default search action
Xiaoyi Zhou
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Long Dai, Jiarong Mao, Liaoran Xu, Xuefeng Fan, Xiaoyi Zhou:
SecNLP: An NLP classification model watermarking framework based on multi-task learning. Comput. Speech Lang. 86: 101606 (2024) - [j24]Zihao Xin, Sheng Liu, Xiaoyi Zhou, Wenbao Han, Jianqiang Ma:
A metaheuristic image cryptosystem using improved parallel model and many-objective optimization. IET Image Process. 18(11): 2838-2854 (2024) - [j23]Xiaoyi Zhou, Kaiyue Hou, Yu-Jian Zhuang, Zhaoxia Yin, Wenbao Han:
General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. 34(1): 153-167 (2024) - [c26]Guohao Cui, Hao Wang, Wentao Hao, Xiaoyi Zhou:
OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation. BigDataSecurity 2024: 145-149 - [c25]Zhuo Tian, Xiaoyi Zhou, Fan Xing, Ruiyang Zhao:
Towards the Transferable Reversible Adversarial Example via Distribution-Relevant Attack. PRCV (11) 2024: 292-305 - [c24]Zhuo Tian, Xiaoyi Zhou, Fan Xing, Wentao Hao, Ruiyang Zhao:
TRAE: Reversible Adversarial Example with Traceability. PRCV (1) 2024: 367-379 - 2023
- [j22]Zipeng Li, Zitong Zhou, Xiaoyi Zhou:
A Sensor-Based Modified FMD Method to Identify Fault Feature for Mechanical Fault Diagnosis of Ship-Borne Antennae. IEEE Access 11: 40018-40028 (2023) - [j21]Xindong Ni, Kaidong Liu, Xiaoyi Zhou, Mao Xu, Du Chen, Shumao Wang:
Unsupervised anomaly analysis-based manufacturing quality test and grading method for combine harvesters. Comput. Electron. Agric. 210: 107898 (2023) - [j20]Hongzhi Guo, Xiaoyi Zhou, Jiadai Wang, Jiajia Liu, Abderrahim Benslimane:
Intelligent Task Offloading and Resource Allocation in Digital Twin Based Aerial Computing Networks. IEEE J. Sel. Areas Commun. 41(10): 3095-3110 (2023) - [j19]Shaohua Duan, Yuhan Qian, Junjie Liu, Hanwen Wang, Xiaoyi Zhou:
Reversible robust fragile multi-watermarking scheme for color images. Multim. Tools Appl. 82(25): 38613-38637 (2023) - [j18]Wentao Hao, Tianshuo Zhang, Xianyi Chen, Xiaoyi Zhou:
A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding. Signal Process. 205: 108890 (2023) - [j17]Wentao Hao, Tianshuo Zhang, Xianyi Chen, Xiaoyi Zhou:
Corrigendum to A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding Signal Processing, 205, 108890]. Signal Process. 209: 109012 (2023) - [j16]Jiang Yu, Xiaoyi Zhou, Wen Si, Fengyong Li, Cong Liu, Xinpeng Zhang:
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2. Symmetry 15(5): 979 (2023) - [j15]Dahao Fu, Xiaoyi Zhou, Liaoran Xu, Kaiyue Hou, Xianyi Chen:
Robust Reversible Watermarking by Fractional Order Zernike Moments and Pseudo-Zernike Moments. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7310-7326 (2023) - [j14]Xiaoyi Zhou, Tiange Yang, Yuanyuan Zou, Shaoyuan Li, Hao Fang:
Multiple Subformulae Cooperative Control for Multiagent Systems Under Conflicting Signal Temporal Logic Tasks. IEEE Trans. Ind. Electron. 70(9): 9357-9367 (2023) - [c23]Xiaoyi Zhou, Shuai Lee:
Hiding patient information in medical images:A high-capacity and reversible hiding algorithm for E-healthcare. APSIPA ASC 2023: 456-461 - [c22]Jiarong Mao, Yuting An, Xiaoyi Zhou:
A Visually Meaningful Image Encryption Algorithm with Attention Mechanism and Artificial Bee Colony Optimization. APSIPA ASC 2023: 462-467 - [c21]Lushi Zhang, Hongzhi Guo, Xiaoyi Zhou, Jiajia Liu:
