default search action
Xiangyang Luo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j209]Zhaorui Ma, Xinhao Hu, Fenlin Liu, Xiangyang Luo, Shicheng Zhang, Wenxin Tai, Guoming Ren, Zheng Er, Mingming Xu:
Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering. Inf. Process. Manag. 62(1): 103921 (2025) - [c73]Yunfan Xie, Lixin Zou, Dan Luo, Min Tang, Chenliang Li, Liming Dong, Xiangyang Luo:
Mitigating Language Confusion through Inference-time Intervention. COLING 2025: 8418-8431 - 2024
- [j208]Shuodi Zu, Xiangyang Luo, Liang Wang, Fan Zhang:
GUI: A Geolocation Method for Unreachable IP. Comput. J. 67(5): 1963-1978 (2024) - [j207]Xiaoyun Yuan, Tengyao Li, Lingling Li, Ruixiang Li, Zhiquan Wang, Xiangyang Luo:
HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch. Comput. Networks 241: 110217 (2024) - [j206]Wangxin Feng, Xiangyang Luo, Tengyao Li, Chunfang Yang:
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing. Comput. Secur. 139: 103701 (2024) - [j205]Zhiquan Wang, Tengyao Li, Meijuan Yin, Xiaoyun Yuan, Xiangyang Luo, Lingling Li:
WF3A: A N-shot website fingerprinting with effective fusion feature attention. Comput. Secur. 140: 103796 (2024) - [j204]Xiangyang Luo, Xingxing Chen, Xiaofeng Chen, Qingfeng Cheng:
A survey on the application of blockchain in cryptographic protocols. Cybersecur. 7(1): 79 (2024) - [j203]Xingxing Chen, Qingfeng Cheng, Weidong Yang, Xiangyang Luo:
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain. Frontiers Comput. Sci. 18(3): 183807 (2024) - [j202]Fan Zhang, Meijuan Yin, Fenlin Liu, Xiangyang Luo, Shuodi Zu:
IP2vec: an IP node representation model for IP geolocation. Frontiers Comput. Sci. 18(6): 186506 (2024) - [j201]Qilin Yin, Wei Lu, Xiaochun Cao, Xiangyang Luo, Yicong Zhou, Jiwu Huang:
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs. Int. J. Comput. Vis. 132(11): 5255-5269 (2024) - [j200]Maoyuan Wang, Jinwei Wang, Bin Ma, Xiangyang Luo:
Improving the transferability of adversarial examples through black-box feature attacks. Neurocomputing 595: 127863 (2024) - [j199]Jiangtao Ma, Bo Liu, Kunlin Li, Chenliang Li, Fan Zhang, Xiangyang Luo, Yaqiong Qiao:
A review of graph neural networks and pretrained language models for knowledge graph reasoning. Neurocomputing 609: 128490 (2024) - [j198]Zihao Li, Yunfan Xie, Wei Emma Zhang, Pengfei Wang, Lixin Zou, Fei Li, Xiangyang Luo, Chenliang Li:
Disentangle interest trend and diversity for sequential recommendation. Inf. Process. Manag. 61(2): 103619 (2024) - [j197]Na Li, Tianao Li, Zhaorui Ma, Xinhao Hu, Shicheng Zhang, Fenlin Liu, Xiaowen Quan, Xiangyang Luo, Guoming Ren, Hao Feng, Shubo Zhang:
HpGraphNEI: A network entity identification model based on heterophilous graph learning. Inf. Process. Manag. 61(5): 103810 (2024) - [j196]Jiangtao Ma, Kunlin Li, Fan Zhang, Yanjun Wang, Xiangyang Luo, Chenliang Li, Yaqiong Qiao:
TaReT: Temporal knowledge graph reasoning based on topology-aware dynamic relation graph and temporal fusion. Inf. Process. Manag. 61(6): 103848 (2024) - [j195]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo, Bin Ma:
Trustworthy adaptive adversarial perturbations in social networks. J. Inf. Secur. Appl. 80: 103675 (2024) - [j194]Jinwei Wang, Wanyun Huang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Adversarial watermark: A robust and reliable watermark against removal. J. Inf. Secur. Appl. 82: 103750 (2024) - [j193]Jiangtao Ma, Kunlin Li, Fan Zhang, Yanjun Wang, Xiangyang Luo, Chenliang Li, Yaqiong Qiao:
BGAT-CCRF: A novel end-to-end model for knowledge graph noise correction. Neural Networks 180: 106715 (2024) - [j192]Tong Qiao, Shichuang Xie, Yanli Chen, Florent Retraint, Xiangyang Luo:
Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning. IEEE Trans. Pattern Anal. Mach. Intell. 46(7): 4654-4668 (2024) - [j191]Tong Qiao, Yuxing Chen, Xiaofei Zhou, Ran Shi, Hang Shao, Kunye Shen, Xiangyang Luo:
CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images. IEEE Trans. Cogn. Dev. Syst. 16(1): 369-379 (2024) - [j190]Chun Mao, Zhenyu Li, Xiangyang Luo:
A Covert Communication Method Based on Time Attributes Shifting of Online Video Bullet Comment. IEEE Trans. Consumer Electron. 70(4): 6472-6483 (2024) - [j189]Xin Cheng, Jinwei Wang, Hao Wang, Xiangyang Luo, Bin Ma:
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge. IEEE Trans. Circuits Syst. Video Technol. 34(1): 632-646 (2024) - [j188]Yuanyuan Ma, Lige Xu, Yi Zhang, Tao Zhang, Xiangyang Luo:
Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1954-1969 (2024) - [j187]Hao Wang, Jinwei Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma, Bin Li, Jinsheng Sun:
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference. IEEE Trans. Circuits Syst. Video Technol. 34(6): 5191-5206 (2024) - [j186]Xingxing Jia, Ting Yu, Xiangyang Luo, Daoshun Wang, Huiyu Zhou:
Maximizing Contrast in XOR-Based Visual Cryptography Schemes. IEEE Trans. Circuits Syst. Video Technol. 34(12): 12849-12861 (2024) - [j185]Yuanfei Li, Xiong Li, Xiangyang Luo, Zhetao Li, Hongwei Li, Xiaosong Zhang:
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation. IEEE Trans. Dependable Secur. Comput. 21(4): 2552-2567 (2024) - [j184]Pei Zhang, Qingfeng Cheng, Mingliang Zhang, Xiangyang Luo:
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping. IEEE Trans. Dependable Secur. Comput. 21(5): 4469-4480 (2024) - [j183]Hao-Tian Wu, Yiu-Ming Cheung, Zhihong Tian, Dingcai Liu, Xiangyang Luo, Jiankun Hu:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. IEEE Trans. Inf. Forensics Secur. 19: 3719-3732 (2024) - [j182]Zuomin Qu, Zuping Xi, Wei Lu, Xiangyang Luo, Qian Wang, Bin Li:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. IEEE Trans. Inf. Forensics Secur. 19: 3943-3957 (2024) - [j181]Tong Qiao, Bin Zhao, Ran Shi, Meng Han, Mahmoud Hassaballah, Florent Retraint, Xiangyang Luo:
Scalable Universal Adversarial Watermark Defending Against Facial Forgery. IEEE Trans. Inf. Forensics Secur. 19: 8998-9011 (2024) - [j180]Jianqi Liu, Zhiwei Zhao, Xiangyang Luo, Pan Li, Geyong Min, Huiyong Li:
SlaugFL: Efficient Edge Federated Learning With Selective GAN-Based Data Augmentation. IEEE Trans. Mob. Comput. 23(12): 11191-11208 (2024) - [j179]Guangyong Gao, Hui Zhang, Zhihua Xia, Xiangyang Luo, Yun-Qing Shi:
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image. IEEE Trans. Multim. 26: 3909-3923 (2024) - [j178]Tong Qiao, Shichuang Xie, Yanli Chen, Florent Retraint, Ran Shi, Xiangyang Luo:
Deepfake Detection Fighting Against Noisy Label Attack. IEEE Trans. Multim. 26: 9047-9059 (2024) - [j177]Chong Liu, Ruixiang Li, Fuxiang Yuan, Shichang Ding, Yan Liu, Xiangyang Luo:
6Subpattern: Target Generation Based on Subpattern Analysis for Internet-Wide IPv6 Scanning. IEEE Trans. Netw. Serv. Manag. 21(4): 3692-3710 (2024) - [j176]Ziming Zhao, Zhaoxuan Li, Xiaofei Xie, Jiongchi Yu, Fan Zhang, Rui Zhang, Binbin Chen, Xiangyang Luo, Ming Hu, Wenrui Ma:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024) - [j175]Ruixiang Li, Xiaoyun Yuan, Meijuan Yin, Xiangyang Luo:
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers. IEEE/ACM Trans. Netw. 32(6): 5507-5523 (2024) - [j174]Yonghua Zhan, Yang Yang, Hongju Cheng, Xiangyang Luo, Zhangshuang Guan, Robert H. Deng:
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles. IEEE Trans. Serv. Comput. 17(5): 2762-2775 (2024) - [c72]Chaoran Zhang, Lixin Zou, Dan Luo, Xiangyang Luo, Zihao Li, Min Tang, Chenliang Li:
Efficient Sparse Attention needs Adaptive Token Release. ACL (Findings) 2024: 14081-14094 - [c71]Guisheng Liu, Yi Li, Zhengcong Fei, Haiyan Fu, Xiangyang Luo, Yanqing Guo:
Prefix-diffusion: A Lightweight Diffusion Model for Diverse Image Captioning. LREC/COLING 2024: 12954-12965 - [c70]Meng Zhang, Xiangyang Luo, Ningbo Huang:
Social Media User Geolocation Based on Large Language Models. DSPP (1) 2024: 304-312 - [c69]Jianqi Liu, Xiangyang Luo, Zhiwei Zhao, Zheng Chang, Miao Pan, Pan Li, Geyong Min, Huiyong Li:
Fed2VAEs: An Efficient Privacy-Preserving Federated Learning Approach Based on Variational Autoencoders. ICC 2024: 2634-2639 - [c68]Longlong Jiao, Meijuan Yin, Xiangyang Luo, Shunran Duan:
A Full-Granularity Anomaly Detection Model Based on Attribute-Enhanced Sampling. IJCNN 2024: 1-8 - [c67]Xin Cheng, Hao Wang, Jinwei Wang, Xiangyang Luo, Bin Ma:
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness. ACM Multimedia 2024: 6540-6548 - [c66]Xiangyang Luo, Xin Zhang, Yifan Xie, Xinyi Tong, Weijiang Yu, Heng Chang, Fei Ma, Fei Richard Yu:
CodeSwap: Symmetrically Face Swapping Based on Prior Codebook. ACM Multimedia 2024: 6910-6919 - [c65]Junyan Wu, Wei Lu, Xiangyang Luo, Rui Yang, Qian Wang, Xiaochun Cao:
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization. ACM Multimedia 2024: 7395-7403 - [i18]Chaoran Zhang, Lixin Zou, Dan Luo, Min Tang, Xiangyang Luo, Zihao Li, Chenliang Li:
Efficient Sparse Attention needs Adaptive Token Release. CoRR abs/2407.02328 (2024) - [i17]Junyan Wu, Wei Lu, Xiangyang Luo, Rui Yang, Qian Wang, Xiaochun Cao:
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization. CoRR abs/2407.16554 (2024) - [i16]Zuomin Qu, Wei Lu, Xiangyang Luo, Qian Wang, Xiaochun Cao:
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification. CoRR abs/2409.13349 (2024) - [i15]Yifan Xie, Tao Feng, Xin Zhang, Xiangyang Luo, Zixuan Guo, Weijiang Yu, Heng Chang, Fei Ma, Fei Richard Yu:
PointTalk: Audio-Driven Dynamic Lip Point Cloud for 3D Gaussian-based Talking Head Synthesis. CoRR abs/2412.08504 (2024) - [i14]Ziqi Sheng, Wei Lu, Xiangyang Luo, Jiantao Zhou, Xiaochun Cao:
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints. CoRR abs/2412.09981 (2024) - [i13]Cong Wang, Xiangyang Luo, Zijian Cai, Yiren Song, Yunlong Zhao, Yifan Bai, Yuhang He, Yihong Gong:
GridShow: Omni Visual Generation. CoRR abs/2412.10718 (2024) - [i12]Xiaocan Chen, Qilin Yin, Jiarui Liu, Wei Lu, Xiangyang Luo, Jiantao Zhou:
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection. CoRR abs/2412.13656 (2024) - 2023
- [j173]Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu, Yanli Chen, Ming Xu, Xiangyang Luo:
A novel model watermarking for protecting generative adversarial network. Comput. Secur. 127: 103102 (2023) - [j172]Yimin Liu, Xiangyang Luo, Zhiyuan Tao:
Construction of a high-precision general geographical location words dataset. Comput. Stand. Interfaces 84: 103692 (2023) - [j171]Fan Zhang, Fenlin Liu, Xiangyang Luo:
Correction: Geolocation of covert communication entity on the Internet for post-steganalysis. EURASIP J. Image Video Process. 2023(1): 2 (2023) - [j170]Wentong Fan, Zhenyu Li, Hao Li, Yi Zhang, Xiangyang Luo:
SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis. IET Image Process. 17(10): 2894-2906 (2023) - [j169]Yuanyuan Ma, Xinquan Yu, Xiangyang Luo, Dong Liu, Yi Zhang:
Adaptive feature selection for image steganalysis based on classification metrics. Inf. Sci. 644: 118973 (2023) - [j168]Yaqiong Qiao, Xiangyang Luo, Jiangtao Ma, Meng Zhang, Chenliang Li:
Twitter user geolocation based on heterogeneous relationship modeling and representation learning. Inf. Sci. 647: 119427 (2023) - [j167]Jun Chen, Xiangyang Luo, Liyan Zhu, Qikun Zhang, Yong Gan:
Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network. Multim. Tools Appl. 82(9): 13025-13043 (2023) - [j166]Xiuting Wang, Ruixiang Li, Shaoyong Du, Xiangyang Luo:
An accurate identification method for network devices based on spatial attention mechanism. Secur. Saf. 2: 2023002 (2023) - [j165]Yimin Liu, Xiangyang Luo, Zhiyuan Tao, Meng Zhang, Shaoyong Du:
UGCC: Social Media User Geolocation via Cyclic Coupling. IEEE Trans. Big Data 9(4): 1128-1141 (2023) - [j164]Yang Yang, Robert H. Deng, Wenzhong Guo, Hongju Cheng, Xiangyang Luo, Xianghan Zheng, Chunming Rong:
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer. IEEE Trans. Cloud Comput. 11(1): 247-262 (2023) - [j163]Chun Mao, Zhenyu Li, Mingliang Zhang, Yi Zhang, Xiangyang Luo:
A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments. IEEE Trans. Consumer Electron. 69(3): 568-580 (2023) - [j162]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo:
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks. IEEE Trans. Circuits Syst. Video Technol. 33(2): 562-574 (2023) - [j161]Yulan Zhang, Guopu Zhu, Xing Wang, Xiangyang Luo, Yicong Zhou, Hongli Zhang, Ligang Wu:
CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment. IEEE Trans. Circuits Syst. Video Technol. 33(5): 2019-2032 (2023) - [j160]Hansong Du, Jiu-fen Liu, Xiangyang Luo, Yi Zhang:
Extraction Method of Secret Message Based on Optimal Hypothesis Test. IEEE Trans. Dependable Secur. Comput. 20(6): 5265-5277 (2023) - [j159]Yuqian Ma, Qingfeng Cheng, Xiangyang Luo:
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning. IEEE Trans. Inf. Forensics Secur. 18: 5876-5889 (2023) - [j158]Tong Qiao, Jiasheng Wu, Ning Zheng, Ming Xu, Xiangyang Luo:
FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing. IEEE Trans. Multim. 25: 7350-7363 (2023) - [j157]Shichang Ding, Xiangyang Luo, Jinwei Wang, Xiaoming Fu:
GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework. IEEE Trans. Netw. Sci. Eng. 10(6): 3543-3560 (2023) - [j156]Hao Li, Jinwei Wang, Neal Xiong, Yi Zhang, Athanasios V. Vasilakos, Xiangyang Luo:
A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning. ACM Trans. Multim. Comput. Commun. Appl. 19(6): 214:1-214:23 (2023) - [j155]Yang Yang, Chunming Rong, Xianghan Zheng, Hongju Cheng, Victor Chang, Xiangyang Luo, Zuoyong Li:
Time Controlled Expressive Predicate Query With Accountable Anonymity. IEEE Trans. Serv. Comput. 16(2): 1444-1457 (2023) - [c64]Qingfeng Cheng, Jinzheng Cao, Xiangyang Luo:
Quantum Augmented Lattice Attack on NTRU with Side Information. Inscrypt (2) 2023: 317-328 - [c63]Hao Li, Xiangyang Luo, Yi Zhang:
Improving CoatNet for Spatial and JPEG Domain Steganalysis. ICME 2023: 1241-1246 - [c62]Yi Li, Xin Xie, Haiyan Fu, Xiangyang Luo, Yanqing Guo:
A Compact Transformer for Adaptive Style Transfer. ICME 2023: 2687-2692 - [c61]Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. IH&MMSec 2023: 13-18 - [c60]Hao Wu, Jinwei Wang, Jiawei Zhang, Yufeng Wu, Bin Ma, Xiangyang Luo:
Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum. IJCNN 2023: 1-8 - [c59]Jinwei Wang, Maoyuan Wang, Hao Wu, Bin Ma, Xiangyang Luo:
Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum. PRCV (9) 2023: 421-432 - [i11]Jinwei Wang, Hao Wu, Haihua Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples. CoRR abs/2303.04502 (2023) - [i10]Guisheng Liu, Yi Li, Zhengcong Fei, Haiyan Fu, Xiangyang Luo, Yanqing Guo:
Prefix-diffusion: A Lightweight Diffusion Model for Diverse Image Captioning. CoRR abs/2309.04965 (2023) - 2022
- [j154]Tengyao Li, Kaiyue Liu, Wangxin Feng, Chunfang Yang, Xiangyang Luo:
HeteroTiC: A robust network flow watermarking based on heterogeneous time channels. Comput. Networks 219: 109424 (2022) - [j153]Wenyan Liu, Xiangyang Luo, Guo Wei, Huaixing Liu:
Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy. Comput. Commun. 192: 289-298 (2022) - [j152]Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths. Digit. Commun. Networks 8(4): 455-465 (2022) - [j151]Shuodi Zu, Xiangyang Luo, Fan Zhang:
IP-geolocater: a more reliable IP geolocation algorithm based on router error training. Frontiers Comput. Sci. 16(1): 161504 (2022) - [j150]Rong Cao, Xiangyang Luo, Yaoyi Xi, Yaqiong Qiao:
Stance detection for online public opinion awareness: An overview. Int. J. Intell. Syst. 37(12): 11944-11965 (2022) - [j149]Xingxing Jia, Yusheng Guo, Xiangyang Luo, Daoshun Wang, Chaoyang Zhang:
A perfect secret sharing scheme for general access structures. Inf. Sci. 595: 54-69 (2022) - [j148]Yimin Liu, Xiangyang Luo, Meng Zhang, Zhiyuan Tao, Fenlin Liu:
Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio. J. Netw. Comput. Appl. 199: 103302 (2022) - [j147]Fan Wu, Xiong Li, Xiangyang Luo, Ke Gu:
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. J. Syst. Archit. 132: 102737 (2022) - [j146]Tong Qiao, Xiangyang Luo, Hongwei Yao, Ran Shi:
Classifying between computer generated and natural images: An empirical study from RAW to JPEG format. J. Vis. Commun. Image Represent. 85: 103506 (2022) - [j145]Jian Chen, Hao-Tian Wu, Lu Lu, Xiangyang Luo, Jiankun Hu:
Single underwater image haze removal with a learning-based approach to blurriness estimation. J. Vis. Commun. Image Represent. 89: 103656 (2022) - [j144]Junfeng Wu, Jinwei Wang, Junjie Zhao, Xiangyang Luo, Bin Ma:
ESGAN for generating high quality enhanced samples. Multim. Syst. 28(5): 1809-1822 (2022) - [j143]Hansong Du, Jiu-fen Liu, Yu-guo Tian, Xiangyang Luo:
Steganographic key recovery for adaptive steganography under "known-message attacks". Multim. Tools Appl. 81(8): 10981-11004 (2022) - [j142]Jinwei Wang, Kehui Zeng, Bin Ma, Xiangyang Luo, Qilin Yin, Guangjie Liu, Sunil Kr. Jha:
GAN-generated fake face detection via two-stream CNN with PRNU in the wild. Multim. Tools Appl. 81(29): 42527-42545 (2022) - [j141]Yuchen Sun, Xiangyang Luo, Han Wang, Zhaorui Ma:
A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic. Secur. Commun. Networks 2022: 3306098:1-3306098:12 (2022) - [j140]Xiaoshuai Wu, Tong Qiao, Yanli Chen, Ming Xu, Ning Zheng, Xiangyang Luo:
Sign steganography revisited with robust domain selection. Signal Process. 196: 108522 (2022) - [j139]Qilin Yin, Jinwei Wang, Wei Lu, Xiangyang Luo:
Contrastive Learning based Multi-task Network for Image Manipulation Detection. Signal Process. 201: 108709 (2022) - [j138]Mingliang Zhang, Zhenyu Li, Pei Zhang, Yi Zhang, Xiangyang Luo:
A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks. Symmetry 14(1): 111 (2022) - [j137]Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput. 10(1): 474-490 (2022) - [j136]Liyan Zhu, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
Inverse Interpolation and Its Application in Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4052-4064 (2022) - [j135]Hao Wang, Jinwei Wang, Xiangyang Luo, Yuhui Zheng, Bin Ma, Jinsheng Sun, Sunil Kr. Jha:
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4065-4080 (2022) - [j134]Jie Chang, Guopu Zhu, Hongli Zhang, Yicong Zhou, Xiangyang Luo, Ligang Wu:
Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5055-5067 (2022) - [j133]Haorui Wu, Xiaolong Li, Xiangyang Luo, Xinpeng Zhang, Yao Zhao:
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5989-6001 (2022) - [j132]Xiangyang Luo, Pei Zhang, Mingliang Zhang, Hao Li, Qingfeng Cheng:
A Novel Covert Communication Method Based on Bitcoin Transaction. IEEE Trans. Ind. Informatics 18(4): 2830-2839 (2022) - [j131]Jinwei Wang, Junjie Zhao, Qilin Yin, Xiangyang Luo, Yuhui Zheng, Yun-Qing Shi, Sunil Kr. Jha:
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection. IEEE Trans. Multim. 24: 230-244 (2022) - [j130]Pei Zhang, Qingfeng Cheng, Mingliang Zhang, Xiangyang Luo:
A Group Covert Communication Method of Digital Currency Based on Blockchain Technology. IEEE Trans. Netw. Sci. Eng. 9(6): 4266-4276 (2022) - [j129]Zuquan Liu, Guopu Zhu, Feng Ding, Xiangyang Luo, Sam Kwong, Peng Li:
Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes. ACM Trans. Multim. Comput. Commun. Appl. 18(3s): 148:1-148:16 (2022) - [j128]Guo Wei, Xiangyang Luo, Shichang Ding, Baoshan Yang, Wenyan Liu:
DR-NET: a novel mobile anchor-assisted localization method based on the density of nodes distribution. Wirel. Networks 28(8): 3431-3451 (2022) - [c58]Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo:
Watch Out for Race Condition Attacks When Using Android External Storage. CCS 2022: 891-904 - [c57]Guisheng Liu, Yi Li, Yanqing Guo, Xiangyang Luo, Bo Wang:
Multi-Attribute Controlled Text Generation with Contrastive-Generator and External-Discriminator. COLING 2022: 5904-5913 - [c56]Pei Zhou, Xiangyang Luo, Shaoyong Du, Wenqi Shi, Jiashan Guo:
A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning. ICBDS 2022: 63-79 - [c55]Xiuting Wang, Xiangyang Luo, Shaoyong Du, Lingling Li, Yang Yang, Fenlin Liu:
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment. ICAIS (3) 2022: 663-677 - [c54]Hao Wu, Jinwei Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method. IWDW 2022: 83-97 - [i9]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo:
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks. CoRR abs/2204.12050 (2022) - [i8]Qingliang Liu, Jiangqun Ni, Weizhe Zhang, Xiangyang Luo, Jiwu Huang:
A Robust Image Steganographic Scheme against General Scaling Attacks. CoRR abs/2212.02822 (2022) - 2021
- [j127]Fang Cao, Jiayi Sun, Xiangyang Luo, Chuan Qin, Ching-Chun Chang:
Privacy-preserving inpainting for outsourced image. Int. J. Distributed Sens. Networks 17(11): 155014772110590 (2021) - [j126]Jiarui Liu, Kaiman Zhu, Wei Lu, Xiangyang Luo, Xianfeng Zhao:
A lightweight 3D convolutional neural network for deepfake detection. Int. J. Intell. Syst. 36(9): 4990-5004 (2021) - [j125]Jiadong Guo, Rui Xu, Wenqi Shi, Pei Zhou, Xiangyang Luo:
Instant messaging user geolocating method based on multi-source information association. Int. J. Sens. Networks 35(2): 99-110 (2021) - [j124]Yi Zhang, Xiangyang Luo, Jinwei Wang, Yanqing Guo, Fenlin Liu:
Image robust adaptive steganography adapted to lossy channels in open social networks. Inf. Sci. 564: 306-326 (2021) - [j123]Zhiyuan Tao, Fenlin Liu, Yan Liu, Xiangyang Luo:
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching. KSII Trans. Internet Inf. Syst. 15(8): 2764-2782 (2021) - [j122]Hansong Du, Jiu-fen Liu, Yu-guo Tian, Xiangyang Luo:
Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes. Secur. Commun. Networks 2021: 5495941:1-5495941:16 (2021) - [j121]Shichang Ding, Fan Zhao, Xiangyang Luo:
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers. Secur. Commun. Networks 2021: 6658642:1-6658642:11 (2021) - [j120]Nianwen Si, Wenlin Zhang, Dan Qu, Xiangyang Luo, Heyu Chang, Tong Niu:
Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models. Secur. Commun. Networks 2021: 6682293:1-6682293:13 (2021) - [j119]Liyan Zhu, Jinwei Wang, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks. Secur. Commun. Networks 2021: 9864833:1-9864833:15 (2021) - [j118]Liyan Zhu, Xiangyang Luo, Chunfang Yang, Yi Zhang, Fenlin Liu:
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Signal Process. 183: 108015 (2021) - [j117]Tong Qiao, Shuai Wang, Xiangyang Luo, Zhiqiang Zhu:
Robust steganography resisting JPEG compression by improving selection of cover element. Signal Process. 183: 108048 (2021) - [j116]Yanqing Guo, Caijuan Ji, Xin Zheng, Qianyu Wang, Xiangyang Luo:
Multi-scale Multi-attention Network for Moiré Document Image Binarization. Signal Process. Image Commun. 90: 116046 (2021) - [j115]Wenqi Shi, Xiangyang Luo, Jiadong Guo, Chong Liu, Fenlin Liu:
Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis. IEEE Trans. Comput. Soc. Syst. 8(2): 319-331 (2021) - [j114]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021) - [j113]Tong Qiao, Xiangyang Luo, Ting Wu, Ming Xu, Zhenxing Qian:
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images. IEEE Trans. Dependable Secur. Comput. 18(6): 2736-2751 (2021) - [j112]Ruixiang Li, Rui Xu, Yuanyuan Ma, Xiangyang Luo:
LandmarkMiner: Street-level Network Landmarks Mining Method for IP Geolocation. ACM Trans. Internet Things 2(3): 21:1-21:22 (2021) - [j111]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun Qing Shi, Sunil Kr. Jha:
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature. ACM Trans. Multim. Comput. Commun. Appl. 17(4): 138:1-138:18 (2021) - [c53]Jiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma, Naixue Xiong:
Imperceptible and Reliable Adversarial Attack. FCS 2021: 49-62 - [c52]Yimin Liu, Xiangyang Luo, Han Li:
Microblog User Location Inference Based on POI and Query Likelihood Model. ICICS (1) 2021: 464-480 - [c51]Junfeng Wu, Jinwei Wang, Junjie Zhao, Xiangyang Luo:
StrGAN for Generating Enhanced Samples. ISPEC 2021: 363-373 - [c50]Hao Wang, Jinwei Wang, Xiangyang Luo, Qilin Yin, Bin Ma, Jinsheng Sun:
Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics. IWDW 2021: 72-86 - [c49]Xiangyang Luo, Chao Zhang, Zhao Lv:
Research of Robust Video Object Tracking Algorithm Based on Jetson Nano Embedded Platform. PRCV (1) 2021: 392-403 - [c48]Zhenyu Li, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors:
Self-embedding watermarking method for G-code used in 3D printing. WIFS 2021: 1-6 - [i7]Shichang Ding, Xiangyang Luo, Jinwei Wang, Neal Naixue Xiong:
GCN-Geo: A Graph Convolution Network-based Fine-grained IP Geolocation System. CoRR abs/2112.10767 (2021) - 2020
- [j110]Fan Zhang, Fenlin Liu, Xiangyang Luo:
Geolocation of covert communication entity on the Internet for post-steganalysis. EURASIP J. Image Video Process. 2020(1): 15 (2020) - [j109]Zhiqian Zhang, Chenliang Li, Zhiyong Wu, Aixin Sun, Dengpan Ye, Xiangyang Luo:
NEXT: a neural network framework for next POI recommendation. Frontiers Comput. Sci. 14(2): 314-333 (2020) - [j108]Yan Li, Junwei Wang, Xiangyang Luo:
A reversible database watermarking method non-redundancy shifting-based histogram gaps. Int. J. Distributed Sens. Networks 16(5) (2020) - [j107]Chunfang Yang, Yuhan Kang, Fenlin Liu, Xiaofeng Song, Jie Wang, Xiangyang Luo:
Color image steganalysis based on embedding change probabilities in differential channels. Int. J. Distributed Sens. Networks 16(5) (2020) - [j106]Yaqiong Qiao, Xiangyang Luo, Chenliang Li, Hechan Tian, Jiangtao Ma:
Heterogeneous graph-based joint representation learning for users and POIs in location-based social network. Inf. Process. Manag. 57(2): 102151 (2020) - [j105]Xiangyang Luo, Yaqiong Qiao, Chenliang Li, Jiangtao Ma, Yimin Liu:
An overview of microblog user geolocation methods. Inf. Process. Manag. 57(6): 102375 (2020) - [j104]Jinwei Wang, Qiye Ni, Guangjie Liu, Xiangyang Luo, Sunil Kr. Jha:
Image splicing detection based on convolutional neural network with weight combination strategy. J. Inf. Secur. Appl. 54: 102523 (2020) - [j103]Hechan Tian, Fenlin Liu, Xiangyang Luo, Fan Zhang, Yaqiong Qiao:
Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection. KSII Trans. Internet Inf. Syst. 14(10): 3972-3988 (2020) - [j102]Zhenkun Bao, Yanqing Guo, Xiaolong Li, Yi Zhang, Meng Xu, Xiangyang Luo:
Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J. Ambient Intell. Humaniz. Comput. 11(5): 1903 (2020) - [j101]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J. Real Time Image Process. 17(1): 7-16 (2020) - [j100]Yi Zhang, Xiangyang Luo, Xiaodong Zhu, Zhenyu Li, Adrian G. Bors:
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes. J. Real Time Image Process. 17(1): 115-123 (2020) - [j99]Baojun Qi, Chunfang Yang, Lei Tan, Xiangyang Luo, Fenlin Liu:
A novel haze image steganography method via cover-source switching. J. Vis. Commun. Image Represent. 70: 102814 (2020) - [j98]Shiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo:
Anti-steganalysis for image on convolutional neural networks. Multim. Tools Appl. 79(7-8): 4315-4331 (2020) - [j97]Lei Tan, Chunfang Yang, Fenlin Liu, Xiangyang Luo, Baojun Qi, Zhenyu Li:
Steganalysis of homogeneous-representation based steganography for high dynamic range images. Multim. Tools Appl. 79(27-28): 20079-20105 (2020) - [j96]Meijuan Yin, Wen Yang, Xiaonan Liu, Xiangyang Luo:
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation. Secur. Commun. Networks 2020: 8843188:1-8843188:15 (2020) - [j95]Jinwei Wang, Hao Wang, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2736-2749 (2020) - [j94]Yi Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu:
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2750-2764 (2020) - [j93]Shuangke Wu, Yanjiao Chen, Minghui Li, Xiangyang Luo, Zhe Liu, Lan Liu:
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools. IEEE/ACM Trans. Netw. 28(2): 874-887 (2020) - [c47]Fuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, Xiangyang Luo:
Network Topology Boundary Routing IP Identification for IP Geolocation. ICAIS (2) 2020: 534-544 - [c46]Chong Liu, Xiangyang Luo, Fuxiang Yuan, Fenlin Liu:
RNBG: A Ranking Nodes Based IP Geolocation Method. INFOCOM Workshops 2020: 80-84 - [c45]Qilin Yin, Jinwei Wang, Xiangyang Luo:
A Hybrid Loss Network for Localization of Image Manipulation. IWDW 2020: 237-247 - [c44]Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Steganalysis of Adaptive Steganography Under the Known Cover Image. SPDE 2020: 560-574 - [c43]Hechan Tian, Meng Zhang, Xiangyang Luo, Fenlin Liu, Yaqiong Qiao:
Twitter User Location Inference Based on Representation Learning and Label Propagation. WWW 2020: 2648-2654
2010 – 2019
- 2019
- [j92]Qilin Yin, Jinwei Wang, Xiangyang Luo, Jiangtao Zhai, Sunil Kr. Jha, Yun-Qing Shi:
Quaternion Convolutional Neural Network for Color Image Classification and Forensics. IEEE Access 7: 20293-20301 (2019) - [j91]Jun Chen, Xiangyang Luo, Yingying Liu, Jinwei Wang, Yuanyuan Ma:
Selective Learning Confusion Class for Text-Based CAPTCHA Recognition. IEEE Access 7: 22246-22259 (2019) - [j90]Yue Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu:
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection. IEEE Access 7: 24282-24289 (2019) - [j89]Fuxiang Yuan, Fenlin Liu, Donghua Huang, Yan Liu, Xiangyang Luo:
A High Completeness PoP Partition Algorithm for IP Geolocation. IEEE Access 7: 28340-28355 (2019) - [j88]Fan Zhao, Rui Xu, Ruixiang Li, Ma Zhu, Xiangyang Luo:
Street-Level Geolocation Based on Router Multilevel Partitioning. IEEE Access 7: 59237-59248 (2019) - [j87]Qikun Zhang, Yongjiao Li, Yong Gan, Chuanyang Zheng, Xiangyang Luo, Jun Zheng:
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication. IEEE Access 7: 87085-87096 (2019) - [j86]Hao Wang, Jinwei Wang, Jiangtao Zhai, Xiangyang Luo:
Detection of Triple JPEG Compressed Color Images. IEEE Access 7: 113094-113102 (2019) - [j85]Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang:
A Comprehensive Survey on Secure Outsourced Computation and Its Applications. IEEE Access 7: 159426-159465 (2019) - [j84]Fan Zhao, Wenqi Shi, Yong Gan, Ziru Peng, Xiangyang Luo:
A localization and tracking scheme for target gangs based on big data of Wi-Fi locations. Clust. Comput. 22(Suppl 1): 1679-1690 (2019) - [j83]Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Qingfeng Cheng, Fenlin Liu:
IP Geolocation based on identification routers and local delay distribution similarity. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j82]Jian Li, Jinwei Wang, Shuang Yu, Xiangyang Luo:
A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation. Int. J. Digit. Crime Forensics 11(1): 100-113 (2019) - [j81]Yuhan Kang, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo, Ping Wang:
Color image steganalysis based on channel gradient correlation. Int. J. Distributed Sens. Networks 15(5) (2019) - [j80]Wenyan Liu, Xiangyang Luo, Qing Mu, Yimin Liu, Fenlin Liu:
An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition. Int. J. Distributed Sens. Networks 15(5) (2019) - [j79]Xingxing Jia, Daoshun Wang, Daxin Nie, Xiangyang Luo, Jonathan Zheng Sun:
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Inf. Sci. 473: 13-30 (2019) - [j78]Jinwei Wang, Yangyang Li, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness. J. Inf. Secur. Appl. 47: 353-362 (2019) - [j77]Hongyong Jia, Yue Chen, Yan Li, Xincheng Yan, Fenlin Liu, Xiangyang Luo, Bo Wang:
Attributes revocation through ciphertext puncturation. J. Inf. Secur. Appl. 48 (2019) - [j76]Jiu-fen Liu, Junjun Gan, Junchao Wang, Che Xu, Xiangyang Luo:
Efficient stego key recovery based on distribution differences of extracting message bits. J. Real Time Image Process. 16(3): 649-660 (2019) - [j75]Artur Janicki, Wojciech Mazurczyk, Xiangyang Luo, Dengpan Ye:
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes. J. Univers. Comput. Sci. 25(9): 1039-1042 (2019) - [j74]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Steganalysis aided by fragile detection of image manipulations. Multim. Tools Appl. 78(16): 23309-23328 (2019) - [j73]Qikun Zhang, Yongjiao Li, Zhigang Li, Junling Yuan, Yong Gan, Xiangyang Luo:
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things. Sensors 19(23): 5237 (2019) - [j72]Yuanyuan Ma, Xiangyang Luo, Xiaolong Li, Zhenkun Bao, Yi Zhang:
Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction. IEEE Trans. Circuits Syst. Video Technol. 29(2): 336-350 (2019) - [j71]Zhenxing Qian, Haisheng Xu, Xiangyang Luo, Xinpeng Zhang:
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(2): 351-362 (2019) - [j70]Jinwei Wang, Ting Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain. IEEE Trans. Circuits Syst. Video Technol. 29(9): 2775-2785 (2019) - [j69]Qian Wang, Jing Huang, Yanjiao Chen, Cong Wang, Fu Xiao, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. IEEE Trans. Inf. Forensics Secur. 14(2): 374-386 (2019) - [j68]Shuangke Wu, Yanjiao Chen, Qian Wang, Minghui Li, Cong Wang, Xiangyang Luo:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. IEEE Trans. Inf. Forensics Secur. 14(7): 1687-1701 (2019) - [j67]Tong Qiao, Ran Shi, Xiangyang Luo, Ming Xu, Ning Zheng, Yiming Wu:
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication. IEEE Trans. Multim. 21(5): 1077-1092 (2019) - [j66]Libing Wu, Cong Quan, Chenliang Li, Qian Wang, Bolong Zheng, Xiangyang Luo:
A Context-Aware User-Item Representation Learning for Item Recommendation. ACM Trans. Inf. Syst. 37(2): 22:1-22:29 (2019) - [c42]Yuanyuan Ma, Xiangyang Luo, Zhenyu Li, Yi Zhang, Adrian G. Bors:
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion. ACM TUR-C 2019: 66:1-66:5 - [c41]Xiangyang Luo, Xiangying Ran, Wei Sun, Yunlai Xu, Chongjun Wang:
A Label-Specific Attention-Based Network with Regularized Loss for Multi-label Classification. ICANN (2) 2019: 731-742 - [c40]Te Ma, Fenlin Liu, Fan Zhang, Xiangyang Luo:
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement. ICAIS (3) 2019: 163-177 - [c39]Tianyu Gao, Yanqing Guo, Xin Zheng, Qianyu Wang, Xiangyang Luo:
Moiré Pattern Removal with Multi-scale Feature Enhancing Network. ICME Workshops 2019: 240-245 - [c38]Chenliang Li, Xichuan Niu, Xiangyang Luo, Zhenzhong Chen, Cong Quan:
A Review-Driven Neural Model for Sequential Recommendation. IJCAI 2019: 2866-2872 - [c37]Wei Sun, Xiangying Ran, Xiangyang Luo, Chongjun Wang:
An Efficient Framework by Topic Model for Multi-label Text Classification. IJCNN 2019: 1-7 - [c36]Yunlai Xu, Xiangying Ran, Wei Sun, Xiangyang Luo, Chongjun Wang:
Gated Neural Network with Regularized Loss for Multi-label Text Classification. IJCNN 2019: 1-8 - [c35]Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - [c34]Jinwei Wang, Wei Huang, Xiangyang Luo, Yung-Qing Shi:
Double JPEG Compression Detection Based on Markov Model. IWDW 2019: 141-149 - [c33]Canwen Xu, Jing Li, Xiangyang Luo, Jiaxin Pei, Chenliang Li, Donghong Ji:
DLocRL: A Deep Learning Pipeline for Fine-Grained Location Recognition and Linking in Tweets. WWW 2019: 3391-3397 - [i6]Canwen Xu, Jing Li, Xiangyang Luo, Jiaxin Pei, Chenliang Li, Donghong Ji:
DLocRL: A Deep Learning Pipeline for Fine-Grained Location Recognition and Linking in Tweets. CoRR abs/1901.07005 (2019) - [i5]Chenliang Li, Xichuan Niu, Xiangyang Luo, Zhenzhong Chen, Cong Quan:
A Review-Driven Neural Model for Sequential Recommendation. CoRR abs/1907.00590 (2019) - [i4]Shichang Ding, Xiangyang Luo, Dengpan Ye, Fenlin Liu:
Delay-Distance Correlation Study for IP Geolocation. CoRR abs/1909.02439 (2019) - [i3]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo:
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection. CoRR abs/1910.13111 (2019) - 2018
- [j65]Qianyu Wang, Yanqing Guo, Jiujun Wang, Xiangyang Luo, Xiangwei Kong:
Multi-View Analysis Dictionary Learning for Image Classification. IEEE Access 6: 20174-20183 (2018) - [j64]Shuodi Zu, Xiangyang Luo, Siqi Liu, Yan Liu, Fenlin Liu:
City-Level IP Geolocation Algorithm Based on PoP Network Topology. IEEE Access 6: 64867-64875 (2018) - [j63]Chunfang Yang, Xiangyang Luo, Jicang Lu, Fenlin Liu:
Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci. 61(11): 119103:1-119103:3 (2018) - [j62]Yimin Liu, Wenyan Liu, Xiangyang Luo:
Survey on the Indoor Localization Technique of Wi-Fi Access Points. Int. J. Digit. Crime Forensics 10(3): 27-42 (2018) - [j61]Wenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng, Qingfeng Cheng, Yong Gan:
Geolocating a WeChat user based on the relation between reported and actual distance. Int. J. Distributed Sens. Networks 14(4) (2018) - [j60]Chuan Qin, Xueqin Chen, Xiangyang Luo, Xinpeng Zhang, Xingming Sun:
Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423: 284-302 (2018) - [j59]Chuan Qin, Zhihong He, Xiangyang Luo, Jing Dong:
Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf. Sci. 465: 285-304 (2018) - [j58]Jicang Lu, Chunfang Yang, Fenlin Liu, Xiangyang Luo:
Quantitative steganalysis of JPEG additive steganography based on boundary effect. J. Electronic Imaging 27(2): 023004 (2018) - [j57]Qikun Zhang, Yong Gan, Lu Liu, Xianmin Wang, Xiangyang Luo, Yuanzhang Li:
An authenticated asymmetric group key agreement based on attribute encryption. J. Netw. Comput. Appl. 123: 1-10 (2018) - [j56]Yang Zhou, Qing Xu, Xiangyang Luo, Fenlin Liu, Long Zhang, Xiaofei Hu:
网络空间测绘的概念及其技术体系的研究 (Research on Definition and Technological System of Cyberspace Surveying and Mapping). 计算机科学 45(5): 1-4 (2018) - [j55]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Blind forensics of image gamma transformation and its application in splicing detection. J. Vis. Commun. Image Represent. 55: 80-90 (2018) - [j54]Yi Zhang, Xiaodong Zhu, Chuan Qin, Chunfang Yang, Xiangyang Luo:
Dither modulation based adaptive steganography resisting jpeg compression and statistic detection. Multim. Tools Appl. 77(14): 17913-17935 (2018) - [j53]Che Xu, Jiu-fen Liu, Junjun Gan, Xiangyang Luo:
Stego key recovery based on the optimal hypothesis test. Multim. Tools Appl. 77(14): 17973-17992 (2018) - [j52]Junjun Gan, Jiu-fen Liu, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Reliable steganalysis of HUGO steganography based on partially known plaintext. Multim. Tools Appl. 77(14): 18007-18027 (2018) - [j51]Ruixiang Li, Yuchen Sun, Jianwei Hu, Te Ma, Xiangyang Luo:
Street-Level Landmark Evaluation Based on Nearest Routers. Secur. Commun. Networks 2018: 2507293:1-2507293:12 (2018) - [j50]Krzysztof Szczypiorski, Liqiang Wang, Xiangyang Luo, Dengpan Ye:
Big Data Analytics for Information Security. Secur. Commun. Networks 2018: 7657891:1-7657891:2 (2018) - [j49]Yi Zhang, Chuan Qin, Weiming Zhang, Fenlin Liu, Xiangyang Luo:
On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146: 99-111 (2018) - [j48]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Parameter estimation of image gamma transformation based on zero-value histogram bin locations. Signal Process. Image Commun. 64: 33-45 (2018) - [j47]Ziru Peng, Xiangyang Luo, Fan Zhao, Qingfeng Cheng, Fenlin Liu:
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device. Wirel. Commun. Mob. Comput. 2018: 2769417:1-2769417:19 (2018) - [c32]Shiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo:
Attack on Deep Steganalysis Neural Networks. ICCCS (4) 2018: 265-276 - [c31]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. INFOCOM 2018: 792-800 - [c30]Nan Xu, Yanqing Guo, Xin Zheng, Qianyu Wang, Xiangyang Luo:
Partial Multi-view Subspace Clustering. ACM Multimedia 2018: 1794-1801 - 2017
- [j46]Zhe Chen, Jicang Lu, Pengfei Yang, Xiangyang Luo:
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation. Int. J. Digit. Crime Forensics 9(4): 48-61 (2017) - [j45]Xiaofeng Song, Fenlin Liu, Liju Chen, Chunfang Yang, Xiangyang Luo:
Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography. KSII Trans. Internet Inf. Syst. 11(1): 552-569 (2017) - [j44]Yi Zhang, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Xiaofeng Song, Jicang Lu:
Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank. J. Electronic Imaging 26(1): 13011 (2017) - [j43]Zhenkun Bao, Xiaolong Li, Xiangyang Luo:
On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband. J. Electronic Imaging 26(1): 13025 (2017) - [j42]Yi Zhang, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multim. Tools Appl. 76(3): 3649-3668 (2017) - [j41]Zhenkun Bao, Xiangyang Luo, Weiming Zhang, Chunfang Yang, Fenlin Liu:
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method. Multim. Tools Appl. 76(12): 14345-14374 (2017) - [j40]Xiaofeng Song, Fenlin Liu, Zhengui Zhang, Chunfang Yang, Xiangyang Luo, Liju Chen:
2D Gabor filters-based steganalysis of content-adaptive JPEG steganography. Multim. Tools Appl. 76(24): 26391-26419 (2017) - [j39]Jun Chen, Xiangyang Luo, Yanqing Guo, Yi Zhang, Daofu Gong:
A Survey on Breaking Technique of Text-Based CAPTCHA. Secur. Commun. Networks 2017: 6898617:1-6898617:15 (2017) - [j38]Jiujun Wang, Yanqing Guo, Jun Guo, Xiangyang Luo, Xiangwei Kong:
Class-Aware Analysis Dictionary Learning for Pattern Classification. IEEE Signal Process. Lett. 24(12): 1822-1826 (2017) - [c29]Wenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng, Yong Gan:
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance. CSS 2017: 223-235 - [c28]Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Fenlin Liu:
IP Geolocation Base on Local Delay Distribution Similarity. CSS 2017: 383-395 - [c27]Chunfang Yang, Yi Zhang, Ping Wang, Xiangyang Luo, Fenlin Liu, Jicang Lu:
Steganalysis Feature Subspace Selection Based on Fisher Criterion. DSAA 2017: 514-521 - [c26]Fan Zhao, Jingning Chen, Dengpan Ye, Xiangyang Luo:
A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes. DSC 2017: 140-144 - [c25]Mingyue Li, Xiangyang Luo, Wenqi Shi, Lixiang Chai:
City-level IP geolocation based on network topology community detection. ICOIN 2017: 578-583 - [i2]Zhiqian Zhang, Chenliang Li, Zhiyong Wu, Aixin Sun, Dengpan Ye, Xiangyang Luo:
NEXT: A Neural Network Framework for Next POI Recommendation. CoRR abs/1704.04576 (2017) - [i1]Nan Xu, Yanqing Guo, Jiujun Wang, Xiangyang Luo, Ran He:
Joint Adaptive Neighbours and Metric Learning for Multi-view Subspace Clustering. CoRR abs/1709.03656 (2017) - 2016
- [j37]Jiu-fen Liu, Yu-guo Tian, Tao Han, Junchao Wang, Xiangyang Luo:
Stego key searching for LSB steganography on JPEG decompressed image. Sci. China Inf. Sci. 59(3): 32105:1-32105:15 (2016) - [j36]Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu:
A landmark calibration-based IP geolocation approach. EURASIP J. Inf. Secur. 2016: 4 (2016) - [j35]Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu:
Random table and hash coding-based binary code obfuscation against stack trace analysis. IET Inf. Secur. 10(1): 18-27 (2016) - [j34]Ping Wang, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling. Int. J. Digit. Crime Forensics 8(2): 36-47 (2016) - [j33]Chuan Qin, Dengpan Ye, Xiangyang Luo:
Guest Editorial: Information Hiding and Forensics for Multimedia Security. Multim. Tools Appl. 75(21): 13421-13429 (2016) - [j32]Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, Fenlin Liu:
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multim. Tools Appl. 75(21): 13557-13583 (2016) - [j31]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A framework of adaptive steganography resisting JPEG compression and detection. Secur. Commun. Networks 9(15): 2957-2971 (2016) - 2015
- [j30]Jicang Lu, Fenlin Liu, Xiangyang Luo:
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix. Digit. Investig. 12: 1-14 (2015) - [j29]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. KSII Trans. Internet Inf. Syst. 9(12): 5209-5228 (2015) - [j28]Yi Zhang, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Xiaofeng Song:
Detection of perturbed quantization class stego images based on possible change modes. J. Electronic Imaging 24(6): 063005 (2015) - [j27]Xiaofeng Song, Fenlin Liu, Xiangyang Luo, Jicang Lu, Yi Zhang:
Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multim. Tools Appl. 74(24): 11045-11071 (2015) - [c24]Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu:
A Landmark Calibration Based IP Geolocation Approach. ARES 2015: 411-416 - [c23]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. ARES 2015: 461-466 - [c22]Fan Zhao, Yuhan Song, Fenlin Liu, Ke Ke, Jingning Chen, Xiangyang Luo:
City-Level Geolocation Based on Routing Feature. AINA 2015: 414-419 - [c21]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang:
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. IH&MMSec 2015: 15-23 - [c20]Guang Zhu, Xiangyang Luo, Fenlin Liu, Jingning Chen:
An Algorithm of City-Level Landmark Mining Based on Internet Forum. NBiS 2015: 294-301 - 2014
- [j26]Jicang Lu, Fenlin Liu, Xiangyang Luo:
Selection of image features for steganalysis based on the Fisher criterion. Digit. Investig. 11(1): 57-66 (2014) - [j25]Jicang Lu, Fenlin Liu, Xiangyang Luo:
Recognizing F5-like Stego images from Multi-class JPEG Stego Images. KSII Trans. Internet Inf. Syst. 8(11): 4153-4169 (2014) - [j24]Xiangyang Luo, Lin Yang, Dai Hao, Fenlin Liu, Daoshun Wang:
On Data and Virtualization Security Risks and Solutions of Cloud Computing. J. Networks 9(3): 571-581 (2014) - 2013
- [j23]Zan Yang, Lin Yang, Xiangyang Luo, Linru Ma, Bao-sheng Kou, Kun Zhang:
Model of Domain based RBAC and Supporting Technologies. J. Comput. 8(5): 1220-1229 (2013) - [j22]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Fusion of Two Typical Quantitative Steganalysis Based on SVR. J. Softw. 8(3): 731-736 (2013) - [j21]Meijuan Yin, Xiaonan Liu, Junyong Luo, Xiangyang Luo:
A System for Extracting and Ranking Name Aliases in Emails. J. Softw. 8(3): 737-745 (2013) - [j20]Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, Ruihui Zhu:
Steganalysis of a PVD-based content adaptive image steganography. Signal Process. 93(9): 2529-2538 (2013) - [j19]Daoshun Wang, Song Liu, Xiangyang Luo, Shundong Li:
A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition. Telecommun. Syst. 54(3): 359-371 (2013) - [j18]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. IEEE Trans. Inf. Forensics Secur. 8(1): 216-228 (2013) - [j17]Bo Yu, Lin Yang, Yongjun Wang, Bofeng Zhang, Yuan Cao, Linru Ma, Xiangyang Luo:
Rule-Based Security Capabilities Matching for Web Services. Wirel. Pers. Commun. 73(4): 1349-1367 (2013) - [c19]Yuan Liu, Xiangyang Luo, Jicang Lu, Daofu Gong:
Steganalysis of F5-like steganography based on selection of joint distribution features. ICIMCS 2013: 71-75 - [c18]Zhenyu Li, Zongyun Hu, Xiangyang Luo, Bin Lu:
Embedding change rate estimation based on ensemble learning. IH&MMSec 2013: 77-84 - 2012
- [j16]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang:
On F5 Steganography in Images. Comput. J. 55(4): 447-456 (2012) - [j15]Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang:
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. Comput. J. 55(6): 717-727 (2012) - [j14]Ying Zeng, Fenlin Liu, Xiangyang Luo, Shiguo Lian:
Abstract interpretation-based semantic framework for software birthmark. Comput. Secur. 31(4): 377-390 (2012) - [j13]Han Zong, Fenlin Liu, Xiangyang Luo:
Blind image steganalysis based on wavelet coefficient correlation. Digit. Investig. 9(1): 58-68 (2012) - [j12]Jicang Lu, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis. Multim. Tools Appl. 57(1): 91-107 (2012) - [j11]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Ying Zeng:
Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multim. Tools Appl. 57(3): 651-667 (2012) - [c17]Zheng Zhao, Fenlin Liu, Xiangyang Luo, Xin Xie, Lu Yu:
LSB Replacement Steganography Software Detection Based on Model Checking. IWDW 2012: 54-68 - 2011
- [j10]Jicang Lu, Yongfeng Huang, Fenlin Liu, Xiangyang Luo:
Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP. Int. J. Multim. Intell. Secur. 2(3/4): 225-237 (2011) - [j9]Dongning Zheng, Fenlin Liu, Chunfang Yang, Qian Zhang, Xiangyang Luo:
Identification of steganography software based on register dependence. Int. J. Multim. Intell. Secur. 2(3/4): 339-350 (2011) - [j8]Ying Zeng, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis. J. Multim. 6(4): 329-340 (2011) - [j7]Xiangyang Luo, Fenlin Liu, Shiguo Lian, Chunfang Yang, Stefanos Gritzalis:
On the Typical Statistic Features for Image Blind Steganalysis. IEEE J. Sel. Areas Commun. 29(7): 1404-1422 (2011) - 2010
- [j6]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang:
Image universal steganalysis based on best wavelet packet decomposition. Sci. China Inf. Sci. 53(3): 634-647 (2010) - [j5]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian:
Modification ratio estimation for a category of adaptive steganography. Sci. China Inf. Sci. 53(12): 2472-2484 (2010)
2000 – 2009
- 2009
- [c16]Chunfang Yang, Xiangyang Luo, Fenlin Liu:
Embedding Ratio Estimating for Each Bit Plane of Image. Information Hiding 2009: 59-72 - [c15]Xiongfei He, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Classification between PS and Stego Images Based on Noise Model. MUE 2009: 31-36 - 2008
- [j4]Xiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu:
A review on blind detection for image steganography. Signal Process. 88(9): 2138-2157 (2008) - [j3]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu:
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. IEEE Trans. Inf. Forensics Secur. 3(4): 662-672 (2008) - [c14]Xiangyang Luo, Fenlin Liu, Jianming Chen, Yining Zhang:
Image universal steganalysis based on wavelet packet transform. MMSP 2008: 780-784 - 2007
- [j2]Xiangyang Luo, Chunfang Yang, Daoshun Wang, Fenlin Liu:
LTSB Steganalysis Based on Quartic Equation. Trans. Data Hiding Multim. Secur. 2: 68-90 (2007) - [c13]Xiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu:
Secret Key Estimation for Image Sequential Steganograph in Transform Domain. GLOBECOM 2007: 538-542 - [c12]Bin Lu, Fenlin Liu, Xin Ge, Bin Liu, Xiangyang Luo:
A Software Birthmark Based on Dynamic Opcode n-gram. ICSC 2007: 37-44 - 2006
- [c11]Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. Communications and Multimedia Security 2006: 161-172 - [c10]Ping Wang, Xiangyang Luo, Fenlin Liu:
An Improved Secret Key Estimation Method for Sequential Steganography. IIH-MSP 2006: 396-402 - [c9]Xiangyang Luo, Ping Wang, Peizhong Lu, Fenlin Liu:
Fast and Blind Restoration Scheme for the Initial States of LFSRs. IMSCCS (1) 2006: 192-198 - [c8]Fenlin Liu, Bin Lu, Xiangyang Luo:
A Chaos-Based Robust Software Watermarking. ISPEC 2006: 355-366 - [c7]Bin Liu, Fenlin Liu, Bin Lu, Xiangyang Luo:
Real-Time Steganography in Compressed Video. MRCS 2006: 43-48 - [c6]Xiangyang Luo, Junyong Luo, Fenlin Liu:
Searching and Detecting Spatial LSB Steganographic Images on the Internet. Parallel and Distributed Computing and Networks 2006: 273-278 - 2005
- [j1]Peizhong Lu, Shen Li, Yan Zou, Xiangyang Luo:
Blind recognition of punctured convolutional codes. Sci. China Ser. F Inf. Sci. 48(4): 484-498 (2005) - [c5]Xiangyang Luo, Bin Liu, Fenlin Liu:
Improved RS Method for Detection of LSB Steganography. ICCSA (2) 2005: 508-516 - [c4]Xiangyang Luo, Bin Liu, Fenlin Liu:
Detecting LSB Steganography Based on Dynamic Masks. ISDA 2005: 251-255 - 2004
- [c3]Peizhong Lu, Xiangyang Luo, Qingyang Tang, Shen Li:
An Improved Sample Pairs Method for Detection of LSB Embedding. Information Hiding 2004: 116-127 - [c2]Peizhong Lu, Li Shen, Xiangyang Luo, Yan Zou:
Blind recognition of punctured convolutional codes. ISIT 2004: 459 - [c1]Shen Li, Peizhong Lu, Xiangyang Luo, Yan Zou:
Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns. ITCC (1) 2004: 786-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 17:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint