default search action
Zhiliang Zhu 0001
Person information
- affiliation: Northeastern University, Software College, Shenyang, China
Other persons with the same name
- Zhiliang Zhu — disambiguation page
- Zhiliang Zhu 0002 — U. S. Geological Survey, Reston, VA, USA (and 1 more)
- Zhiliang Zhu 0003 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Zhiliang Zhu 0004 — Wenzhou University, Wenzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Wei Zhang, Guangdong Zhu, Meng Xing, Jingjing Yang, Hai Yu, Zhiliang Zhu:
A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption. Entropy 26(9): 760 (2024) - [j67]Yingli Hou, Wei Zhang, Zhiliang Zhu, Hai Yu:
Language-vision matching for text-to-image synthesis with context-aware GAN. Expert Syst. Appl. 255: 124615 (2024) - [j66]Meng Xing, Hai Yu, Wei Zhang, Zhiliang Zhu:
A Hierarchical Multiscenario H.265/HEVC Video Encryption Scheme. Int. J. Bifurc. Chaos 34(1): 2450013:1-2450013:17 (2024) - [j65]Fanyi Meng, Hai Yu, Chun Yong Chong, Ying Wang, Zhiliang Zhu:
Automated construction of reference model for software remodularization through software evolution. J. Softw. Evol. Process. 36(10) (2024) - [j64]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Hai Yu, Zhiliang Zhu, Bin Zhang:
Expanding-Window Zigzag Decodable Fountain Codes for Scalable Multimedia Transmission. ACM Trans. Multim. Comput. Commun. Appl. 20(8): 248:1-248:24 (2024) - [c54]Xiaohu Song, Ying Wang, Xiao Cheng, Guangtai Liang, Qianxiang Wang, Zhiliang Zhu:
Efficiently Trimming the Fat: Streamlining Software Dependencies with Java Reflection and Dependency Analysis. ICSE 2024: 103:1-103:12 - [c53]Fanyi Meng, Ying Wang, Chun Yong Chong, Hai Yu, Zhiliang Zhu:
CLUE: Customizing clustering techniques using machine learning for software modularization. Internetware 2024 - 2023
- [j63]Tongyue He, Junxin Chen, Ben-Guo He, Wei Wang, Zhiliang Zhu, Zhihan Lv:
Toward Wearable Sensors: Advances, Trends, and Challenges. ACM Comput. Surv. 55(14s): 333:1-333:35 (2023) - [j62]Ying Wang, Yibo Wang, Sinan Wang, Yepang Liu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. IEEE Trans. Software Eng. 49(1): 185-210 (2023) - [j61]Ying Wang, Peng Sun, Lin Pei, Yue Yu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem. IEEE Trans. Software Eng. 49(5): 3155-3181 (2023) - [c52]Yibo Wang, Ying Wang, Tingwei Zhang, Yue Yu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Can Machine Learning Pipelines Be Better Configured? ESEC/SIGSOFT FSE 2023: 463-475 - 2022
- [j60]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Zhiliang Zhu, Hai Yu:
Duplicated zigzag decodable fountain codes with the unequal error protection property. Comput. Commun. 185: 66-78 (2022) - [j59]Yin Zhang, Yuli Zhao, Francis C. M. Lau, Bin Zhang, Zhiliang Zhu, Hai Yu:
Weighted zigzag decodable fountain codes for unequal error protection. IET Commun. 16(17): 2082-2090 (2022) - [j58]Wei Zhang, Shuwen Wang, Guangdong Zhu, Weijie Han, Zhiliang Zhu:
An Image Encryption Algorithm Based on an Epidemic Spreading Model. Int. J. Bifurc. Chaos 32(10): 2250142:1-2250142:19 (2022) - [j57]Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang:
$\hbox {ABDF}^{2}$-Net: an adaptive bi-directional features fusion network for real-time detection of threat object. J. Real Time Image Process. 19(4): 739-749 (2022) - [j56]Fanyi Meng, Ying Wang, Hai Yu, Zhiliang Zhu:
Devising optimal integration test orders using cost-benefit analysis. Frontiers Inf. Technol. Electron. Eng. 23(5): 692-714 (2022) - [j55]Li Guo, Zhiliang Zhu, Francis C. M. Lau, Yuli Zhao, Hai Yu:
Joint Security and Energy-Efficient Cooperative Architecture for 5G Underlaying Cellular Networks. Symmetry 14(6): 1160 (2022) - [j54]Ying Wang, Rongxin Wu, Chao Wang, Ming Wen, Yepang Liu, Shing-Chi Cheung, Hai Yu, Chang Xu, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? IEEE Trans. Software Eng. 48(7): 2295-2316 (2022) - [c51]Meiqiu Xu, Ying Wang, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Insight: Exploring Cross-Ecosystem Vulnerability Impacts. ASE 2022: 58:1-58:13 - 2021
- [j53]Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang:
An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution. J. Real Time Image Process. 18(3): 923-935 (2021) - [j52]Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang:
AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening. J. Real Time Image Process. 18(4): 1343-1356 (2021) - [j51]Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu:
An ultrahigh-resolution image encryption algorithm using random super-pixel strategy. Multim. Tools Appl. 80(24): 33429-33454 (2021) - [j50]Ye Yuan, Wei Zhang, Hai Yu, Zhiliang Zhu:
Superpixels With Content-Adaptive Criteria. IEEE Trans. Image Process. 30: 7702-7716 (2021) - [c50]Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
HERO: On the Chaos When PATH Meets Modules. ICSE 2021: 99-111 - [i3]Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
Hero: On the Chaos When PATH Meets Modules. CoRR abs/2102.12105 (2021) - [i2]Ying Wang, Yibo Wang, Sinan Wang, Yepang Liu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. CoRR abs/2106.13012 (2021) - 2020
- [j49]Xue Yang, Zhiliang Zhu, Hai Yu, Yuli Zhao:
A Naming Game-Based Method for the Location of Information Source in Social Networks. Complex. 2020: 6975250:1-6975250:8 (2020) - [j48]Zhuofu Deng, Binbin Wang, Heng Guo, Chengwei Chai, Yanze Wang, Zhiliang Zhu:
Unified Quantile Regression Deep Neural Network with Time-Cognition for Probabilistic Residential Load Forecasting. Complex. 2020: 9147545:1-9147545:18 (2020) - [j47]Wei Zhang, Shuwen Wang, Weijie Han, Hai Yu, Zhiliang Zhu:
An Image Encryption Algorithm Based on Random Hamiltonian Path. Entropy 22(1): 73 (2020) - [j46]Zhiliang Zhu, Yanjie Song, Wei Zhang, Hai Yu, Yuli Zhao:
A novel compressive sensing-based framework for image compression-encryption with S-box. Multim. Tools Appl. 79(35-36): 25497-25533 (2020) - [j45]Ye Yuan, Zhiliang Zhu, Hai Yu, Wei Zhang:
Watershed-Based Superpixels With Global and Local Boundary Marching. IEEE Trans. Image Process. 29: 7375-7388 (2020) - [c49]Ying Wang, Ming Wen, Yepang Liu, Yibo Wang, Zhenming Li, Chao Wang, Hai Yu, Shing-Chi Cheung, Chang Xu, Zhiliang Zhu:
Watchman: monitoring dependency conflicts for Python library ecosystem. ICSE 2020: 125-135 - [i1]Ying Wang, Rongxin Wu, Chao Wang, Ming Wen, Yepang Liu, Shing-Chi Cheung, Hai Yu, Chang Xu, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? CoRR abs/2006.07633 (2020)
2010 – 2019
- 2019
- [j44]Zhiliang Zhu, Jie Liang, Deyang Li, Hai Yu, Guoqi Liu:
Hot Topic Detection Based on a Refined TF-IDF Algorithm. IEEE Access 7: 26996-27007 (2019) - [j43]Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu, Yuli Zhao:
Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture. IEEE Access 7: 84386-84400 (2019) - [j42]Zhuofu Deng, Binbin Wang, Yanlu Xu, Tengteng Xu, Chenxu Liu, Zhiliang Zhu:
Multi-Scale Convolutional Neural Network With Time-Cognition for Multi-Step Short-Term Load Forecasting. IEEE Access 7: 88058-88071 (2019) - [j41]Bo Wei, Wensheng Zhang, Xuewen Xia, Yinglong Zhang, Fei Yu, Zhiliang Zhu:
Efficient Feature Selection Algorithm Based on Particle Swarm Optimization With Learning Memory. IEEE Access 7: 166066-166078 (2019) - [j40]Xue Yang, Zhiliang Zhu, Hai Yu, Yuli Zhao, Li Guo:
Evolutionary Game Dynamics of the Competitive Information Propagation on Social Networks. Complex. 2019: 8385426:1-8385426:11 (2019) - [j39]Wei Zhang, Zhiliang Zhu, Hai Yu:
A Symmetric Image Encryption Algorithm Based on a Coupled Logistic-Bernoulli Map and Cellular Automata Diffusion Strategy. Entropy 21(5): 504 (2019) - [j38]Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu:
Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding. Multim. Tools Appl. 78(14): 18967-18994 (2019) - [c48]Ying Wang, Ming Wen, Rongxin Wu, Zhenwei Liu, Shin Hwei Tan, Zhiliang Zhu, Hai Yu, Shing-Chi Cheung:
Could I have a stack trace to examine the dependency conflict issue? ICSE 2019: 572-583 - 2018
- [j37]Zhiliang Zhu, Deyang Li, Jie Liang, Guoqi Liu, Hai Yu:
A Dynamic Personalized News Recommendation System Based on BAP User Profiling Method. IEEE Access 6: 41068-41078 (2018) - [j36]Zhiliang Zhu, Zejun Ke, Jiayin Cui, Hai Yu, Guoqi Liu:
The construction of Chinese microblog gender-specific thesauruses and user gender classification. Appl. Netw. Sci. 3(1): 47:1-47:17 (2018) - [j35]Ye Yuan, Yen-Wei Chen, Chunhua Dong, Hai Yu, Zhiliang Zhu:
Hybrid method combining superpixel, random walk and active contour model for fast and accurate liver segmentation. Comput. Medical Imaging Graph. 70: 119-134 (2018) - [j34]Li Guo, Zhiliang Zhu, Francis C. M. Lau, Yuli Zhao, Hai Yu:
SSCSMA-based random relay selection scheme for large-scale relay networks. Comput. Commun. 127: 13-19 (2018) - [j33]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Hai Yu, Zhiliang Zhu:
Improved online fountain codes. IET Commun. 12(18): 2297-2304 (2018) - [j32]Ying Wang, Zhiliang Zhu, Bo Yang, Fangda Guo, Hai Yu:
Using reliability risk analysis to prioritize test cases. J. Syst. Softw. 139: 14-31 (2018) - [j31]Junxin Chen, Zhiliang Zhu, Li-bo Zhang, Yushu Zhang, Benqiang Yang:
Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142: 340-353 (2018) - [j30]Dong-dai Liu, Wei Zhang, Hai Yu, Zhiliang Zhu:
An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process. 151: 130-143 (2018) - [j29]Ying Wang, Zhiliang Zhu, Hai Yu, Bo Yang:
Risk Analysis on Multi-Granular Flow Network for Software Integration Testing. IEEE Trans. Circuits Syst. II Express Briefs 65-II(8): 1059-1063 (2018) - [j28]Ying Wang, Hai Yu, Zhiliang Zhu, Wei Zhang, Yuli Zhao:
Automatic Software Refactoring via Weighted Clustering in Method-Level Networks. IEEE Trans. Software Eng. 44(3): 202-236 (2018) - [c47]Zhuofu Deng, Yen-Wei Chen, Zhiliang Zhu, Yinuo Li, He Li, Yi Wang:
Advanced Transmission Methods Applied in Remote Consultation and Diagnosis Platform. IIMSS 2018: 230-237 - [c46]Yinuo Li, Yonghua Li, Zhuofu Deng, Zhiliang Zhu:
A Collaborative Telemedicine Platform Focusing on Paranasal Sinus Segmentation. IIMSS 2018: 238-247 - [c45]Ying Wang, Ming Wen, Zhenwei Liu, Rongxin Wu, Rui Wang, Bo Yang, Hai Yu, Zhiliang Zhu, Shing-Chi Cheung:
Do the dependency conflicts in my project matter? ESEC/SIGSOFT FSE 2018: 319-330 - 2017
- [j27]Junxin Chen, Nan Bao, Jinchang Li, Zhiliang Zhu, Leo Yu Zhang:
Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation. IEEE Access 5: 16124-16129 (2017) - [j26]Hong-Jian Yin, Hai Yu, Yuli Zhao, Zhiliang Zhu, Wei Zhang:
Analysis of the Dynamic Influence of Social Network Nodes. Sci. Program. 2017: 5046905:1-5046905:6 (2017) - [c44]Kai Shi, Hai Yu, Zhiliang Zhu, Jingde Cheng:
Anticipatory Runway Incursion Prevention Based on Inaccurate Position Surveillance Information. ACIIDS (2) 2017: 93-104 - [c43]Yuli Zhao, Hai Yu, Zhiliang Zhu, Yin Zhang:
A distributed energy-efficient cooperative routing algorithm based on optimal power allocation. IECON 2017: 5675-5680 - [c42]Xiwei Liu, Kai Shi, Hai Yu, Zhiliang Zhu:
Relative health index of wind turbines based on kernel density estimation. IECON 2017: 5957-5961 - [c41]Yuechen Wang, Zhiliang Zhu, Hang Song, Kai Shi:
Wind turbine gearbox condition monitoring based on extreme gradient boosting. IECON 2017: 6017-6023 - 2016
- [j25]Hegui Zhu, Xiangde Zhang, Hai Yu, Cheng Zhao, Zhiliang Zhu:
A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System. Entropy 18(8): 276 (2016) - [j24]Chong Fu, Zhan-kao Wen, Zhiliang Zhu, Hai Yu:
A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system. Int. J. Comput. Sci. Eng. 12(2/3): 113-123 (2016) - [j23]Wei Zhang, Hai Yu, Yuli Zhao, Zhiliang Zhu:
Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118: 36-50 (2016) - [c40]Zhuofu Deng, Zhiliang Zhu, Yen-Wei Chen:
Remote and collaborative medical image visualization computing platform. CISP-BMEI 2016: 829-833 - [c39]Haitao Du, Hang Song, Kai Shi, Zhiliang Zhu:
Wind Turbine Dynamic State Prediction Method Based on the Similarity of Historical Data. ISCID (2) 2016: 285-290 - [c38]Kai Shi, Hang Song, Hai Yu, Zhiliang Zhu:
Collaborative Contextual Anomaly Detection for Industrial Equipment Groups. ISCID (1) 2016: 381-385 - 2015
- [j22]Junxin Chen, Zhiliang Zhu, Chong Fu, Hai Yu, Li-bo Zhang:
A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3): 846-860 (2015) - [j21]Junxin Chen, Zhiliang Zhu, Chong Fu, Li-bo Zhang, Yushu Zhang:
An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear Sci. Numer. Simul. 23(Issues): 294-310 (2015) - [j20]Zhiying Zhao, Xiaofan Wang, Wei Zhang, Zhiliang Zhu:
A Community-Based Approach to Identifying Influential Spreaders. Entropy 17(4): 2228-2252 (2015) - [j19]Yuli Zhao, Francis Chung-Ming Lau, Zhiliang Zhu, Wei Zhang:
Generation of Luby Transform Codes with Low Redundancy. Int. J. Bifurc. Chaos 25(5): 1550072:1-1550072:8 (2015) - [j18]Ying Liu, Shu Mao, Mingwei Zhang, Guoqi Liu, Zhiliang Zhu, Jingde Cheng:
Prevention of Fault Propagation in Web Service: a Complex Network Approach. J. Web Eng. 14(1&2): 136-150 (2015) - [j17]Junxin Chen, Zhiliang Zhu, Chong Fu, Hai Yu, Yushu Zhang:
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process. 111: 294-307 (2015) - 2014
- [j16]Zhiliang Zhu, Jingping Song, Yanjie Song, Hai Yu:
A Multiaddress Co-Chaos Shift Keying Communication Scheme and Performance Analysis. Int. J. Bifurc. Chaos 24(4) (2014) - [j15]Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao:
Modelling, analysis and containment of passive worms in P2P networks. Int. J. Internet Protoc. Technol. 8(2/3): 130-142 (2014) - [j14]Jingping Song, Zhiliang Zhu, Peter Scully, Chris J. Price:
Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning. J. Comput. 9(7): 1542-1546 (2014) - [j13]Zhiliang Zhu, Fangda Guo, Hai Yu, Chen Chen:
Fast Single Image Super-Resolution via Self-Example Learning and Sparse Representation. IEEE Trans. Multim. 16(8): 2178-2190 (2014) - [c37]Jingping Song, Zhiliang Zhu, Chris J. Price:
Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering. CD-ARES 2014: 270-280 - 2013
- [j12]Chong Fu, Wei-hong Meng, Yong-feng Zhan, Zhiliang Zhu, Francis Chung-Ming Lau, Chi Kong Tse, Hong-feng Ma:
An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Medicine 43(8): 1000-1010 (2013) - [j11]Wei Zhang, Kwok-Wo Wong, Hai Yu, Zhiliang Zhu:
A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3): 584-600 (2013) - [j10]Wei Zhang, Kwok-Wo Wong, Hai Yu, Zhiliang Zhu:
An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8): 2066-2080 (2013) - [j9]Jie Song, Tiantian Li, Zhi Wang, Zhiliang Zhu:
Study on energy-consumption regularities of cloud computing systems by a novel evaluation model. Computing 95(4): 269-287 (2013) - [j8]Mingwei Zhang, Chengfei Liu, Jian Yu, Zhiliang Zhu, Bin Zhang:
A correlation context-aware approach for composite service selection. Concurr. Comput. Pract. Exp. 25(13): 1909-1927 (2013) - [j7]Kai Shi, Yuichi Goto, Zhiliang Zhu, Jingde Cheng:
Anticipatory Runway Incursion Prevention Systems. IEICE Trans. Inf. Syst. 96-D(11): 2385-2396 (2013) - [j6]Tao Ren, Zhiliang Zhu, Hai Yu, Georgi M. Dimirovski:
Integral sliding mode controller design for congestion problem in ATM networks. Int. J. Control 86(3): 529-539 (2013) - [c36]Kai Shi, Yuichi Goto, Zhiliang Zhu, Jingde Cheng:
Anticipatory Emergency Elevator Evacuation Systems. ACIIDS (1) 2013: 117-126 - [c35]Li Zhang, Xiao Liu, Jie Song, Cathal Gurrin, Zhiliang Zhu:
A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for Localization. AINA Workshops 2013: 300-305 - [c34]Jingping Song, Zhiliang Zhu, Peter Scully, Chris J. Price:
Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification. CSS 2013: 299-307 - [c33]Li Zhang, Bin Zhang, Claus Pahl, Lei Xu, Zhiliang Zhu:
Personalized Quality Prediction for Dynamic Service Management Based on Invocation Patterns. ICSOC 2013: 84-98 - 2012
- [j5]Yuli Zhao, Francis Chung-Ming Lau, Zhiliang Zhu, Hai Yu:
Scale-Free Luby Transform Codes. Int. J. Bifurc. Chaos 22(4) (2012) - [c32]Jie Song, Zhenxing Yan, Feng Han, Yubin Bao, Zhiliang Zhu:
Introducing SaaS Capabilities to Existing Web-Based Applications Automatically. APWeb 2012: 560-569 - [c31]Hang Song, Jun Na, Bin Zhang, Jun Guo, Zhiliang Zhu:
Building an Optimal Service Environment for ASBS Based on Pareto Dominance. ICEBE 2012: 95-102 - 2011
- [j4]Zhiliang Zhu, Wei Zhang, Kwok-Wo Wong, Hai Yu:
A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6): 1171-1186 (2011) - [c30]Jie Song, Yubin Bao, Zhiliang Zhu:
Navigating Measurements by Cross-Classifications in Multi-use Data Warehouse. CIT 2011: 409-414 - [c29]Jie Song, Feng Han, Zhenxing Yan, Guoqi Liu, Zhiliang Zhu:
A SaaSify Tool for Converting Traditional Web-Based Applications to SaaS Application. IEEE CLOUD 2011: 396-403 - [c28]Zhiliang Zhu, Jing Bi, Haitao Yuan, Ying Chen:
SLA Based Dynamic Virtualized Resources Provisioning for Shared Cloud Data Centers. IEEE CLOUD 2011: 630-637 - [c27]Yu Dai, Lei Yang, Bin Zhang, Zhiliang Zhu:
Exception Diagnosis for Composite Service Based on Error Propagation Degree. IEEE SCC 2011: 160-167 - [c26]Jie Song, Tiantian Li, Lulu Jia, Zhiliang Zhu:
A Deduced SaaS Lifecycle Model Based on Roles and Activities. ACC (4) 2011: 421-431 - [c25]Jie Song, Hongying Hou, Tiantian Li, Guoqi Liu, Zhiliang Zhu:
QoS Cube: Management and Navigating Web Services through Multi-dimensional Model. CSE 2011: 9-15 - [c24]Zhenhua Tan, Guangming Yang, Zhiliang Zhu, Yi Ma:
Practice in Compound Practical Teaching Method for Information Security Major. CSEE (5) 2011: 221-226 - [c23]Jun Na, Bin Zhang, Yan Gao, Li Zhang, Zhiliang Zhu:
Long-Term Benefit Driven Adaptation in Service-Based Software Systems. ICWS 2011: 572-579 - [c22]Jing Bi, Zhiliang Zhu, Haitao Yuan, Yushun Fan, Ming Tie:
A Petri Net Based Hybrid Optimal Controller for Deadlock Prevention in Web Service Composition. ICWS 2011: 718-719 - 2010
- [j3]Wei Cheng, Zhenhua Tan, Zhiliang Zhu, Guiran Chang:
The Design of Serial ATA Bus Control Chip. J. Comput. 5(4): 524-532 (2010) - [j2]Mingwei Zhang, Bin Zhang, Ying Liu, Jun Na, Zhiliang Zhu:
Web Service Composition Based on QoS Rules. J. Comput. Sci. Technol. 25(6): 1143-1156 (2010) - [c21]Jing Bi, Zhiliang Zhu, Ruixiong Tian, Qingbo Wang:
Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center. IEEE CLOUD 2010: 370-377 - [c20]Li Zhang, Bin Zhang, Ying Liu, Yan Gao, Zhiliang Zhu:
A Web Service QoS Prediction Approach Based on Collaborative Filtering. APSCC 2010: 725-731 - [c19]Zhenhua Tan, Guangming Yang, Zhiliang Zhu, Wei Cheng, Guiran Chang:
K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-Peer Service Networks. CETS 2010: 61-74 - [c18]Jun Na, Guo-hong Li, Bin Zhang, Li Zhang, Zhiliang Zhu:
An Adaptive Replanning Mechanism for Dependable Service-Based Systems. ICEBE 2010: 262-269 - [c17]Ying Zhou, Jingqi Wei, Xin Xiong, Dancheng Li, Zhiliang Zhu:
Smart Location-Aware Service Platform for Business Operation. ICEBE 2010: 332-337 - [c16]Yu Dai, Lei Yang, Zhiliang Zhu, Bin Zhang:
Fault-Tolerant Service Composition Based on Low Cost Mechanism. ICICA (2) 2010: 56-63 - [c15]Chun-Yan Han, Yixian Liu, Ji-Peng Liu, Zhiliang Liu, Dancheng Li, Zhiliang Zhu, Jingde Cheng:
Logic basis for anticipatory reasoning-reacting systems with three-dimensional moving objects. ICMLC 2010: 2641-2646 - [c14]Jun Na, Bin Zhang, Xiangyu Zhang, Zhiliang Zhu, Dancheng Li:
Two-Stage Adaptation for Dependable Service-Oriented System. ICSS 2010: 143-147 - [c13]Jingqi Wei, Dancheng Li, Jun Na, Jing Bi, Zhiliang Zhu, Ying Chen:
Web Service Publication and Discovery Architecture Based on JXTA. ICSS 2010: 383-387
2000 – 2009
- 2009
- [c12]Yuan Gao, Dancheng Li, Chunyan Han, Zhiliang Zhu:
An Improved Network Topology Auto-layout Solution Based on Force-Directed Placement. HIS (3) 2009: 10-14 - [c11]Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li:
Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link. HIS (2) 2009: 229-234 - [c10]Yide Wang, Dancheng Li, Chunyan Han, Zhiliang Zhu:
Research and Application on Automatic Network Topology Discovery in ITSM System. HIS (2) 2009: 336-340 - [c9]Guoqi Liu, Zhiliang Zhu, Dancheng Li, Ying Liu:
A Method of QoS Measurement Based on User Behavior Analysis. ICEBE 2009: 383-387 - [c8]Chong Fu, Zhiliang Zhu:
An image denoising method by using hybrid fractal-wavelet coding. ICIS 2009: 1324-1329 - [c7]Mingwei Zhang, Bin Zhang, Jun Na, Xizhe Zhang, Zhiliang Zhu:
Composite Service Selection Based on Dot Pattern Mining. SERVICES I 2009: 740-746 - 2008
- [j1]Zhiliang Zhu, Shuping Li, Hai Yu:
A new approach to generalized chaos synchronization based on the stability of the error system. Kybernetika 44(4): 492-500 (2008) - [c6]Zhiliang Zhu, Chong Fu:
A Chaotic Dynamical Model for Internet Traffic. ICNC (4) 2008: 581-585 - [c5]Zhiliang Zhu, Jingping Song, Dong Aoshuang, Hai Yu, Ye Yang:
Research and Analysis of Securities Market based on Multi-Fractal Generator. ICYCS 2008: 2776-2781 - [c4]Dongming Chen, Zhiliang Zhu, Guangming Yang:
An Improved Image Encryption Algorithm Based on Chaos. ICYCS 2008: 2792-2796 - [c3]Chong Fu, Zhiliang Zhu:
A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method. ICYCS 2008: 3057-3061 - 2007
- [c2]Chong Fu, Zhiliang Zhu:
An Improved Chaos-Based Stream Cipher Algorithm. ICNC (3) 2007: 179-183 - 2006
- [c1]Dongming Chen, Zhiliang Zhu, Guiran Chang:
An Algorithm of Signal De-noising by Using Wavelet Analysis. ISDA (3) 2006: 51-55
Coauthor Index
aka: Francis Chung-Ming Lau
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint