Zhili Chen
Zhili Chen
Shenyang Jianzhu University
Verified email at
Cited by
Cited by
Topological modeling and classification of mammographic microcalcification clusters
Z Chen, H Strange, A Oliver, ERE Denton, C Boggis, R Zwiggelaar
IEEE transactions on biomedical engineering 62 (4), 1203-1214, 2014
Information assurance through redundant design: a novel TNU error-resilient latch for harsh radiation environment
A Yan, Y Hu, J Cui, Z Chen, Z Huang, T Ni, P Girard, X Wen
IEEE Transactions on Computers 69 (6), 789-799, 2020
Discriminative feature selection for on-line signature verification
X Xia, X Song, F Luan, J Zheng, Z Chen, X Ma
Pattern Recognition 74, 422-433, 2018
A new scheme for covert communication via 3G encoded speech
H Miao, L Huang, Z Chen, W Yang, A Al-Hawbani
Computers & Electrical Engineering 38 (6), 1490-1501, 2012
Effective linguistic steganography detection
X Zhao, Z Chen, L Huang, Z Yu
2008 IEEE 8th International Conference on Computer and Information …, 2008
Linguistic steganography detection using statistical characteristics of correlations between words
Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
Novel quadruple-node-upset-tolerant latch designs with optimized overhead for reliable computing in harsh radiation environments
A Yan, Z Xu, X Feng, J Cui, Z Chen, T Ni, Z Huang, P Girard, X Wen
IEEE transactions on emerging topics in computing 10 (1), 404-413, 2020
Local feature based mammographic tissue pattern modelling and breast density classification
Z Chen, E Denton, R Zwiggelaar
2011 4th International Conference on Biomedical Engineering and Informatics …, 2011
Segmentation of the breast region with pectoral muscle removal in mammograms
Z Chen, R Zwiggelaar
Medical Image Understanding and Analysis (MIUA), 71-76, 2010
PS-TRUST: Provably secure solution for truthful double spectrum auctions
Z Chen, L Huang, L Li, W Yang, H Miao, M Tian, F Wang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1249-1257, 2014
A statistical attack on a kind of word-shift text-steganography
L Li, L Huang, X Zhao, W Yang, Z Chen
2008 International Conference on Intelligent Information Hiding and …, 2008
Design of a triple-node-upset self-recoverable latch for aerospace applications in harsh radiation environments
A Yan, X Feng, Y Hu, C Lai, J Cui, Z Chen, K Miyase, X Wen
IEEE Transactions on Aerospace and Electronic Systems 56 (2), 1163-1171, 2019
Modelling mammographic microcalcification clusters using persistent mereotopology
H Strange, Z Chen, ERE Denton, R Zwiggelaar
Pattern Recognition Letters 47, 157-163, 2014
Steganalysis against substitution-based linguistic steganography based on context clusters
Z Chen, L Huang, H Miao, W Yang, P Meng
Computers & Electrical Engineering 37 (6), 1071-1081, 2011
Signature alignment based on GMM for on-line signature verification
X Xia, Z Chen, F Luan, X Song
Pattern Recognition 65, 188-196, 2017
Probabilistic matrix factorization with personalized differential privacy
S Zhang, L Liu, Z Chen, H Zhong
Knowledge-Based Systems 183, 104864, 2019
Linguistic steganography detection algorithm using statistical language model
P Meng, L Hang, W Yang, Z Chen, H Zheng
2009 international conference on information technology and computer science …, 2009
Linguistic steganography detection based on perplexity
P Meng, L Huang, Z Chen, W Yang, D Li
2008 International Conference on MultiMedia and Information Technology, 217-220, 2008
Uniqueness-driven saliency analysis for automated lesion detection with applications to retinal diseases
Y Zhao, Y Zheng, Y Zhao, Y Liu, Z Chen, P Liu, J Liu
Medical Image Computing and Computer Assisted Intervention–MICCAI 2018: 21st …, 2018
STBS: A statistical algorithm for steganalysis of translation-based steganography
P Meng, L Hang, Z Chen, Y Hu, W Yang
Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20