Trusted Task Offloading in Vehicular Edge Computing Networks: A Reinforcement Learning Based Solution. GLOBECOM 2023: 6711-6716 - [c20]Xiaoyi Zhou, Na Tian, Hongzhi Guo, Jiajia Liu:
Intelligent UAV Charging Station Deployment and Path Planning in Smart City. ICCT 2023: 1253-1258 - [c19]Long Dai, Jiarong Mao, Liaoran Xu, Xuefeng Fan, Xiaoyi Zhou:
Balancing Robustness and Covertness in NLP Model Watermarking: A Multi-Task Learning Approach. ISCC 2023: 1376-1382 - [i7]Fan Xing, Xiaoyi Zhou, Xuefeng Fan, Zhuo Tian, Yan Zhao:
RAEDiff: Denoising Diffusion Probabilistic Models Based Reversible Adversarial Examples Self-Generation and Self-Recovery. CoRR abs/2311.12858 (2023) - 2022
- [j13]Yu-Jian Zhuang, Sheng Liu, Changfeng Ding, Xiaoyi Zhou:
Reversible watermarking based on extreme prediction using modified differential evolution. Appl. Intell. 52(12): 14406-14425 (2022) - [j12]Zijie Chen, Zhuhua Hu, Lewei Xu, Yaochi Zhao, Xiaoyi Zhou:
DA-Bi-SRU for water quality prediction in smart mariculture. Comput. Electron. Agric. 200: 107219 (2022) - [j11]Bo Ran, Tianshuo Zhang, Lihong Wang, Sheng Liu, Xiaoyi Zhou:
Image Security Based on Three-Dimensional Chaotic System and Random Dynamic Selection. Entropy 24(7): 958 (2022) - [j10]Hongzhi Guo, Xiaoyi Zhou, Yutao Wang, Jiajia Liu:
Achieve Load Balancing in Multi-UAV Edge Computing IoT Networks: A Dynamic Entry and Exit Mechanism. IEEE Internet Things J. 9(19): 18725-18736 (2022) - [j9]Xiaoyi Zhou, Liang Huang, Tong Ye, Weiqiang Sun:
Computation Bits Maximization in UAV-Assisted MEC Networks With Fairness Constraint. IEEE Internet Things J. 9(21): 20997-21009 (2022) - [j8]Sheng Liu, Yu-Jian Zhuang, Li Huang, Xiaoyi Zhou:
Exploiting LSB Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud. J. Inf. Secur. Appl. 66: 103138 (2022) - [j7]Li Huang, Da Kuang, Cheng-Long Li, Yu-Jian Zhuang, Shaohua Duan, Xiaoyi Zhou:
A self-embedding secure fragile watermarking scheme with high quality recovery. J. Vis. Commun. Image Represent. 83: 103437 (2022) - [j6]Hongzhi Guo, Xiaoyi Zhou, Jiajia Liu, Yanning Zhang:
Vehicular intelligence in 6G: Networking, communications, and computing. Veh. Commun. 33: 100399 (2022) - [c18]Longqin Gong, Zhuhua Hu, Xiaoyi Zhou:
A real time video object tracking method for fish. ICMLSC 2022: 78-84 - [c17]Longqin Gong, Zhuhua Hu, Xiaoyi Zhou:
A Few Samples Underwater Fish Tracking Method Based on Semi-supervised and Attention Mechanism. ICRCA 2022: 18-22 - [i6]Xuefeng Fan, Hangyu Gui, Xiaoyi Zhou:
PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN Model. CoRR abs/2206.02541 (2022) - [i5]Long Dai, Jiarong Mao, Xuefeng Fan, Xiaoyi Zhou:
DeepHider: A Multi-module and Invisibility Watermarking Scheme for Language Model. CoRR abs/2208.04676 (2022) - 2021
- [j5]Maohua Ran, Xiaoyi Zhou:
An implicit difference scheme for the time-fractional Cahn-Hilliard equations. Math. Comput. Simul. 180: 61-71 (2021) - [c16]Xiaoyi Zhou, Yating Qi:
Science Games and Verbal Interaction in Preschool Science Classroom. CIPAE 2021: 643-647 - [i4]Xiaoyi Zhou, Liang Huang, Tong Ye, Weiqiang Sun:
Computation Rate Maximum for Mobile Terminals in UAV-assisted Wireless Powered MEC Networks with Fairness Constraint. CoRR abs/2109.05767 (2021) - 2020
- [j4]Xiaoyi Zhou, Pan Lu, Zijian Zheng, Denver Tolliver, Amin Keramati:
Accident Prediction Accuracy Assessment for Highway-Rail Grade Crossings Using Random Forest Algorithm Compared with Decision Tree. Reliab. Eng. Syst. Saf. 200: 106931 (2020) - [j3]Shaohua Duan, Hanwen Wang, Yunpeng Liu, Li Huang, Xiaoyi Zhou:
A Novel Comprehensive Watermarking Scheme for Color Images. Secur. Commun. Networks 2020: 8840779:1-8840779:12 (2020) - [c15]Xiaoyi Zhou, Shaohua Duan, Wei Li:
A Problem-Driven Discussion Teaching Method Based on Progressive Cycle. CSS 2020: 225-235 - [c14]Xianmin Lin, Shengwang Peng, Zhiqi Ma, Xiaoyi Zhou, Aihua Zheng:
Occlusion Based Discriminative Feature Mining for Vehicle Re-identification. ICPCSEE (2) 2020: 246-257 - [i3]Xiaoyi Zhou, Tong Ye, Tony Tong Lee:
Designing and Analysis of A Wi-Fi Data Offloading Strategy Catering for the Preference of Mobile Users. CoRR abs/2005.13195 (2020)
2010 – 2019
- 2019
- [c13]Jilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma, Xiaoyi Zhou:
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model. CSS (2) 2019: 263-274 - [c12]Xiaoyi Zhou, Tong Ye, Tony Tong Lee:
The Effect of Mobility on Delayed Data Offloading. ICCCN 2019: 1-6 - [i2]Yiquan Zhang, Airong Chen, Bo Peng, Xiaoyi Zhou, Dalei Wang:
A deep Convolutional Neural Network for topology optimization with strong generalization ability. CoRR abs/1901.07761 (2019) - [i1]Xiaoyi Zhou, Tong Ye, Tony Tong Lee:
The Effect of Mobility on Delayed Data Offloading. CoRR abs/1903.11362 (2019) - 2018
- [j2]Xiaoyi Zhou, Jixin Ma, Xiaoming Yao, Honglei Li:
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations. Int. J. Softw. Innov. 6(2): 1-9 (2018) - [c11]Shiqin Liu, Minjun Zhao, Jixin Ma, Jiangyuan Yao, Yucong Duan, Xiaoyi Zhou:
A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA. ICCCS (4) 2018: 195-207 - [c10]Minjun Zhao, Shiqin Liu, Chunjie Cao, Jiangyuan Yao, Xiaoyi Zhou:
A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix. ICCCS (4) 2018: 208-220 - 2017
- [c9]Xiaoyi Zhou:
Electrocardiogram System Performance Evaluation Based on the LabVIEW Virtual Instruments Development Platform. CSPS 2017: 1901-1908 - [c8]Xiaoyi Zhou, Jie Luo, Tao He:
Multi-query Optimization via Common Sub Query Elimination for SPARQL. ISCID (2) 2017: 213-218 - [c7]Xiaoyi Zhou, Xiaoming Yao, Honglei Li, Jixin Ma:
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting. SERA 2017: 19-23 - [c6]Honglei Li, Qi Chen, Xiaoyi Zhou:
An analysis of the health care platform in the cloud environment. SERA 2017: 99-102 - 2016
- [c5]Xiaoming Yao, Xiaoyi Zhou, Jixin Ma:
Differential Privacy of Big Data: An Overview. BigDataSecurity/HPSC/IDS 2016: 7-12 - 2014
- [c4]Xiaoyi Zhou, Jixin Ma, Wencai Du, Yihong Li:
A Dynamic Multiple Digital Watermarking Model based on Temporal Series. 3PGCIC 2014: 367-371 - 2012
- [b1]Xiaoyi Zhou:
Information security based on temporal order and ergodic matrix. University of Greenwich, UK, 2012 - 2011
- [c3]Xiaoyi Zhou, Jixin Ma, Miltos Petridis, Wencai Du:
Temporal Ordered Image Encryption. CMC 2011: 23-28 - 2010
- [j1]Aihua Zheng, Jixin Ma, Xiaoyi Zhou, Bin Luo:
Efficient and Effective State-based Framework for News Video Retrival. Int. J. Adv. Comp. Techn. 2(4): 151-161 (2010) - [c2]Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Mingrui Chen, Yongzhe Zhao:
Cryptanalysis of the Bisectional MQ Equations System. CIT 2010: 1038-1043 - [c1]Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao:
BMQE System - A MQ Equations System based on Ergodic Matrix. SECRYPT 2010: 431-435
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint