default search action
Shuli Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Donghui Hu, Qing Wang, Song Yan, Xiaojun Liu, Meng Li, Shuli Zheng:
Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing. ACM Trans. Database Syst. 48(2): 5:1-5:25 (2023) - 2022
- [j18]Shuli Zheng, Yuyan Shen, Luming Liu:
Knowledge Management Capability, Organizational Resilience, and the Growth of SMEs. Int. J. Distributed Syst. Technol. 13(4): 1-15 (2022) - [j17]Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - 2021
- [j16]Donghui Hu, Yifan Li, Lixuan Pan, Meng Li, Shuli Zheng:
A blockchain-based trading system for big data. Comput. Networks 191: 107994 (2021) - [j15]Tao Hong, Mingming Lv, Shuli Zheng, Haohui Hong:
Key Technologies in 6G SAGS IoT: Shape-Adaptive Antenna and Radar-Communication Integration. IEEE Netw. 35(5): 150-157 (2021) - [j14]Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-Qiu Zhao:
An improved steganography without embedding based on attention GAN. Peer-to-Peer Netw. Appl. 14(3): 1446-1457 (2021) - [j13]Tao Hong, Shuli Zheng, Rongke Liu, Weiting Zhao:
Design of mmWave Directional Antenna for Enhanced 5G Broadcasting Coverage. Sensors 21(3): 746 (2021) - [j12]Shuli Zheng, Yuzhao Wang, Donghui Hu:
Lossless Data Hiding Based on Homomorphic Cryptosystem. IEEE Trans. Dependable Secur. Comput. 18(2): 692-705 (2021) - [j11]Shuli Zheng:
Research on the Effect of Knowledge Network Embedding on the Dynamic Capabilities of Small and Micro Enterprises. Wirel. Commun. Mob. Comput. 2021: 5522788:1-5522788:13 (2021) - [c11]Song Yan, Shuli Zheng, Baohong Ling, Donghui Hu:
Lossless Database Watermarking Based on Order-preserving Encryption. ACM TUR-C 2021: 216-223 - [c10]Yifei Chen, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti:
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services. STM 2021: 43-61 - 2020
- [j10]Hangyu Chen, Jingcheng Zhao, Tao Hong, Shuli Zheng, Haohui Hong, Mohamed Cheriet:
A measurement method of fifth-generation multiple-input multiple-output antenna based on microwave imaging. Int. J. Distributed Sens. Networks 16(6): 155014772093714 (2020) - [c9]Hangyu Chen, Jingcheng Zhao, Tao Hong, Tao Tang, Shuli Zheng, Xu Chao:
Microwave One-dimensional Imaging Measurement in 5G MIMO. BMSB 2020: 1-4 - [c8]Shuli Zheng, Tao Hong, Fanjie Meng, Haohui Hong:
The Design of Antenna for Tunnel Broadcasting Based on SIW Technology. BMSB 2020: 1-4 - [c7]Pengfei Shi, Donghui Hu, Yuchen Li, Shuli Zheng, Zhongqiu Zhao:
A Novel Approach of Steganalysis to Deal with Steganographic Algorithm Mismatch. ICIC (1) 2020: 413-422 - [c6]Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. ICICS 2020: 350-365 - [c5]Shuli Zheng, Lixuan Pan, Donghui Hu, Meng Li, Yuqi Fan:
A Blockchain-Based Trading Platform for Big Data. INFOCOM Workshops 2020: 991-996
2010 – 2019
- 2019
- [j9]Donghui Hu, Shengnan Zhou, Qiang Shen, Shuli Zheng, Zhongqiu Zhao, Yuqi Fan:
Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning. IEEE Access 7: 25924-25935 (2019) - [j8]Donghui Hu, Xiaoxia Hu, Wenjie Jiang, Shuli Zheng, Zhong-Qiu Zhao:
Intelligent digital image firewall system for filtering privacy or sensitive images. Cogn. Syst. Res. 53: 85-97 (2019) - [j7]Donghui Hu, Zhongjin Ma, Yuqi Fan, Shuli Zheng, Dengpan Ye, Lina Wang:
Study on the interaction between the cover source mismatch and texture complexity in steganalysis. Multim. Tools Appl. 78(6): 7643-7666 (2019) - [j6]Donghui Hu, Dan Zhao, Shuli Zheng:
A New Robust Approach for Reversible Database Watermarking with Distortion Control. IEEE Trans. Knowl. Data Eng. 31(6): 1024-1037 (2019) - [c4]Hui Ge, Donghui Hu, Haiyan Xu, Meng Li, Shuli Zheng:
New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization. IWDW 2019: 337-351 - 2018
- [j5]Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, Bin Li:
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. IEEE Access 6: 38303-38314 (2018) - [j4]Xiaoxia Hu, Donghui Hu, Shuli Zheng, Wangwang Li, Fan Chen, Zhaopin Shu, Lina Wang:
How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multim. Tools Appl. 77(14): 18163-18185 (2018) - [j3]Donghui Hu, Haiyan Xu, Zhongjin Ma, Shuli Zheng, Bin Li:
A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization. IEEE Signal Process. Lett. 25(9): 1364-1368 (2018) - 2017
- [c3]Shuli Zheng, Liang Wang, Baohong Ling, Donghui Hu:
Coverless Information Hiding Based on Robust Image Hashing. ICIC (3) 2017: 536-547 - 2016
- [j2]Shuli Zheng, Dandan Li, Donghui Hu, Dengpan Ye, Lina Wang, Jinwei Wang:
Lossless data hiding algorithm for encrypted images with high capacity. Multim. Tools Appl. 75(21): 13765-13778 (2016) - 2015
- [j1]Donghui Hu, Bin Su, Shuli Zheng, Zhong-Qiu Zhao, Xintao Wu, Xindong Wu:
Security and privacy protocols for perceptual image hashing. Int. J. Sens. Networks 17(3): 146-162 (2015) - 2013
- [c2]Jiajia Zhang, Shuli Zheng, Donghui Hu, Yunling Zhang:
Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions. CIS 2013: 545-549 - [c1]Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang:
Secure Architecture and Protocols for Robust Perceptual Hashing. CIS 2013: 550-554
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint