Zheng Li

ORCID: 0000-0002-0933-589X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Recommender Systems and Techniques
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Wheat and Barley Genetics and Pathology
  • Human Mobility and Location-Based Analysis
  • Fault Detection and Control Systems
  • Sentiment Analysis and Opinion Mining
  • Digital Marketing and Social Media
  • Lattice Boltzmann Simulation Studies
  • Fuel Cells and Related Materials
  • Topic Modeling
  • Advanced Graph Neural Networks
  • Anomaly Detection Techniques and Applications
  • Electrocatalysts for Energy Conversion
  • Genetic Mapping and Diversity in Plants and Animals
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Advanced Bandit Algorithms Research
  • Chromosomal and Genetic Variations
  • Sparse and Compressive Sensing Techniques
  • Opinion Dynamics and Social Influence
  • Peer-to-Peer Network Technologies
  • Genetics and Plant Breeding

Henan University
2015-2025

Dalian Maritime University
2022-2023

Beijing University of Technology
2021-2023

Shanghai University of Finance and Economics
2008

Outlier detection refers to the identification of data points that deviate from a general distribution. Existing unsupervised approaches often suffer high computational cost, complex hyperparameter tuning, and limited interpretability, especially when working with large, high-dimensional datasets. To address these issues, we present simple yet effective algorithm called ECOD (Empirical-Cumulative-distribution-based Detection), which is inspired by fact outliers are "rare events" appear in...

10.1109/tkde.2022.3159580 article EN IEEE Transactions on Knowledge and Data Engineering 2022-03-16

As the public cloud becomes one of leading ways in data-sharing nowadays, data confidentiality and user privacy are increasingly critical. Partially policy-hidden ciphertext policy attribute-based encryption (CP-ABE) can effectively protect while reducing leakage by hiding part access structure. However, it cannot satisfy need sharing with complex users large amounts data, both terms less expressive structures limited granularity hiding. Moreover, verification right to shared correctness...

10.1109/jiot.2021.3117378 article EN IEEE Internet of Things Journal 2021-10-05

Abstract Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve reliability issue of nodes existing TRE anonymous interaction schemes, we propose blockchain-based protocol for query trapdoors. In our protocol, recipient divides encrypted trapdoor request information into n ciphertext fragments using secret sharing technology near time, employs idea onion routing to perform...

10.1186/s13677-023-00536-1 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2024-01-02

10.1007/s10115-024-02159-7 article EN Knowledge and Information Systems 2024-07-05

To break the narrow diversity bottleneck of wheat D genome, a set Aegilops tauschii-wheat introgression (A-WI) lines was developed by crossing Ae. tauschii accession T015 with common elite cultivar Zhoumai 18 (Zhou18). A high-density genetic map constructed based on Single Nucleotide Polymorphism (SNP) markers and 15 yield-related traits were evaluated in 11 environments for detecting quantitative trait loci (QTL). total 27 environmentally stable QTL identified at least five environments, 20...

10.1016/j.cj.2023.05.001 article EN cc-by-nc-nd The Crop Journal 2023-05-30

Remote sensing image scene classification takes blocks as units and predicts their semantic descriptors. Because it is difficult to obtain enough labeled samples for all classes of remote scenes, zero-shot methods which can recognize scenes that are not seen in the training stage great significance. By projecting visual features class into latent space ensuring alignment, variational autoencoder (VAE) generative model has been applied address remote-sensing under a setting. However, VAE...

10.3390/rs14184533 article EN cc-by Remote Sensing 2022-09-11

Next Point-of-Interest (POI) recommendation has shown great value for both users and providers in location-based services. Existing methods mainly rely on partial information users’ check-in sequences, are brittle to with few interactions. Moreover, they ignore the impact of multi-dimensional auxiliary such as user frequency, POI category preferences modeling dynamic changes over different time periods performance. To address above limitations, we propose a novel method next by long short...

10.3390/ijgi12090352 article EN cc-by ISPRS International Journal of Geo-Information 2023-08-25

User influence in online social networks has been measured by different metrics and algorithms, these methods roughly fall into two main genres: attribute-based approaches graph-based approaches. However, most only consider single metric, such as total view counts or retweet counts. And cannot apply to the platforms where it is difficult obtain graphs of some metrics. In this paper, we propose a triangular fuzzy number-based method measure user influence, which covers multiple graph free. By...

10.1109/paap.2015.42 article EN 2015-12-01

Cryptographic primitive of timed-release encryption (TRE) enables the sender to encrypt a message which only allows designated receiver decrypt after time. Combined with other technologies, TRE technology is applied variety scenarios, including regularly posting on social network and online sealed bidding. Nowadays, in order control decryption time while maintaining anonymity user identities, most solutions adopt noninteractive server mode periodically broadcast trapdoors, but because these...

10.1155/2021/5593363 article EN cc-by Security and Communication Networks 2021-05-27

To address privacy concerns, data in the blockchain should be encrypted advance to avoid access from all users blockchain. However, cannot directly retrieved, which hinders sharing Several works have been proposed deal with this problem. retrieval these schemes requires participation of owners and lacks finer-grained control. In paper, we propose an attribute-based keyword search scheme over blockchain, allows files based on their attributes. addition, build a file chain structure improve...

10.32604/cmes.2021.015210 article EN Computer Modeling in Engineering & Sciences 2021-01-01

Proof of stake consensus algorithm (PoS) has the advantage not requiring arithmetic power, however, higher stake, more likely node will get right to account. As a result, accounting nodes are highly deterministic and rich richer, once with highest equity fails account for block properly. The rest have compete again rights, probability system stagnation increase sharply. To address these two shortcomings, based on dynamic delegation proof importance (DPoI) is proposed.The introduces an...

10.1145/3498851.3499007 article EN IEEE/WIC/ACM International Conference on Web Intelligence 2021-12-14

Summary With lots of public software descriptions emerging in the application market, it is significant to extract common features from these and recommend them new designers. However, existing approaches often according their frequencies which reflect designers' preferences. In order identify those users' favorite help design more popular software, this paper proposes make use data ratings products' downloads preferences extracted features. The proposed approach distinguishes perspective...

10.1002/spe.2845 article EN Software Practice and Experience 2020-06-03

10.1016/j.chemolab.2024.105193 article EN Chemometrics and Intelligent Laboratory Systems 2024-08-06

Next point-of-interest (POI) recommendation is to recommend the next POI that users may want visit according their check-in trajectories. When there are few check-ins in trajectories, it will cause cold-start problem traditional methods can't capture users' preferences accurately and no longer has ability forecast POI. Based on few-shot meta-learning method of MAML, this paper proposes a new named STMeta for users. Following learning, main idea proposed train model based long trajectories...

10.1109/icpeca56706.2023.10075890 article EN 2023-01-29

Abstract Cryptographic algorithm identification is the process of distinguishing or identifying cryptographic by analysing potential information various features in ciphertext under condition known ciphertext, which basis cryptanalysis work. To solve worse accuracy and stability problem single-layer scheme work as complexity enhances, interference between data number encryption algorithms increases, we propose a block cipher using deep learning Multi-Layer Perception (MLP) this paper. In...

10.21203/rs.3.rs-2768056/v1 preprint EN cc-by Research Square (Research Square) 2023-09-06

In recommender systems, user reviews on items contain rich semantic information, which can express users' preferences and item features. However, existing review-based recommendation methods either use the static word vector model or cannot effectively extract long sequence features in reviews, resulting limited ability of feature expression. Furthermore, impact different useless interactions between users performance is ignored. Therefore, we propose an attentional factorization machine...

10.1038/s41598-023-40633-4 article EN cc-by Scientific Reports 2023-08-18

As the core of location-based social networks (LBSNs), main task next point-of-interest (POI) recommendation is to predict possible POI through context information from users’ historical check-in trajectories. It well known that spatial–temporal contextual plays an important role in analyzing users behaviors. Moreover, between POIs provides a non-trivial correlation for modeling visiting preferences. Unfortunately, impact such and spatio–temporal unequal interval on user selection POI,...

10.3390/ijgi11110543 article EN cc-by ISPRS International Journal of Geo-Information 2022-10-29
Coming Soon ...