image visualization computing platform.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
Signal Process., 2015

Prevention of Fault Propagation in Web Service: a Complex Network Approach.
J. Web Eng., 2015

Generation of Luby Transform Codes with Low Redundancy.
Int. J. Bifurc. Chaos, 2015

A Community-Based Approach to Identifying Influential Spreaders.
Entropy, 2015

An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach.
Commun. Nonlinear Sci. Numer. Simul., 2015

A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
Fast Single Image Super-Resolution via Self-Example Learning and Sparse Representation.
IEEE Trans. Multim., 2014

Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning.
J. Comput., 2014

Modelling, analysis and containment of passive worms in P2P networks.
Int. J. Internet Protoc. Technol., 2014

A Multiaddress Co-Chaos Shift Keying Communication Scheme and Performance Analysis.
Int. J. Bifurc. Chaos, 2014

Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Integral sliding mode controller design for congestion problem in ATM networks.
Int. J. Control, 2013

Anticipatory Runway Incursion Prevention Systems.
IEICE Trans. Inf. Syst., 2013

A correlation context-aware approach for composite service selection.
Concurr. Comput. Pract. Exp., 2013

Study on energy-consumption regularities of cloud computing systems by a novel evaluation model.
Computing, 2013

An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2013

A symmetric color image encryption algorithm using the intrinsic features of bit distributions.
Commun. Nonlinear Sci. Numer. Simul., 2013

An efficient and secure medical image protection scheme based on chaotic maps.
Comput. Biol. Medicine, 2013

Personalized Quality Prediction for Dynamic Service Management Based on Invocation Patterns.
Proceedings of the Service-Oriented Computing - 11th International Conference, 2013

Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for Localization.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Anticipatory Emergency Elevator Evacuation Systems.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
Scale-Free Luby Transform Codes.
Int. J. Bifurc. Chaos, 2012

Building an Optimal Service Environment for ASBS Based on Pareto Dominance.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Introducing SaaS Capabilities to Existing Web-Based Applications Automatically.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
A chaos-based symmetric image encryption scheme using a bit-level permutation.
Inf. Sci., 2011

Long-Term Benefit Driven Adaptation in Service-Based Software Systems.
Proceedings of the IEEE International Conference on Web Services, 2011

A Petri Net Based Hybrid Optimal Controller for Deadlock Prevention in Web Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2011

Practice in Compound Practical Teaching Method for Information Security Major.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

QoS Cube: Management and Navigating Web Services through Multi-dimensional Model.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

A Deduced SaaS Lifecycle Model Based on Roles and Activities.
Proceedings of the Advances in Computing and Communications, 2011

Exception Diagnosis for Composite Service Based on Error Propagation Degree.
Proceedings of the IEEE International Conference on Services Computing, 2011

SLA Based Dynamic Virtualized Resources Provisioning for Shared Cloud Data Centers.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

A SaaSify Tool for Converting Traditional Web-Based Applications to SaaS Application.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

Navigating Measurements by Cross-Classifications in Multi-use Data Warehouse.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Web Service Composition Based on QoS Rules.
J. Comput. Sci. Technol., 2010

The Design of Serial ATA Bus Control Chip.
J. Comput., 2010

Web Service Publication and Discovery Architecture Based on JXTA.
Proceedings of the International Conference on Service Sciences, 2010

Two-Stage Adaptation for Dependable Service-Oriented System.
Proceedings of the International Conference on Service Sciences, 2010

Logic basis for anticipatory reasoning-reacting systems with three-dimensional moving objects.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Fault-Tolerant Service Composition Based on Low Cost Mechanism.
Proceedings of the Information Computing and Applications - International Conference, 2010

Smart Location-Aware Service Platform for Business Operation.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

An Adaptive Replanning Mechanism for Dependable Service-Based Systems.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-Peer Service Networks.
Proceedings of the E-business Technology and Strategy - International Conference, 2010

A Web Service QoS Prediction Approach Based on Collaborative Filtering.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Composite Service Selection Based on Dot Pattern Mining.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

An image denoising method by using hybrid fractal-wavelet coding.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A Method of QoS Measurement Based on User Behavior Analysis.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Research and Application on Automatic Network Topology Discovery in ITSM System.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

An Improved Network Topology Auto-layout Solution Based on Force-Directed Placement.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
A new approach to generalized chaos synchronization based on the stability of the error system.
Kybernetika, 2008

Research and Analysis of Securities Market based on Multi-Fractal Generator.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Improved Image Encryption Algorithm Based on Chaos.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Chaotic Dynamical Model for Internet Traffic.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
An Improved Chaos-Based Stream Cipher Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Algorithm of Signal De-noising by Using Wavelet Analysis.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006


  Loading...