Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiangyang Luo
@article{DBLP:journals/fcsc/ChenCYL24a, author = {Xingxing Chen and Qingfeng Cheng and Weidong Yang and Xiangyang Luo}, title = {An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain}, journal = {Frontiers Comput. Sci.}, volume = {18}, number = {3}, pages = {183807}, year = {2024}, url = {https://doi.org/10.1007/s11704-023-2595-x}, doi = {10.1007/S11704-023-2595-X}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ChenCYL24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangYLLZ24, author = {Fan Zhang and Meijuan Yin and Fenlin Liu and Xiangyang Luo and Shuodi Zu}, title = {IP2vec: an {IP} node representation model for {IP} geolocation}, journal = {Frontiers Comput. Sci.}, volume = {18}, number = {6}, pages = {186506}, year = {2024}, url = {https://doi.org/10.1007/s11704-023-2616-9}, doi = {10.1007/S11704-023-2616-9}, timestamp = {Sun, 14 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangYLLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangWWLM24, author = {Jiawei Zhang and Jinwei Wang and Hao Wang and Xiangyang Luo and Bin Ma}, title = {Trustworthy adaptive adversarial perturbations in social networks}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103675}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103675}, doi = {10.1016/J.JISA.2023.103675}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangWWLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tamd/QiaoCZSSSL24, author = {Tong Qiao and Yuxing Chen and Xiaofei Zhou and Ran Shi and Hang Shao and Kunye Shen and Xiangyang Luo}, title = {CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images}, journal = {{IEEE} Trans. Cogn. Dev. Syst.}, volume = {16}, number = {1}, pages = {369--379}, year = {2024}, url = {https://doi.org/10.1109/TCDS.2023.3274450}, doi = {10.1109/TCDS.2023.3274450}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tamd/QiaoCZSSSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChengWWLM24, author = {Xin Cheng and Jinwei Wang and Hao Wang and Xiangyang Luo and Bin Ma}, title = {Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {1}, pages = {632--646}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3284910}, doi = {10.1109/TCSVT.2023.3284910}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/ChengWWLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/MaXZZL24, author = {Yuanyuan Ma and Lige Xu and Yi Zhang and Tao Zhang and Xiangyang Luo}, title = {Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {3}, pages = {1954--1969}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3295364}, doi = {10.1109/TCSVT.2023.3295364}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/MaXZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/GaoZXLS24, author = {Guangyong Gao and Hui Zhang and Zhihua Xia and Xiangyang Luo and Yun{-}Qing Shi}, title = {Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for {ROI} of Medical Image}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {3909--3923}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3318048}, doi = {10.1109/TMM.2023.3318048}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/GaoZXLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiaoMZWCXL23, author = {Tong Qiao and Yuyan Ma and Ning Zheng and Hanzhou Wu and Yanli Chen and Ming Xu and Xiangyang Luo}, title = {A novel model watermarking for protecting generative adversarial network}, journal = {Comput. Secur.}, volume = {127}, pages = {103102}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103102}, doi = {10.1016/J.COSE.2023.103102}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiaoMZWCXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiuLT23, author = {Yimin Liu and Xiangyang Luo and Zhiyuan Tao}, title = {Construction of a high-precision general geographical location words dataset}, journal = {Comput. Stand. Interfaces}, volume = {84}, pages = {103692}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2022.103692}, doi = {10.1016/J.CSI.2022.103692}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiuLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/ZhangLL23, author = {Fan Zhang and Fenlin Liu and Xiangyang Luo}, title = {Correction: Geolocation of covert communication entity on the Internet for post-steganalysis}, journal = {{EURASIP} J. Image Video Process.}, volume = {2023}, number = {1}, pages = {2}, year = {2023}, url = {https://doi.org/10.1186/s13640-023-00602-3}, doi = {10.1186/S13640-023-00602-3}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejivp/ZhangLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/FanLLZL23, author = {Wentong Fan and Zhenyu Li and Hao Li and Yi Zhang and Xiangyang Luo}, title = {SNENet: An adaptive stego noise extraction network using parallel dilated convolution for {JPEG} image steganalysis}, journal = {{IET} Image Process.}, volume = {17}, number = {10}, pages = {2894--2906}, year = {2023}, url = {https://doi.org/10.1049/ipr2.12835}, doi = {10.1049/IPR2.12835}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ipr/FanLLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MaYLLZ23, author = {Yuanyuan Ma and Xinquan Yu and Xiangyang Luo and Dong Liu and Yi Zhang}, title = {Adaptive feature selection for image steganalysis based on classification metrics}, journal = {Inf. Sci.}, volume = {644}, pages = {118973}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.118973}, doi = {10.1016/J.INS.2023.118973}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/MaYLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QiaoLMZL23, author = {Yaqiong Qiao and Xiangyang Luo and Jiangtao Ma and Meng Zhang and Chenliang Li}, title = {Twitter user geolocation based on heterogeneous relationship modeling and representation learning}, journal = {Inf. Sci.}, volume = {647}, pages = {119427}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119427}, doi = {10.1016/J.INS.2023.119427}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/QiaoLMZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChenLZZG23, author = {Jun Chen and Xiangyang Luo and Liyan Zhu and Qikun Zhang and Yong Gan}, title = {Handwritten {CAPTCHA} recognizer: a text {CAPTCHA} breaking method based on style transfer network}, journal = {Multim. Tools Appl.}, volume = {82}, number = {9}, pages = {13025--13043}, year = {2023}, url = {https://doi.org/10.1007/s11042-021-11485-9}, doi = {10.1007/S11042-021-11485-9}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChenLZZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/LiuLTZD23, author = {Yimin Liu and Xiangyang Luo and Zhiyuan Tao and Meng Zhang and Shaoyong Du}, title = {{UGCC:} Social Media User Geolocation via Cyclic Coupling}, journal = {{IEEE} Trans. Big Data}, volume = {9}, number = {4}, pages = {1128--1141}, year = {2023}, url = {https://doi.org/10.1109/TBDATA.2023.3242961}, doi = {10.1109/TBDATA.2023.3242961}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/LiuLTZD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YangDGCLZR23, author = {Yang Yang and Robert H. Deng and Wenzhong Guo and Hongju Cheng and Xiangyang Luo and Xianghan Zheng and Chunming Rong}, title = {Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {247--262}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3090519}, doi = {10.1109/TCC.2021.3090519}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YangDGCLZR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/MaoLZZL23, author = {Chun Mao and Zhenyu Li and Mingliang Zhang and Yi Zhang and Xiangyang Luo}, title = {A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {69}, number = {3}, pages = {568--580}, year = {2023}, url = {https://doi.org/10.1109/TCE.2023.3277919}, doi = {10.1109/TCE.2023.3277919}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/MaoLZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhangWWL23, author = {Jiawei Zhang and Jinwei Wang and Hao Wang and Xiangyang Luo}, title = {Self-Recoverable Adversarial Examples: {A} New Effective Protection Mechanism in Social Networks}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {2}, pages = {562--574}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2022.3207008}, doi = {10.1109/TCSVT.2022.3207008}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/ZhangWWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhangZWLZZW23, author = {Yulan Zhang and Guopu Zhu and Xing Wang and Xiangyang Luo and Yicong Zhou and Hongli Zhang and Ligang Wu}, title = {CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {5}, pages = {2019--2032}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2022.3220630}, doi = {10.1109/TCSVT.2022.3220630}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/ZhangZWLZZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DuLLZ23, author = {Hansong Du and Jiu{-}fen Liu and Xiangyang Luo and Yi Zhang}, title = {Extraction Method of Secret Message Based on Optimal Hypothesis Test}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {5265--5277}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3243907}, doi = {10.1109/TDSC.2023.3243907}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DuLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaCL23, author = {Yuqian Ma and Qingfeng Cheng and Xiangyang Luo}, title = {2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5876--5889}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3318952}, doi = {10.1109/TIFS.2023.3318952}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/QiaoWZXL23, author = {Tong Qiao and Jiasheng Wu and Ning Zheng and Ming Xu and Xiangyang Luo}, title = {FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {7350--7363}, year = {2023}, url = {https://doi.org/10.1109/TMM.2022.3221532}, doi = {10.1109/TMM.2022.3221532}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/QiaoWZXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/DingLWF23, author = {Shichang Ding and Xiangyang Luo and Jinwei Wang and Xiaoming Fu}, title = {GNN-Geo: {A} Graph Neural Network-Based Fine-Grained {IP} Geolocation Framework}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {6}, pages = {3543--3560}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2023.3266752}, doi = {10.1109/TNSE.2023.3266752}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/DingLWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LiWXZVL23, author = {Hao Li and Jinwei Wang and Neal Xiong and Yi Zhang and Athanasios V. Vasilakos and Xiangyang Luo}, title = {A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {19}, number = {6}, pages = {214:1--214:23}, year = {2023}, url = {https://doi.org/10.1145/3579166}, doi = {10.1145/3579166}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/LiWXZVL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangRZCCLL23, author = {Yang Yang and Chunming Rong and Xianghan Zheng and Hongju Cheng and Victor Chang and Xiangyang Luo and Zuoyong Li}, title = {Time Controlled Expressive Predicate Query With Accountable Anonymity}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {2}, pages = {1444--1457}, year = {2023}, url = {https://doi.org/10.1109/TSC.2022.3162285}, doi = {10.1109/TSC.2022.3162285}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangRZCCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChengCL23, author = {Qingfeng Cheng and Jinzheng Cao and Xiangyang Luo}, editor = {Chunpeng Ge and Moti Yung}, title = {Quantum Augmented Lattice Attack on {NTRU} with Side Information}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {317--328}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_18}, doi = {10.1007/978-981-97-0945-8\_18}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChengCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiLZ23, author = {Hao Li and Xiangyang Luo and Yi Zhang}, title = {Improving CoatNet for Spatial and {JPEG} Domain Steganalysis}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023, Brisbane, Australia, July 10-14, 2023}, pages = {1241--1246}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICME55011.2023.00216}, doi = {10.1109/ICME55011.2023.00216}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LiLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiXFLG23, author = {Yi Li and Xin Xie and Haiyan Fu and Xiangyang Luo and Yanqing Guo}, title = {A Compact Transformer for Adaptive Style Transfer}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023, Brisbane, Australia, July 10-14, 2023}, pages = {2687--2692}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICME55011.2023.00457}, doi = {10.1109/ICME55011.2023.00457}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LiXFLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoQL0C23, author = {Gejian Zhao and Chuan Qin and Xiangyang Luo and Xinpeng Zhang and Chin{-}Chen Chang}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {13--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595110}, doi = {10.1145/3577163.3595110}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoQL0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/WuWZWML23, author = {Hao Wu and Jinwei Wang and Jiawei Zhang and Yufeng Wu and Bin Ma and Xiangyang Luo}, title = {Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold Coast, Australia, June 18-23, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IJCNN54540.2023.10191329}, doi = {10.1109/IJCNN54540.2023.10191329}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/WuWZWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/WangWWML23, author = {Jinwei Wang and Maoyuan Wang and Hao Wu and Bin Ma and Xiangyang Luo}, editor = {Qingshan Liu and Hanzi Wang and Zhanyu Ma and Weishi Zheng and Hongbin Zha and Xilin Chen and Liang Wang and Rongrong Ji}, title = {Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum}, booktitle = {Pattern Recognition and Computer Vision - 6th Chinese Conference, {PRCV} 2023, Xiamen, China, October 13-15, 2023, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14433}, pages = {421--432}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8546-3\_34}, doi = {10.1007/978-981-99-8546-3\_34}, timestamp = {Thu, 11 Jan 2024 22:28:07 +0100}, biburl = {https://dblp.org/rec/conf/prcv/WangWWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04502, author = {Jinwei Wang and Hao Wu and Haihua Wang and Jiawei Zhang and Xiangyang Luo and Bin Ma}, title = {Immune Defense: {A} Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples}, journal = {CoRR}, volume = {abs/2303.04502}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04502}, doi = {10.48550/ARXIV.2303.04502}, eprinttype = {arXiv}, eprint = {2303.04502}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04965, author = {Guisheng Liu and Yi Li and Zhengcong Fei and Haiyan Fu and Xiangyang Luo and Yanqing Guo}, title = {Prefix-diffusion: {A} Lightweight Diffusion Model for Diverse Image Captioning}, journal = {CoRR}, volume = {abs/2309.04965}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04965}, doi = {10.48550/ARXIV.2309.04965}, eprinttype = {arXiv}, eprint = {2309.04965}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04965.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiLFYL22, author = {Tengyao Li and Kaiyue Liu and Wangxin Feng and Chunfang Yang and Xiangyang Luo}, title = {HeteroTiC: {A} robust network flow watermarking based on heterogeneous time channels}, journal = {Comput. Networks}, volume = {219}, pages = {109424}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109424}, doi = {10.1016/J.COMNET.2022.109424}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiLFYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiuLWL22, author = {Wenyan Liu and Xiangyang Luo and Guo Wei and Huaixing Liu}, title = {Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy}, journal = {Comput. Commun.}, volume = {192}, pages = {289--298}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2022.06.010}, doi = {10.1016/J.COMCOM.2022.06.010}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LiuLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/LiLZZYL22, author = {Jialin Li and Xiangyang Luo and Yi Zhang and Pei Zhang and Chunfang Yang and Fenlin Liu}, title = {Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths}, journal = {Digit. Commun. Networks}, volume = {8}, number = {4}, pages = {455--465}, year = {2022}, url = {https://doi.org/10.1016/j.dcan.2021.09.005}, doi = {10.1016/J.DCAN.2021.09.005}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/LiLZZYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZuLZ22, author = {Shuodi Zu and Xiangyang Luo and Fan Zhang}, title = {IP-geolocater: a more reliable {IP} geolocation algorithm based on router error training}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {1}, pages = {161504}, year = {2022}, url = {https://doi.org/10.1007/s11704-021-0427-4}, doi = {10.1007/S11704-021-0427-4}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZuLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/CaoLXQ22, author = {Rong Cao and Xiangyang Luo and Yaoyi Xi and Yaqiong Qiao}, title = {Stance detection for online public opinion awareness: An overview}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {11944--11965}, year = {2022}, url = {https://doi.org/10.1002/int.23071}, doi = {10.1002/INT.23071}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/CaoLXQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JiaGLWZ22, author = {Xingxing Jia and Yusheng Guo and Xiangyang Luo and Daoshun Wang and Chaoyang Zhang}, title = {A perfect secret sharing scheme for general access structures}, journal = {Inf. Sci.}, volume = {595}, pages = {54--69}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.02.016}, doi = {10.1016/J.INS.2022.02.016}, timestamp = {Wed, 13 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JiaGLWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuLZTL22, author = {Yimin Liu and Xiangyang Luo and Meng Zhang and Zhiyuan Tao and Fenlin Liu}, title = {Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio}, journal = {J. Netw. Comput. Appl.}, volume = {199}, pages = {103302}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2021.103302}, doi = {10.1016/J.JNCA.2021.103302}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiuLZTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/WuLLG22, author = {Fan Wu and Xiong Li and Xiangyang Luo and Ke Gu}, title = {A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance}, journal = {J. Syst. Archit.}, volume = {132}, pages = {102737}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102737}, doi = {10.1016/J.SYSARC.2022.102737}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/WuLLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/QiaoLYS22, author = {Tong Qiao and Xiangyang Luo and Hongwei Yao and Ran Shi}, title = {Classifying between computer generated and natural images: An empirical study from {RAW} to {JPEG} format}, journal = {J. Vis. Commun. Image Represent.}, volume = {85}, pages = {103506}, year = {2022}, url = {https://doi.org/10.1016/j.jvcir.2022.103506}, doi = {10.1016/J.JVCIR.2022.103506}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/QiaoLYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ChenWLLH22, author = {Jian Chen and Hao{-}Tian Wu and Lu Lu and Xiangyang Luo and Jiankun Hu}, title = {Single underwater image haze removal with a learning-based approach to blurriness estimation}, journal = {J. Vis. Commun. Image Represent.}, volume = {89}, pages = {103656}, year = {2022}, url = {https://doi.org/10.1016/j.jvcir.2022.103656}, doi = {10.1016/J.JVCIR.2022.103656}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/ChenWLLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/WuWZLM22, author = {Junfeng Wu and Jinwei Wang and Junjie Zhao and Xiangyang Luo and Bin Ma}, title = {{ESGAN} for generating high quality enhanced samples}, journal = {Multim. Syst.}, volume = {28}, number = {5}, pages = {1809--1822}, year = {2022}, url = {https://doi.org/10.1007/s00530-022-00953-3}, doi = {10.1007/S00530-022-00953-3}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/WuWZLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/DuLTL22, author = {Hansong Du and Jiu{-}fen Liu and Yu{-}guo Tian and Xiangyang Luo}, title = {Steganographic key recovery for adaptive steganography under "known-message attacks"}, journal = {Multim. Tools Appl.}, volume = {81}, number = {8}, pages = {10981--11004}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12109-6}, doi = {10.1007/S11042-022-12109-6}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/DuLTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangZMLYLJ22, author = {Jinwei Wang and Kehui Zeng and Bin Ma and Xiangyang Luo and Qilin Yin and Guangjie Liu and Sunil Kr. Jha}, title = {GAN-generated fake face detection via two-stream {CNN} with {PRNU} in the wild}, journal = {Multim. Tools Appl.}, volume = {81}, number = {29}, pages = {42527--42545}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-11592-7}, doi = {10.1007/S11042-021-11592-7}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/WangZMLYLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunLWM22, author = {Yuchen Sun and Xiangyang Luo and Han Wang and Zhaorui Ma}, title = {A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {3306098:1--3306098:12}, year = {2022}, url = {https://doi.org/10.1155/2022/3306098}, doi = {10.1155/2022/3306098}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SunLWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/WuQCXZL22, author = {Xiaoshuai Wu and Tong Qiao and Yanli Chen and Ming Xu and Ning Zheng and Xiangyang Luo}, title = {Sign steganography revisited with robust domain selection}, journal = {Signal Process.}, volume = {196}, pages = {108522}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2022.108522}, doi = {10.1016/J.SIGPRO.2022.108522}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/WuQCXZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YinWLL22, author = {Qilin Yin and Jinwei Wang and Wei Lu and Xiangyang Luo}, title = {Contrastive Learning based Multi-task Network for Image Manipulation Detection}, journal = {Signal Process.}, volume = {201}, pages = {108709}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2022.108709}, doi = {10.1016/J.SIGPRO.2022.108709}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YinWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZhangLZZL22, author = {Mingliang Zhang and Zhenyu Li and Pei Zhang and Yi Zhang and Xiangyang Luo}, title = {A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks}, journal = {Symmetry}, volume = {14}, number = {1}, pages = {111}, year = {2022}, url = {https://doi.org/10.3390/sym14010111}, doi = {10.3390/SYM14010111}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/ZhangLZZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/XuLDZLL22, author = {Shengmin Xu and Yingjiu Li and Robert H. Deng and Yinghui Zhang and Xiangyang Luo and Ximeng Liu}, title = {Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {1}, pages = {474--490}, year = {2022}, url = {https://doi.org/10.1109/TCC.2019.2936481}, doi = {10.1109/TCC.2019.2936481}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/XuLDZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhuLZYL22, author = {Liyan Zhu and Xiangyang Luo and Yi Zhang and Chunfang Yang and Fenlin Liu}, title = {Inverse Interpolation and Its Application in Robust Image Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {6}, pages = {4052--4064}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3107342}, doi = {10.1109/TCSVT.2021.3107342}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZhuLZYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WangWLZMSJ22, author = {Hao Wang and Jinwei Wang and Xiangyang Luo and Yuhui Zheng and Bin Ma and Jinsheng Sun and Sunil Kr. Jha}, title = {Detecting Aligned Double {JPEG} Compressed Color Image With Same Quantization Matrix Based on the Stability of Image}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {6}, pages = {4065--4080}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3111195}, doi = {10.1109/TCSVT.2021.3111195}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/WangWLZMSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChangZZZLW22, author = {Jie Chang and Guopu Zhu and Hongli Zhang and Yicong Zhou and Xiangyang Luo and Ligang Wu}, title = {Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {8}, pages = {5055--5067}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3146517}, doi = {10.1109/TCSVT.2022.3146517}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/ChangZZZLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WuLLZZ22, author = {Haorui Wu and Xiaolong Li and Xiangyang Luo and Xinpeng Zhang and Yao Zhao}, title = {General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {9}, pages = {5989--6001}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3166207}, doi = {10.1109/TCSVT.2022.3166207}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WuLLZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LuoZZLC22, author = {Xiangyang Luo and Pei Zhang and Mingliang Zhang and Hao Li and Qingfeng Cheng}, title = {A Novel Covert Communication Method Based on Bitcoin Transaction}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {4}, pages = {2830--2839}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3100480}, doi = {10.1109/TII.2021.3100480}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/LuoZZLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/WangZYLZSJ22, author = {Jinwei Wang and Junjie Zhao and Qilin Yin and Xiangyang Luo and Yuhui Zheng and Yun{-}Qing Shi and Sunil Kr. Jha}, title = {SmsNet: {A} New Deep Convolutional Neural Network Model for Adversarial Example Detection}, journal = {{IEEE} Trans. Multim.}, volume = {24}, pages = {230--244}, year = {2022}, url = {https://doi.org/10.1109/TMM.2021.3050057}, doi = {10.1109/TMM.2021.3050057}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/WangZYLZSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ZhangCZL22, author = {Pei Zhang and Qingfeng Cheng and Mingliang Zhang and Xiangyang Luo}, title = {A Group Covert Communication Method of Digital Currency Based on Blockchain Technology}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {6}, pages = {4266--4276}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2022.3196816}, doi = {10.1109/TNSE.2022.3196816}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/ZhangCZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LiuZ0LKL22, author = {Zuquan Liu and Guopu Zhu and Feng Ding and Xiangyang Luo and Sam Kwong and Peng Li}, title = {Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {18}, number = {3s}, pages = {148:1--148:16}, year = {2022}, url = {https://doi.org/10.1145/3508394}, doi = {10.1145/3508394}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/LiuZ0LKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/WeiLDYL22, author = {Guo Wei and Xiangyang Luo and Shichang Ding and Baoshan Yang and Wenyan Liu}, title = {{DR-NET:} a novel mobile anchor-assisted localization method based on the density of nodes distribution}, journal = {Wirel. Networks}, volume = {28}, number = {8}, pages = {3431--3451}, year = {2022}, url = {https://doi.org/10.1007/s11276-022-03056-z}, doi = {10.1007/S11276-022-03056-Z}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/WeiLDYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuLLL22, author = {Shaoyong Du and Xin Liu and Guoqing Lai and Xiangyang Luo}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Watch Out for Race Condition Attacks When Using Android External Storage}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {891--904}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560666}, doi = {10.1145/3548606.3560666}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coling/LiuLGLW22, author = {Guisheng Liu and Yi Li and Yanqing Guo and Xiangyang Luo and Bo Wang}, editor = {Nicoletta Calzolari and Chu{-}Ren Huang and Hansaem Kim and James Pustejovsky and Leo Wanner and Key{-}Sun Choi and Pum{-}Mo Ryu and Hsin{-}Hsi Chen and Lucia Donatelli and Heng Ji and Sadao Kurohashi and Patrizia Paggio and Nianwen Xue and Seokhwan Kim and Younggyun Hahm and Zhong He and Tony Kyungil Lee and Enrico Santus and Francis Bond and Seung{-}Hoon Na}, title = {Multi-Attribute Controlled Text Generation with Contrastive-Generator and External-Discriminator}, booktitle = {Proceedings of the 29th International Conference on Computational Linguistics, {COLING} 2022, Gyeongju, Republic of Korea, October 12-17, 2022}, pages = {5904--5913}, publisher = {International Committee on Computational Linguistics}, year = {2022}, url = {https://aclanthology.org/2022.coling-1.516}, timestamp = {Fri, 14 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coling/LiuLGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbds/ZhouLDSG22, author = {Pei Zhou and Xiangyang Luo and Shaoyong Du and Wenqi Shi and Jiashan Guo}, editor = {Yuan Tian and Tinghuai Ma and Qingshan Jiang and Qi Liu and Muhammad Khurram Khan}, title = {A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning}, booktitle = {Big Data and Security - 4th International Conference, {ICBDS} 2022, Xiamen, China, December 8-12, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1796}, pages = {63--79}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-3300-6\_6}, doi = {10.1007/978-981-99-3300-6\_6}, timestamp = {Wed, 13 Sep 2023 16:02:27 +0200}, biburl = {https://dblp.org/rec/conf/icbds/ZhouLDSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangLDLYL22, author = {Xiuting Wang and Xiangyang Luo and Shaoyong Du and Lingling Li and Yang Yang and Fenlin Liu}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment}, booktitle = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13340}, pages = {663--677}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06791-4\_52}, doi = {10.1007/978-3-031-06791-4\_52}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WangLDLYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WuWZLM22, author = {Hao Wu and Jinwei Wang and Jiawei Zhang and Xiangyang Luo and Bin Ma}, editor = {Xianfeng Zhao and Zhenjun Tang and Pedro Comesa{\~{n}}a Alfaro and Alessandro Piva}, title = {Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method}, booktitle = {Digital Forensics and Watermarking - 21st International Workshop, {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13825}, pages = {83--97}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25115-3\_6}, doi = {10.1007/978-3-031-25115-3\_6}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/WuWZLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-12050, author = {Jiawei Zhang and Jinwei Wang and Hao Wang and Xiangyang Luo}, title = {Self-recoverable Adversarial Examples: {A} New Effective Protection Mechanism in Social Networks}, journal = {CoRR}, volume = {abs/2204.12050}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.12050}, doi = {10.48550/ARXIV.2204.12050}, eprinttype = {arXiv}, eprint = {2204.12050}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-12050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-02822, author = {Qingliang Liu and Jiangqun Ni and Weizhe Zhang and Xiangyang Luo and Jiwu Huang}, title = {A Robust Image Steganographic Scheme against General Scaling Attacks}, journal = {CoRR}, volume = {abs/2212.02822}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.02822}, doi = {10.48550/ARXIV.2212.02822}, eprinttype = {arXiv}, eprint = {2212.02822}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-02822.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/CaoSLQC21, author = {Fang Cao and Jiayi Sun and Xiangyang Luo and Chuan Qin and Ching{-}Chun Chang}, title = {Privacy-preserving inpainting for outsourced image}, journal = {Int. J. Distributed Sens. Networks}, volume = {17}, number = {11}, pages = {155014772110590}, year = {2021}, url = {https://doi.org/10.1177/15501477211059092}, doi = {10.1177/15501477211059092}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/CaoSLQC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/LiuZLLZ21, author = {Jiarui Liu and Kaiman Zhu and Wei Lu and Xiangyang Luo and Xianfeng Zhao}, title = {A lightweight 3D convolutional neural network for deepfake detection}, journal = {Int. J. Intell. Syst.}, volume = {36}, number = {9}, pages = {4990--5004}, year = {2021}, url = {https://doi.org/10.1002/int.22499}, doi = {10.1002/INT.22499}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/LiuZLLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/GuoXSZL21, author = {Jiadong Guo and Rui Xu and Wenqi Shi and Pei Zhou and Xiangyang Luo}, title = {Instant messaging user geolocating method based on multi-source information association}, journal = {Int. J. Sens. Networks}, volume = {35}, number = {2}, pages = {99--110}, year = {2021}, url = {https://doi.org/10.1504/IJSNET.2021.113629}, doi = {10.1504/IJSNET.2021.113629}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/GuoXSZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangLWGL21, author = {Yi Zhang and Xiangyang Luo and Jinwei Wang and Yanqing Guo and Fenlin Liu}, title = {Image robust adaptive steganography adapted to lossy channels in open social networks}, journal = {Inf. Sci.}, volume = {564}, pages = {306--326}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.02.058}, doi = {10.1016/J.INS.2021.02.058}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangLWGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TaoLLL21, author = {Zhiyuan Tao and Fenlin Liu and Yan Liu and Xiangyang Luo}, title = {A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {15}, number = {8}, pages = {2764--2782}, year = {2021}, url = {https://doi.org/10.3837/tiis.2021.08.004}, doi = {10.3837/TIIS.2021.08.004}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TaoLLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DuLTL21, author = {Hansong Du and Jiu{-}fen Liu and Yu{-}guo Tian and Xiangyang Luo}, title = {Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5495941:1--5495941:16}, year = {2021}, url = {https://doi.org/10.1155/2021/5495941}, doi = {10.1155/2021/5495941}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DuLTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DingZL21, author = {Shichang Ding and Fan Zhao and Xiangyang Luo}, title = {A Street-Level {IP} Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6658642:1--6658642:11}, year = {2021}, url = {https://doi.org/10.1155/2021/6658642}, doi = {10.1155/2021/6658642}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DingZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SiZQLCN21, author = {Nianwen Si and Wenlin Zhang and Dan Qu and Xiangyang Luo and Heyu Chang and Tong Niu}, title = {Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6682293:1--6682293:13}, year = {2021}, url = {https://doi.org/10.1155/2021/6682293}, doi = {10.1155/2021/6682293}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SiZQLCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuWLZYL21, author = {Liyan Zhu and Jinwei Wang and Xiangyang Luo and Yi Zhang and Chunfang Yang and Fenlin Liu}, title = {{PRUDA:} {A} Novel Measurement Attribute Set towards Robust Steganography in Social Networks}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9864833:1--9864833:15}, year = {2021}, url = {https://doi.org/10.1155/2021/9864833}, doi = {10.1155/2021/9864833}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuWLZYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZhuLYZL21, author = {Liyan Zhu and Xiangyang Luo and Chunfang Yang and Yi Zhang and Fenlin Liu}, title = {Invariances of JPEG-quantized {DCT} coefficients and their application in robust image steganography}, journal = {Signal Process.}, volume = {183}, pages = {108015}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2021.108015}, doi = {10.1016/J.SIGPRO.2021.108015}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/ZhuLYZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/QiaoWLZ21, author = {Tong Qiao and Shuai Wang and Xiangyang Luo and Zhiqiang Zhu}, title = {Robust steganography resisting {JPEG} compression by improving selection of cover element}, journal = {Signal Process.}, volume = {183}, pages = {108048}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2021.108048}, doi = {10.1016/J.SIGPRO.2021.108048}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/QiaoWLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/GuoJZWL21, author = {Yanqing Guo and Caijuan Ji and Xin Zheng and Qianyu Wang and Xiangyang Luo}, title = {Multi-scale Multi-attention Network for Moir{\'{e}} Document Image Binarization}, journal = {Signal Process. Image Commun.}, volume = {90}, pages = {116046}, year = {2021}, url = {https://doi.org/10.1016/j.image.2020.116046}, doi = {10.1016/J.IMAGE.2020.116046}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/GuoJZWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ShiLGLL21, author = {Wenqi Shi and Xiangyang Luo and Jiadong Guo and Chong Liu and Fenlin Liu}, title = {Where Are WeChat Users: {A} Geolocation Method Based on User Missequence State Analysis}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {8}, number = {2}, pages = {319--331}, year = {2021}, url = {https://doi.org/10.1109/TCSS.2021.3049120}, doi = {10.1109/TCSS.2021.3049120}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ShiLGLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoHWJSLH21, author = {Lingchen Zhao and Shengshan Hu and Qian Wang and Jianlin Jiang and Chao Shen and Xiangyang Luo and Pengfei Hu}, title = {Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2029--2041}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2986205}, doi = {10.1109/TDSC.2020.2986205}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoHWJSLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QiaoLWXQ21, author = {Tong Qiao and Xiangyang Luo and Ting Wu and Ming Xu and Zhenxing Qian}, title = {Adaptive Steganalysis Based on Statistical Model of Quantized {DCT} Coefficients for {JPEG} Images}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2736--2751}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2962672}, doi = {10.1109/TDSC.2019.2962672}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QiaoLWXQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tiot/LiXML21, author = {Ruixiang Li and Rui Xu and Yuanyuan Ma and Xiangyang Luo}, title = {LandmarkMiner: Street-level Network Landmarks Mining Method for {IP} Geolocation}, journal = {{ACM} Trans. Internet Things}, volume = {2}, number = {3}, pages = {21:1--21:22}, year = {2021}, url = {https://doi.org/10.1145/3457409}, doi = {10.1145/3457409}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tiot/LiXML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/WangHLSJ21, author = {Jinwei Wang and Wei Huang and Xiangyang Luo and Yun Qing Shi and Sunil Kr. Jha}, title = {Detecting Non-Aligned Double {JPEG} Compression Based on Amplitude-Angle Feature}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {17}, number = {4}, pages = {138:1--138:18}, year = {2021}, url = {https://doi.org/10.1145/3464388}, doi = {10.1145/3464388}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomccap/WangHLSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/ZhangWLMX21, author = {Jiawei Zhang and Jinwei Wang and Xiangyang Luo and Bin Ma and Naixue Xiong}, editor = {Chunjie Cao and Yuqing Zhang and Yuan Hong and Ding Wang}, title = {Imperceptible and Reliable Adversarial Attack}, booktitle = {Frontiers in Cyber Security - 4th International Conference, {FCS} 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1558}, pages = {49--62}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0523-0\_4}, doi = {10.1007/978-981-19-0523-0\_4}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/ZhangWLMX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuLL21, author = {Yimin Liu and Xiangyang Luo and Han Li}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Microblog User Location Inference Based on {POI} and Query Likelihood Model}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12918}, pages = {464--480}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86890-1\_26}, doi = {10.1007/978-3-030-86890-1\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiuLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuWZL21, author = {Junfeng Wu and Jinwei Wang and Junjie Zhao and Xiangyang Luo}, editor = {Robert H. Deng and Feng Bao and Guilin Wang and Jian Shen and Mark Ryan and Weizhi Meng and Ding Wang}, title = {StrGAN for Generating Enhanced Samples}, booktitle = {Information Security Practice and Experience: 16th International Conference, {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13107}, pages = {363--373}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93206-0\_22}, doi = {10.1007/978-3-030-93206-0\_22}, timestamp = {Wed, 08 Mar 2023 16:36:14 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WuWZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WangWLYMS21, author = {Hao Wang and Jinwei Wang and Xiangyang Luo and Qilin Yin and Bin Ma and Jinsheng Sun}, editor = {Xianfeng Zhao and Alessandro Piva and Pedro Comesa{\~{n}}a Alfaro}, title = {Modify the Quantization Table in the {JPEG} Header File for Forensics and Anti-forensics}, booktitle = {Digital Forensics and Watermarking - 20th International Workshop, {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13180}, pages = {72--86}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95398-0\_6}, doi = {10.1007/978-3-030-95398-0\_6}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/WangWLYMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/LuoZL21, author = {Xiangyang Luo and Chao Zhang and Zhao Lv}, editor = {Huimin Ma and Liang Wang and Changshui Zhang and Fei Wu and Tieniu Tan and Yaonan Wang and Jianhuang Lai and Yao Zhao}, title = {Research of Robust Video Object Tracking Algorithm Based on Jetson Nano Embedded Platform}, booktitle = {Pattern Recognition and Computer Vision - 4th Chinese Conference, {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13019}, pages = {392--403}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88004-0\_32}, doi = {10.1007/978-3-030-88004-0\_32}, timestamp = {Mon, 20 Nov 2023 17:42:11 +0100}, biburl = {https://dblp.org/rec/conf/prcv/LuoZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LiGTLLB21, author = {Zhenyu Li and Daofu Gong and Lei Tan and Xiangyang Luo and Fenlin Liu and Adrian G. Bors}, title = {Self-embedding watermarking method for G-code used in 3D printing}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2021, Montpellier, France, December 7-10, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WIFS53200.2021.9648386}, doi = {10.1109/WIFS53200.2021.9648386}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LiGTLLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10767, author = {Shichang Ding and Xiangyang Luo and Jinwei Wang and Neal Naixue Xiong}, title = {GCN-Geo: {A} Graph Convolution Network-based Fine-grained {IP} Geolocation System}, journal = {CoRR}, volume = {abs/2112.10767}, year = {2021}, url = {https://arxiv.org/abs/2112.10767}, eprinttype = {arXiv}, eprint = {2112.10767}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/ZhangLL20, author = {Fan Zhang and Fenlin Liu and Xiangyang Luo}, title = {Geolocation of covert communication entity on the Internet for post-steganalysis}, journal = {{EURASIP} J. Image Video Process.}, volume = {2020}, number = {1}, pages = {15}, year = {2020}, url = {https://doi.org/10.1186/s13640-020-00504-8}, doi = {10.1186/S13640-020-00504-8}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejivp/ZhangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangLWSYL20, author = {Zhiqian Zhang and Chenliang Li and Zhiyong Wu and Aixin Sun and Dengpan Ye and Xiangyang Luo}, title = {{NEXT:} a neural network framework for next {POI} recommendation}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {2}, pages = {314--333}, year = {2020}, url = {https://doi.org/10.1007/s11704-018-8011-2}, doi = {10.1007/S11704-018-8011-2}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangLWSYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiWL20, author = {Yan Li and Junwei Wang and Xiangyang Luo}, title = {A reversible database watermarking method non-redundancy shifting-based histogram gaps}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {5}, year = {2020}, url = {https://doi.org/10.1177/1550147720921769}, doi = {10.1177/1550147720921769}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LiWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/YangKLSWL20, author = {Chunfang Yang and Yuhan Kang and Fenlin Liu and Xiaofeng Song and Jie Wang and Xiangyang Luo}, title = {Color image steganalysis based on embedding change probabilities in differential channels}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {5}, year = {2020}, url = {https://doi.org/10.1177/1550147720917826}, doi = {10.1177/1550147720917826}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/YangKLSWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/QiaoLLTM20, author = {Yaqiong Qiao and Xiangyang Luo and Chenliang Li and Hechan Tian and Jiangtao Ma}, title = {Heterogeneous graph-based joint representation learning for users and POIs in location-based social network}, journal = {Inf. Process. Manag.}, volume = {57}, number = {2}, pages = {102151}, year = {2020}, url = {https://doi.org/10.1016/j.ipm.2019.102151}, doi = {10.1016/J.IPM.2019.102151}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/QiaoLLTM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/LuoQLML20, author = {Xiangyang Luo and Yaqiong Qiao and Chenliang Li and Jiangtao Ma and Yimin Liu}, title = {An overview of microblog user geolocation methods}, journal = {Inf. Process. Manag.}, volume = {57}, number = {6}, pages = {102375}, year = {2020}, url = {https://doi.org/10.1016/j.ipm.2020.102375}, doi = {10.1016/J.IPM.2020.102375}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/LuoQLML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangNLLJ20, author = {Jinwei Wang and Qiye Ni and Guangjie Liu and Xiangyang Luo and Sunil Kr. Jha}, title = {Image splicing detection based on convolutional neural network with weight combination strategy}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102523}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102523}, doi = {10.1016/J.JISA.2020.102523}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangNLLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/TianLLZQ20, author = {Hechan Tian and Fenlin Liu and Xiangyang Luo and Fan Zhang and Yaqiong Qiao}, title = {Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {14}, number = {10}, pages = {3972--3988}, year = {2020}, url = {https://doi.org/10.3837/tiis.2020.10.003}, doi = {10.3837/TIIS.2020.10.003}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/TianLLZQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/BaoGLZXL20, author = {Zhenkun Bao and Yanqing Guo and Xiaolong Li and Yi Zhang and Meng Xu and Xiangyang Luo}, title = {A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {11}, number = {5}, pages = {1889--1901}, year = {2020}, url = {https://doi.org/10.1007/s12652-019-01345-8}, doi = {10.1007/S12652-019-01345-8}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/BaoGLZXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/BaoGLZXL20a, author = {Zhenkun Bao and Yanqing Guo and Xiaolong Li and Yi Zhang and Meng Xu and Xiangyang Luo}, title = {Correction to: {A} robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {11}, number = {5}, pages = {1903}, year = {2020}, url = {https://doi.org/10.1007/s12652-019-01376-1}, doi = {10.1007/S12652-019-01376-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/BaoGLZXL20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/WangHLSJ20, author = {Jinwei Wang and Wei Huang and Xiangyang Luo and Yun{-}Qing Shi and Sunil Kr. Jha}, title = {Non-aligned double {JPEG} compression detection based on refined Markov features in {QDCT} domain}, journal = {J. Real Time Image Process.}, volume = {17}, number = {1}, pages = {7--16}, year = {2020}, url = {https://doi.org/10.1007/s11554-019-00929-z}, doi = {10.1007/S11554-019-00929-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/WangHLSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/ZhangLZLB20, author = {Yi Zhang and Xiangyang Luo and Xiaodong Zhu and Zhenyu Li and Adrian G. Bors}, title = {Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes}, journal = {J. Real Time Image Process.}, volume = {17}, number = {1}, pages = {115--123}, year = {2020}, url = {https://doi.org/10.1007/s11554-019-00905-7}, doi = {10.1007/S11554-019-00905-7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jrtip/ZhangLZLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/QiYTLL20, author = {Baojun Qi and Chunfang Yang and Lei Tan and Xiangyang Luo and Fenlin Liu}, title = {A novel haze image steganography method via cover-source switching}, journal = {J. Vis. Commun. Image Represent.}, volume = {70}, pages = {102814}, year = {2020}, url = {https://doi.org/10.1016/j.jvcir.2020.102814}, doi = {10.1016/J.JVCIR.2020.102814}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/QiYTLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiYJLNL20, author = {Shiyu Li and Dengpan Ye and Shunzhi Jiang and Changrui Liu and Xiaoguang Niu and Xiangyang Luo}, title = {Anti-steganalysis for image on convolutional neural networks}, journal = {Multim. Tools Appl.}, volume = {79}, number = {7-8}, pages = {4315--4331}, year = {2020}, url = {https://doi.org/10.1007/s11042-018-7046-6}, doi = {10.1007/S11042-018-7046-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiYJLNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/TanYLLQL20, author = {Lei Tan and Chunfang Yang and Fenlin Liu and Xiangyang Luo and Baojun Qi and Zhenyu Li}, title = {Steganalysis of homogeneous-representation based steganography for high dynamic range images}, journal = {Multim. Tools Appl.}, volume = {79}, number = {27-28}, pages = {20079--20105}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08257-x}, doi = {10.1007/S11042-019-08257-X}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/TanYLLQL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YinYLL20, author = {Meijuan Yin and Wen Yang and Xiaonan Liu and Xiangyang Luo}, title = {Evaluator: {A} Multilevel Decision Approach for Web-Based Landmark Evaluation}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8843188:1--8843188:15}, year = {2020}, url = {https://doi.org/10.1155/2020/8843188}, doi = {10.1155/2020/8843188}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YinYLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WangWLLSJ20, author = {Jinwei Wang and Hao Wang and Jian Li and Xiangyang Luo and Yun{-}Qing Shi and Sunil Kr. Jha}, title = {Detecting Double {JPEG} Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {8}, pages = {2736--2749}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2922309}, doi = {10.1109/TCSVT.2019.2922309}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WangWLLSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhangLGQL20, author = {Yi Zhang and Xiangyang Luo and Yanqing Guo and Chuan Qin and Fenlin Liu}, title = {Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {8}, pages = {2750--2764}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2923980}, doi = {10.1109/TCSVT.2019.2923980}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZhangLGQL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WuCLLLL20, author = {Shuangke Wu and Yanjiao Chen and Minghui Li and Xiangyang Luo and Zhe Liu and Lan Liu}, title = {Survive and Thrive: {A} Stochastic Game for DDoS Attacks in Bitcoin Mining Pools}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {2}, pages = {874--887}, year = {2020}, url = {https://doi.org/10.1109/TNET.2020.2973410}, doi = {10.1109/TNET.2020.2973410}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/WuCLLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuanLXLL20, author = {Fuxiang Yuan and Fenlin Liu and Rui Xu and Yan Liu and Xiangyang Luo}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {Network Topology Boundary Routing {IP} Identification for {IP} Geolocation}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12240}, pages = {534--544}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57881-7\_47}, doi = {10.1007/978-3-030-57881-7\_47}, timestamp = {Mon, 07 Sep 2020 19:48:42 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YuanLXLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuLYL20, author = {Chong Liu and Xiangyang Luo and Fuxiang Yuan and Fenlin Liu}, title = {{RNBG:} {A} Ranking Nodes Based {IP} Geolocation Method}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {80--84}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162976}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9162976}, timestamp = {Tue, 18 Aug 2020 11:30:21 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuLYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YinWL20, author = {Qilin Yin and Jinwei Wang and Xiangyang Luo}, editor = {Xianfeng Zhao and Yun{-}Qing Shi and Alessandro Piva and Hyoung Joong Kim}, title = {A Hybrid Loss Network for Localization of Image Manipulation}, booktitle = {Digital Forensics and Watermarking - 19th International Workshop, {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12617}, pages = {237--247}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69449-4\_18}, doi = {10.1007/978-3-030-69449-4\_18}, timestamp = {Fri, 12 Feb 2021 13:59:58 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/YinWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spde/LiLZZYL20, author = {Jialin Li and Xiangyang Luo and Yi Zhang and Pei Zhang and Chunfang Yang and Fenlin Liu}, editor = {Shui Yu and Peter Mueller and Jiangbo Qian}, title = {Steganalysis of Adaptive Steganography Under the Known Cover Image}, booktitle = {Security and Privacy in Digital Economy - First International Conference, {SPDE} 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1268}, pages = {560--574}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9129-7\_39}, doi = {10.1007/978-981-15-9129-7\_39}, timestamp = {Sun, 12 Nov 2023 02:16:41 +0100}, biburl = {https://dblp.org/rec/conf/spde/LiLZZYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/TianZLLQ20, author = {Hechan Tian and Meng Zhang and Xiangyang Luo and Fenlin Liu and Yaqiong Qiao}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Twitter User Location Inference Based on Representation Learning and Label Propagation}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {2648--2654}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380019}, doi = {10.1145/3366423.3380019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/TianZLLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YinWLZJS19, author = {Qilin Yin and Jinwei Wang and Xiangyang Luo and Jiangtao Zhai and Sunil Kr. Jha and Yun{-}Qing Shi}, title = {Quaternion Convolutional Neural Network for Color Image Classification and Forensics}, journal = {{IEEE} Access}, volume = {7}, pages = {20293--20301}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2897000}, doi = {10.1109/ACCESS.2019.2897000}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YinWLZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenLLWM19, author = {Jun Chen and Xiangyang Luo and Yingying Liu and Jinwei Wang and Yuanyuan Ma}, title = {Selective Learning Confusion Class for Text-Based {CAPTCHA} Recognition}, journal = {{IEEE} Access}, volume = {7}, pages = {22246--22259}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2899044}, doi = {10.1109/ACCESS.2019.2899044}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChenLLWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangLGQL19, author = {Yue Zhang and Xiangyang Luo and Yanqing Guo and Chuan Qin and Fenlin Liu}, title = {Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection}, journal = {{IEEE} Access}, volume = {7}, pages = {24282--24289}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2900286}, doi = {10.1109/ACCESS.2019.2900286}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangLGQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YuanLHLL19, author = {Fuxiang Yuan and Fenlin Liu and Donghua Huang and Yan Liu and Xiangyang Luo}, title = {A High Completeness PoP Partition Algorithm for {IP} Geolocation}, journal = {{IEEE} Access}, volume = {7}, pages = {28340--28355}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2902337}, doi = {10.1109/ACCESS.2019.2902337}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YuanLHLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhaoXLZL19, author = {Fan Zhao and Rui Xu and Ruixiang Li and Ma Zhu and Xiangyang Luo}, title = {Street-Level Geolocation Based on Router Multilevel Partitioning}, journal = {{IEEE} Access}, volume = {7}, pages = {59237--59248}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2914972}, doi = {10.1109/ACCESS.2019.2914972}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhaoXLZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangYGCLJ19, author = {Qikun Zhang and Yongjiao Li and Yong Gan and Zheng Chuanyang and Xiangyang Luo and Jun Zheng}, title = {Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication}, journal = {{IEEE} Access}, volume = {7}, pages = {87085--87096}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2926404}, doi = {10.1109/ACCESS.2019.2926404}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangYGCLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangWZL19a, author = {Hao Wang and Jinwei Wang and Jiangtao Zhai and Xiangyang Luo}, title = {Detection of Triple {JPEG} Compressed Color Images}, journal = {{IEEE} Access}, volume = {7}, pages = {113094--113102}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2934160}, doi = {10.1109/ACCESS.2019.2934160}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangWZL19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangHLCWLC19, author = {Yang Yang and Xindi Huang and Ximeng Liu and Hongju Cheng and Jian Weng and Xiangyang Luo and Victor Chang}, title = {A Comprehensive Survey on Secure Outsourced Computation and Its Applications}, journal = {{IEEE} Access}, volume = {7}, pages = {159426--159465}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2949782}, doi = {10.1109/ACCESS.2019.2949782}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YangHLCWLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhaoSGPL19, author = {Fan Zhao and Wenqi Shi and Yong Gan and Ziru Peng and Xiangyang Luo}, title = {A localization and tracking scheme for target gangs based on big data of Wi-Fi locations}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {1679--1690}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-1737-7}, doi = {10.1007/S10586-018-1737-7}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhaoSGPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhaoLGZCL19, author = {Fan Zhao and Xiangyang Luo and Yong Gan and Shuodi Zu and Qingfeng Cheng and Fenlin Liu}, title = {{IP} Geolocation based on identification routers and local delay distribution similarity}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.4722}, doi = {10.1002/CPE.4722}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ZhaoLGZCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiWYL19, author = {Jian Li and Jinwei Wang and Shuang Yu and Xiangyang Luo}, title = {A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {100--113}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010108}, doi = {10.4018/IJDCF.2019010108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiWYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KangLYXLW19, author = {Yuhan Kang and Fenlin Liu and Chunfang Yang and Lingyun Xiang and Xiangyang Luo and Ping Wang}, title = {Color image steganalysis based on channel gradient correlation}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {5}, year = {2019}, url = {https://doi.org/10.1177/1550147719852031}, doi = {10.1177/1550147719852031}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KangLYXLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiuLMLL19, author = {Wenyan Liu and Xiangyang Luo and Qing Mu and Yimin Liu and Fenlin Liu}, title = {An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {5}, year = {2019}, url = {https://doi.org/10.1177/1550147719852034}, doi = {10.1177/1550147719852034}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LiuLMLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JiaWNLS19, author = {Xingxing Jia and Daoshun Wang and Daxin Nie and Xiangyang Luo and Jonathan Zheng Sun}, title = {A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem}, journal = {Inf. Sci.}, volume = {473}, pages = {13--30}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.09.024}, doi = {10.1016/J.INS.2018.09.024}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/JiaWNLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLLLSJ19, author = {Jinwei Wang and Yangyang Li and Jian Li and Xiangyang Luo and Yun{-}Qing Shi and Sunil Kr. Jha}, title = {Color image-spliced localization based on quaternion principal component analysis and quaternion skewness}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {353--362}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.004}, doi = {10.1016/J.JISA.2019.06.004}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangLLLSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiaCLYLLW19, author = {Hongyong Jia and Yue Chen and Yan Li and Xincheng Yan and Fenlin Liu and Xiangyang Luo and Bo Wang}, title = {Attributes revocation through ciphertext puncturation}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.011}, doi = {10.1016/J.JISA.2019.06.011}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiaCLYLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/LiuGWXL19, author = {Jiu{-}fen Liu and Junjun Gan and Junchao Wang and Che Xu and Xiangyang Luo}, title = {Efficient stego key recovery based on distribution differences of extracting message bits}, journal = {J. Real Time Image Process.}, volume = {16}, number = {3}, pages = {649--660}, year = {2019}, url = {https://doi.org/10.1007/s11554-018-0805-9}, doi = {10.1007/S11554-018-0805-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/LiuGWXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/JanickiMLY19, author = {Artur Janicki and Wojciech Mazurczyk and Xiangyang Luo and Dengpan Ye}, title = {Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {9}, pages = {1039--1042}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_9/recent\_advances\_in\_detection}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/JanickiMLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangLYL19, author = {Ping Wang and Fenlin Liu and Chunfang Yang and Xiangyang Luo}, title = {Steganalysis aided by fragile detection of image manipulations}, journal = {Multim. Tools Appl.}, volume = {78}, number = {16}, pages = {23309--23328}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7654-9}, doi = {10.1007/S11042-019-7654-9}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangLYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangLLYGL19, author = {Qikun Zhang and Yongjiao Li and Zhigang Li and Junling Yuan and Yong Gan and Xiangyang Luo}, title = {Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things}, journal = {Sensors}, volume = {19}, number = {23}, pages = {5237}, year = {2019}, url = {https://doi.org/10.3390/s19235237}, doi = {10.3390/S19235237}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhangLLYGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/MaLLBZ19, author = {Yuanyuan Ma and Xiangyang Luo and Xiaolong Li and Zhenkun Bao and Yi Zhang}, title = {Selection of Rich Model Steganalysis Features Based on Decision Rough Set {\(\alpha\)}-Positive Region Reduction}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {29}, number = {2}, pages = {336--350}, year = {2019}, url = {https://doi.org/10.1109/TCSVT.2018.2799243}, doi = {10.1109/TCSVT.2018.2799243}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/MaLLBZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/QianXLZ19, author = {Zhenxing Qian and Haisheng Xu and Xiangyang Luo and Xinpeng Zhang}, title = {New Framework of Reversible Data Hiding in Encrypted {JPEG} Bitstreams}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {29}, number = {2}, pages = {351--362}, year = {2019}, url = {https://doi.org/10.1109/TCSVT.2018.2797897}, doi = {10.1109/TCSVT.2018.2797897}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/QianXLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WangLLSJ19, author = {Jinwei Wang and Ting Li and Xiangyang Luo and Yun{-}Qing Shi and Sunil Kr. Jha}, title = {Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {29}, number = {9}, pages = {2775--2785}, year = {2019}, url = {https://doi.org/10.1109/TCSVT.2018.2867786}, doi = {10.1109/TCSVT.2018.2867786}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WangLLSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangHCWXL19, author = {Qian Wang and Jing Huang and Yanjiao Chen and Cong Wang and Fu Xiao and Xiangyang Luo}, title = {\emph{PROST}: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {2}, pages = {374--386}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2850330}, doi = {10.1109/TIFS.2018.2850330}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangHCWXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuC0L0L19, author = {Shuangke Wu and Yanjiao Chen and Qian Wang and Minghui Li and Cong Wang and Xiangyang Luo}, title = {CReam: {A} Smart Contract Enabled Collusion-Resistant e-Auction}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {7}, pages = {1687--1701}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2883275}, doi = {10.1109/TIFS.2018.2883275}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuC0L0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/QiaoSLXZW19, author = {Tong Qiao and Ran Shi and Xiangyang Luo and Ming Xu and Ning Zheng and Yiming Wu}, title = {Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication}, journal = {{IEEE} Trans. Multim.}, volume = {21}, number = {5}, pages = {1077--1092}, year = {2019}, url = {https://doi.org/10.1109/TMM.2018.2872863}, doi = {10.1109/TMM.2018.2872863}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/QiaoSLXZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tois/WuQLWZL19, author = {Libing Wu and Cong Quan and Chenliang Li and Qian Wang and Bolong Zheng and Xiangyang Luo}, title = {A Context-Aware User-Item Representation Learning for Item Recommendation}, journal = {{ACM} Trans. Inf. Syst.}, volume = {37}, number = {2}, pages = {22:1--22:29}, year = {2019}, url = {https://doi.org/10.1145/3298988}, doi = {10.1145/3298988}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tois/WuQLWZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/MaL00B19, author = {Yuanyuan Ma and Xiangyang Luo and Zhenyu Li and Yi Zhang and Adrian G. Bors}, title = {Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion}, booktitle = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM} {TUR-C} 2019, Chengdu, China, May 17-19, 2019}, pages = {66:1--66:5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321408.3321572}, doi = {10.1145/3321408.3321572}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/acmturc/MaL00B19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/LuoRSXW19, author = {Xiangyang Luo and Xiangying Ran and Wei Sun and Yunlai Xu and Chongjun Wang}, editor = {Igor V. Tetko and Vera Kurkov{\'{a}} and Pavel Karpov and Fabian J. Theis}, title = {A Label-Specific Attention-Based Network with Regularized Loss for Multi-label Classification}, booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2019: Deep Learning - 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17-19, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11728}, pages = {731--742}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30484-3\_57}, doi = {10.1007/978-3-030-30484-3\_57}, timestamp = {Sat, 19 Oct 2019 20:11:52 +0200}, biburl = {https://dblp.org/rec/conf/icann/LuoRSXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MaLZL19, author = {Te Ma and Fenlin Liu and Fan Zhang and Xiangyang Luo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement}, booktitle = {Artificial Intelligence and Security - 5th International Conference, {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11634}, pages = {163--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24271-8\_15}, doi = {10.1007/978-3-030-24271-8\_15}, timestamp = {Fri, 19 Jul 2019 12:53:39 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/MaLZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/GaoGZWL19, author = {Tianyu Gao and Yanqing Guo and Xin Zheng and Qianyu Wang and Xiangyang Luo}, title = {Moir{\'{e}} Pattern Removal with Multi-scale Feature Enhancing Network}, booktitle = {{IEEE} International Conference on Multimedia {\&} Expo Workshops, {ICME} Workshops 2019, Shanghai, China, July 8-12, 2019}, pages = {240--245}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICMEW.2019.00048}, doi = {10.1109/ICMEW.2019.00048}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/GaoGZWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/LiNLCQ19, author = {Chenliang Li and Xichuan Niu and Xiangyang Luo and Zhenzhong Chen and Cong Quan}, editor = {Sarit Kraus}, title = {A Review-Driven Neural Model for Sequential Recommendation}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {2866--2872}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/397}, doi = {10.24963/IJCAI.2019/397}, timestamp = {Tue, 20 Aug 2019 16:18:18 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/LiNLCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/SunRLW19, author = {Wei Sun and Xiangying Ran and Xiangyang Luo and Chongjun Wang}, title = {An Efficient Framework by Topic Model for Multi-label Text Classification}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IJCNN.2019.8852091}, doi = {10.1109/IJCNN.2019.8852091}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/SunRLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/XuRSLW19, author = {Yunlai Xu and Xiangying Ran and Wei Sun and Xiangyang Luo and Chongjun Wang}, title = {Gated Neural Network with Regularized Loss for Multi-label Text Classification}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IJCNN.2019.8851686}, doi = {10.1109/IJCNN.2019.8851686}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/XuRSLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0002LZCWLL19, author = {Qian Wang and Xiu Lin and Man Zhou and Yanjiao Chen and Cong Wang and Qi Li and Xiangyang Luo}, title = {VoicePop: {A} Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {2062--2070}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737422}, doi = {10.1109/INFOCOM.2019.8737422}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/0002LZCWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WangHLS19, author = {Jinwei Wang and Wei Huang and Xiangyang Luo and Yung{-}Qing Shi}, editor = {Hongxia Wang and Xianfeng Zhao and Yunqing Shi and Hyoung Joong Kim and Alessandro Piva}, title = {Double {JPEG} Compression Detection Based on Markov Model}, booktitle = {Digital Forensics and Watermarking - 18th International Workshop, {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12022}, pages = {141--149}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43575-2\_11}, doi = {10.1007/978-3-030-43575-2\_11}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/WangHLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/XuLLPLJ19, author = {Canwen Xu and Jing Li and Xiangyang Luo and Jiaxin Pei and Chenliang Li and Donghong Ji}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {DLocRL: {A} Deep Learning Pipeline for Fine-Grained Location Recognition and Linking in Tweets}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {3391--3397}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313491}, doi = {10.1145/3308558.3313491}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/XuLLPLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-07005, author = {Canwen Xu and Jing Li and Xiangyang Luo and Jiaxin Pei and Chenliang Li and Donghong Ji}, title = {DLocRL: {A} Deep Learning Pipeline for Fine-Grained Location Recognition and Linking in Tweets}, journal = {CoRR}, volume = {abs/1901.07005}, year = {2019}, url = {http://arxiv.org/abs/1901.07005}, eprinttype = {arXiv}, eprint = {1901.07005}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-07005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00590, author = {Chenliang Li and Xichuan Niu and Xiangyang Luo and Zhenzhong Chen and Cong Quan}, title = {A Review-Driven Neural Model for Sequential Recommendation}, journal = {CoRR}, volume = {abs/1907.00590}, year = {2019}, url = {http://arxiv.org/abs/1907.00590}, eprinttype = {arXiv}, eprint = {1907.00590}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00590.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-02439, author = {Shichang Ding and Xiangyang Luo and Dengpan Ye and Fenlin Liu}, title = {Delay-Distance Correlation Study for {IP} Geolocation}, journal = {CoRR}, volume = {abs/1909.02439}, year = {2019}, url = {http://arxiv.org/abs/1909.02439}, eprinttype = {arXiv}, eprint = {1909.02439}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-02439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-13111, author = {Lingchen Zhao and Shengshan Hu and Qian Wang and Jianlin Jiang and Chao Shen and Xiangyang Luo}, title = {Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection}, journal = {CoRR}, volume = {abs/1910.13111}, year = {2019}, url = {http://arxiv.org/abs/1910.13111}, eprinttype = {arXiv}, eprint = {1910.13111}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-13111.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangGWLK18, author = {Qianyu Wang and Yanqing Guo and Jiujun Wang and Xiangyang Luo and Xiangwei Kong}, title = {Multi-View Analysis Dictionary Learning for Image Classification}, journal = {{IEEE} Access}, volume = {6}, pages = {20174--20183}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2791578}, doi = {10.1109/ACCESS.2018.2791578}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangGWLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZuLLLL18, author = {Shuodi Zu and Xiangyang Luo and Siqi Liu and Yan Liu and Fenlin Liu}, title = {City-Level {IP} Geolocation Algorithm Based on PoP Network Topology}, journal = {{IEEE} Access}, volume = {6}, pages = {64867--64875}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2878309}, doi = {10.1109/ACCESS.2018.2878309}, timestamp = {Wed, 26 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZuLLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YangLLL18, author = {Chunfang Yang and Xiangyang Luo and Jicang Lu and Fenlin Liu}, title = {Extracting hidden messages of {MLSB} steganography based on optimal stego subset}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {11}, pages = {119103:1--119103:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9328-2}, doi = {10.1007/S11432-017-9328-2}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/YangLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLL18, author = {Yimin Liu and Wenyan Liu and Xiangyang Luo}, title = {Survey on the Indoor Localization Technique of Wi-Fi Access Points}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {27--42}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070103}, doi = {10.4018/IJDCF.2018070103}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ShiLZPCG18, author = {Wenqi Shi and Xiangyang Luo and Fan Zhao and Ziru Peng and Qingfeng Cheng and Yong Gan}, title = {Geolocating a WeChat user based on the relation between reported and actual distance}, journal = {Int. J. Distributed Sens. Networks}, volume = {14}, number = {4}, year = {2018}, url = {https://doi.org/10.1177/1550147718774462}, doi = {10.1177/1550147718774462}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ShiLZPCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinCLZS18, author = {Chuan Qin and Xueqin Chen and Xiangyang Luo and Xinpeng Zhang and Xingming Sun}, title = {Perceptual image hashing via dual-cross pattern encoding and salient structure detection}, journal = {Inf. Sci.}, volume = {423}, pages = {284--302}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2017.09.060}, doi = {10.1016/J.INS.2017.09.060}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/QinCLZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinHLD18, author = {Chuan Qin and Zhihong He and Xiangyang Luo and Jing Dong}, title = {Reversible data hiding in encrypted image with separable capability and high embedding capacity}, journal = {Inf. Sci.}, volume = {465}, pages = {285--304}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.07.021}, doi = {10.1016/J.INS.2018.07.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/QinHLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/LuYLL18, author = {Jicang Lu and Chunfang Yang and Fenlin Liu and Xiangyang Luo}, title = {Quantitative steganalysis of {JPEG} additive steganography based on boundary effect}, journal = {J. Electronic Imaging}, volume = {27}, number = {2}, pages = {023004}, year = {2018}, url = {https://doi.org/10.1117/1.JEI.27.2.023004}, doi = {10.1117/1.JEI.27.2.023004}, timestamp = {Wed, 28 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/LuYLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangGLWLL18, author = {Qikun Zhang and Yong Gan and Lu Liu and Xianmin Wang and Xiangyang Luo and Yuanzhang Li}, title = {An authenticated asymmetric group key agreement based on attribute encryption}, journal = {J. Netw. Comput. Appl.}, volume = {123}, pages = {1--10}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.08.013}, doi = {10.1016/J.JNCA.2018.08.013}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZhangGLWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhouXLLZH18, author = {Yang Zhou and Qing Xu and Xiangyang Luo and Fenlin Liu and Long Zhang and Xiaofei Hu}, title = {{\unicode{32593}}{\unicode{32476}}{\unicode{31354}}{\unicode{38388}}{\unicode{27979}}{\unicode{32472}}{\unicode{30340}}{\unicode{27010}}{\unicode{24565}}{\unicode{21450}}{\unicode{20854}}{\unicode{25216}}{\unicode{26415}}{\unicode{20307}}{\unicode{31995}}{\unicode{30340}}{\unicode{30740}}{\unicode{31350}} (Research on Definition and Technological System of Cyberspace Surveying and Mapping)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {5}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.05.001}, doi = {10.11896/J.ISSN.1002-137X.2018.05.001}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhouXLLZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WangLYL18, author = {Ping Wang and Fenlin Liu and Chunfang Yang and Xiangyang Luo}, title = {Blind forensics of image gamma transformation and its application in splicing detection}, journal = {J. Vis. Commun. Image Represent.}, volume = {55}, pages = {80--90}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.05.020}, doi = {10.1016/J.JVCIR.2018.05.020}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/WangLYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangZQYL18, author = {Yi Zhang and Xiaodong Zhu and Chuan Qin and Chunfang Yang and Xiangyang Luo}, title = {Dither modulation based adaptive steganography resisting jpeg compression and statistic detection}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {17913--17935}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4506-3}, doi = {10.1007/S11042-017-4506-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ZhangZQYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XuLGL18, author = {Che Xu and Jiu{-}fen Liu and Junjun Gan and Xiangyang Luo}, title = {Stego key recovery based on the optimal hypothesis test}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {17973--17992}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4878-4}, doi = {10.1007/S11042-017-4878-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XuLGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/GanLLYL18, author = {Junjun Gan and Jiu{-}fen Liu and Xiangyang Luo and Chunfang Yang and Fenlin Liu}, title = {Reliable steganalysis of {HUGO} steganography based on partially known plaintext}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18007--18027}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5134-7}, doi = {10.1007/S11042-017-5134-7}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/GanLLYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiSHML18, author = {Ruixiang Li and Yuchen Sun and Jianwei Hu and Te Ma and Xiangyang Luo}, title = {Street-Level Landmark Evaluation Based on Nearest Routers}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {2507293:1--2507293:12}, year = {2018}, url = {https://doi.org/10.1155/2018/2507293}, doi = {10.1155/2018/2507293}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiSHML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SzczypiorskiWLY18, author = {Krzysztof Szczypiorski and Liqiang Wang and Xiangyang Luo and Dengpan Ye}, title = {Big Data Analytics for Information Security}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7657891:1--7657891:2}, year = {2018}, url = {https://doi.org/10.1155/2018/7657891}, doi = {10.1155/2018/7657891}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SzczypiorskiWLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZhangQZLL18, author = {Yi Zhang and Chuan Qin and Weiming Zhang and Fenlin Liu and Xiangyang Luo}, title = {On the fault-tolerant performance for a class of robust image steganography}, journal = {Signal Process.}, volume = {146}, pages = {99--111}, year = {2018}, url = {https://doi.org/10.1016/j.sigpro.2018.01.011}, doi = {10.1016/J.SIGPRO.2018.01.011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/ZhangQZLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/WangLYL18, author = {Ping Wang and Fenlin Liu and Chunfang Yang and Xiangyang Luo}, title = {Parameter estimation of image gamma transformation based on zero-value histogram bin locations}, journal = {Signal Process. Image Commun.}, volume = {64}, pages = {33--45}, year = {2018}, url = {https://doi.org/10.1016/j.image.2018.02.011}, doi = {10.1016/J.IMAGE.2018.02.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/WangLYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/PengLZCL18, author = {Ziru Peng and Xiangyang Luo and Fan Zhao and Qingfeng Cheng and Fenlin Liu}, title = {Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {2769417:1--2769417:19}, year = {2018}, url = {https://doi.org/10.1155/2018/2769417}, doi = {10.1155/2018/2769417}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/PengLZCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiYJLNL18, author = {Shiyu Li and Dengpan Ye and Shunzhi Jiang and Changrui Liu and Xiaoguang Niu and Xiangyang Luo}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Attack on Deep Steganalysis Neural Networks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {265--276}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_23}, doi = {10.1007/978-3-030-00015-8\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiYJLNL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HuCWWL018, author = {Shengshan Hu and Chengjun Cai and Qian Wang and Cong Wang and Xiangyang Luo and Kui Ren}, title = {Searching an Encrypted Cloud Meets Blockchain: {A} Decentralized, Reliable and Fair Realization}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {792--800}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8485890}, doi = {10.1109/INFOCOM.2018.8485890}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/HuCWWL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/XuGZWL18, author = {Nan Xu and Yanqing Guo and Xin Zheng and Qianyu Wang and Xiangyang Luo}, editor = {Susanne Boll and Kyoung Mu Lee and Jiebo Luo and Wenwu Zhu and Hyeran Byun and Chang Wen Chen and Rainer Lienhart and Tao Mei}, title = {Partial Multi-view Subspace Clustering}, booktitle = {2018 {ACM} Multimedia Conference on Multimedia Conference, {MM} 2018, Seoul, Republic of Korea, October 22-26, 2018}, pages = {1794--1801}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3240508.3240679}, doi = {10.1145/3240508.3240679}, timestamp = {Mon, 18 Nov 2019 15:08:26 +0100}, biburl = {https://dblp.org/rec/conf/mm/XuGZWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenLYL17, author = {Zhe Chen and Jicang Lu and Pengfei Yang and Xiangyang Luo}, title = {Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {48--61}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100105}, doi = {10.4018/IJDCF.2017100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongLCYL17, author = {Xiaofeng Song and Fenlin Liu and Liju Chen and Chunfang Yang and Xiangyang Luo}, title = {Optimal Gabor Filters for Steganalysis of Content-Adaptive {JPEG} Steganography}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {1}, pages = {552--569}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.01.029}, doi = {10.3837/TIIS.2017.01.029}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongLCYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/ZhangLYLSL17, author = {Yi Zhang and Fenlin Liu and Chunfang Yang and Xiangyang Luo and Xiaofeng Song and Jicang Lu}, title = {Steganalysis of content-adaptive {JPEG} steganography based on Gauss partial derivative filter bank}, journal = {J. Electronic Imaging}, volume = {26}, number = {1}, pages = {13011}, year = {2017}, url = {https://doi.org/10.1117/1.JEI.26.1.013011}, doi = {10.1117/1.JEI.26.1.013011}, timestamp = {Thu, 18 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jei/ZhangLYLSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/BaoLL17, author = {Zhenkun Bao and Xiaolong Li and Xiangyang Luo}, title = {On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband}, journal = {J. Electronic Imaging}, volume = {26}, number = {1}, pages = {13025}, year = {2017}, url = {https://doi.org/10.1117/1.JEI.26.1.013025}, doi = {10.1117/1.JEI.26.1.013025}, timestamp = {Fri, 07 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/BaoLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangLYL17, author = {Yi Zhang and Xiangyang Luo and Chunfang Yang and Fenlin Liu}, title = {Joint {JPEG} compression and detection resistant performance enhancement for adaptive steganography using feature regions selection}, journal = {Multim. Tools Appl.}, volume = {76}, number = {3}, pages = {3649--3668}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3914-0}, doi = {10.1007/S11042-016-3914-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangLYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/BaoLZYL17, author = {Zhenkun Bao and Xiangyang Luo and Weiming Zhang and Chunfang Yang and Fenlin Liu}, title = {Improving side-informed {JPEG} steganography using two-dimensional decomposition embedding method}, journal = {Multim. Tools Appl.}, volume = {76}, number = {12}, pages = {14345--14374}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3823-2}, doi = {10.1007/S11042-016-3823-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/BaoLZYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SongLZYLC17, author = {Xiaofeng Song and Fenlin Liu and Zhengui Zhang and Chunfang Yang and Xiangyang Luo and Liju Chen}, title = {2D Gabor filters-based steganalysis of content-adaptive {JPEG} steganography}, journal = {Multim. Tools Appl.}, volume = {76}, number = {24}, pages = {26391--26419}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-4157-9}, doi = {10.1007/S11042-016-4157-9}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SongLZYLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenLGZG17, author = {Jun Chen and Xiangyang Luo and Yanqing Guo and Yi Zhang and Daofu Gong}, title = {A Survey on Breaking Technique of Text-Based {CAPTCHA}}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {6898617:1--6898617:15}, year = {2017}, url = {https://doi.org/10.1155/2017/6898617}, doi = {10.1155/2017/6898617}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenLGZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/WangGGLK17, author = {Jiujun Wang and Yanqing Guo and Jun Guo and Xiangyang Luo and Xiangwei Kong}, title = {Class-Aware Analysis Dictionary Learning for Pattern Classification}, journal = {{IEEE} Signal Process. Lett.}, volume = {24}, number = {12}, pages = {1822--1826}, year = {2017}, url = {https://doi.org/10.1109/LSP.2017.2734860}, doi = {10.1109/LSP.2017.2734860}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/WangGGLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ShiLZPG17, author = {Wenqi Shi and Xiangyang Luo and Fan Zhao and Ziru Peng and Yong Gan}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {223--235}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_17}, doi = {10.1007/978-3-319-69471-9\_17}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/ShiLZPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ZhaoLGZL17, author = {Fan Zhao and Xiangyang Luo and Yong Gan and Shuodi Zu and Fenlin Liu}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {{IP} Geolocation Base on Local Delay Distribution Similarity}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {383--395}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_28}, doi = {10.1007/978-3-319-69471-9\_28}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/ZhaoLGZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsaa/YangZWLLL17, author = {Chunfang Yang and Yi Zhang and Ping Wang and Xiangyang Luo and Fenlin Liu and Jicang Lu}, title = {Steganalysis Feature Subspace Selection Based on Fisher Criterion}, booktitle = {2017 {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2017, Tokyo, Japan, October 19-21, 2017}, pages = {514--521}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DSAA.2017.53}, doi = {10.1109/DSAA.2017.53}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dsaa/YangZWLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhaoCYL17, author = {Fan Zhao and Jingning Chen and Dengpan Ye and Xiangyang Luo}, title = {A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {140--144}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.94}, doi = {10.1109/DSC.2017.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ZhaoCYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/LiLSC17, author = {Mingyue Li and Xiangyang Luo and Wenqi Shi and Lixiang Chai}, title = {City-level {IP} geolocation based on network topology community detection}, booktitle = {2017 International Conference on Information Networking, {ICOIN} 2017, Da Nang, Vietnam, January 11-13, 2017}, pages = {578--583}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICOIN.2017.7899562}, doi = {10.1109/ICOIN.2017.7899562}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icoin/LiLSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangLWSYL17, author = {Zhiqian Zhang and Chenliang Li and Zhiyong Wu and Aixin Sun and Dengpan Ye and Xiangyang Luo}, title = {{NEXT:} {A} Neural Network Framework for Next {POI} Recommendation}, journal = {CoRR}, volume = {abs/1704.04576}, year = {2017}, url = {http://arxiv.org/abs/1704.04576}, eprinttype = {arXiv}, eprint = {1704.04576}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangLWSYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-03656, author = {Nan Xu and Yanqing Guo and Jiujun Wang and Xiangyang Luo and Ran He}, title = {Joint Adaptive Neighbours and Metric Learning for Multi-view Subspace Clustering}, journal = {CoRR}, volume = {abs/1709.03656}, year = {2017}, url = {http://arxiv.org/abs/1709.03656}, eprinttype = {arXiv}, eprint = {1709.03656}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-03656.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuTHWL16, author = {Jiu{-}fen Liu and Yu{-}guo Tian and Tao Han and Junchao Wang and Xiangyang Luo}, title = {Stego key searching for {LSB} steganography on {JPEG} decompressed image}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {3}, pages = {32105:1--32105:15}, year = {2016}, url = {https://doi.org/10.1007/s11432-015-5367-x}, doi = {10.1007/S11432-015-5367-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiuTHWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenLLZZ16, author = {Jingning Chen and Fenlin Liu and Xiangyang Luo and Fan Zhao and Guang Zhu}, title = {A landmark calibration-based {IP} geolocation approach}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {4}, year = {2016}, url = {https://doi.org/10.1186/s13635-015-0029-5}, doi = {10.1186/S13635-015-0029-5}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenLLZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/XieLGLL16, author = {Xin Xie and Bin Lu and Daofu Gong and Xiangyang Luo and Fenlin Liu}, title = {Random table and hash coding-based binary code obfuscation against stack trace analysis}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {18--27}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2013.0137}, doi = {10.1049/IET-IFS.2013.0137}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/XieLGLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangLYL16, author = {Ping Wang and Xiangyang Luo and Chunfang Yang and Fenlin Liu}, title = {Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {36--47}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040104}, doi = {10.4018/IJDCF.2016040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangLYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/QinYL16, author = {Chuan Qin and Dengpan Ye and Xiangyang Luo}, title = {Guest Editorial: Information Hiding and Forensics for Multimedia Security}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13421--13429}, year = {2016}, url = {https://doi.org/10.1007/s11042-016-3876-2}, doi = {10.1007/S11042-016-3876-2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/QinYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuoSLZLYL16, author = {Xiangyang Luo and Xiaofeng Song and Xiaolong Li and Weiming Zhang and Jicang Lu and Chunfang Yang and Fenlin Liu}, title = {Steganalysis of {HUGO} steganography based on parameter recognition of syndrome-trellis-codes}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13557--13583}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2759-2}, doi = {10.1007/S11042-015-2759-2}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LuoSLZLYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangLYYL16, author = {Yi Zhang and Xiangyang Luo and Chunfang Yang and Dengpan Ye and Fenlin Liu}, title = {A framework of adaptive steganography resisting {JPEG} compression and detection}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2957--2971}, year = {2016}, url = {https://doi.org/10.1002/sec.1502}, doi = {10.1002/SEC.1502}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangLYYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LuLL15, author = {Jicang Lu and Fenlin Liu and Xiangyang Luo}, title = {A study on {JPEG} steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix}, journal = {Digit. Investig.}, volume = {12}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2014.12.001}, doi = {10.1016/J.DIIN.2014.12.001}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LuLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SongLYLL15, author = {Xiaofeng Song and Fenlin Liu and Chunfang Yang and Xiangyang Luo and Zhenyu Li}, title = {Steganalysis of Adaptive {JPEG} Steganography by Selecting {DCT} Coefficients According to Embedding Distortion}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5209--5228}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.026}, doi = {10.3837/TIIS.2015.12.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SongLYLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/ZhangLYLS15, author = {Yi Zhang and Fenlin Liu and Chunfang Yang and Xiangyang Luo and Xiaofeng Song}, title = {Detection of perturbed quantization class stego images based on possible change modes}, journal = {J. Electronic Imaging}, volume = {24}, number = {6}, pages = {063005}, year = {2015}, url = {https://doi.org/10.1117/1.JEI.24.6.063005}, doi = {10.1117/1.JEI.24.6.063005}, timestamp = {Thu, 18 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jei/ZhangLYLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SongLLLZ15, author = {Xiaofeng Song and Fenlin Liu and Xiangyang Luo and Jicang Lu and Yi Zhang}, title = {Steganalysis of perturbed quantization steganography based on the enhanced histogram features}, journal = {Multim. Tools Appl.}, volume = {74}, number = {24}, pages = {11045--11071}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2217-6}, doi = {10.1007/S11042-014-2217-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SongLLLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChenLLZZ15, author = {Jingning Chen and Fenlin Liu and Xiangyang Luo and Fan Zhao and Guang Zhu}, title = {A Landmark Calibration Based {IP} Geolocation Approach}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {411--416}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.52}, doi = {10.1109/ARES.2015.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ChenLLZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZhangLYYL15, author = {Yi Zhang and Xiangyang Luo and Chunfang Yang and Dengpan Ye and Fenlin Liu}, title = {A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between {DCT} Coefficients}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {461--466}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.53}, doi = {10.1109/ARES.2015.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ZhangLYYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ZhaoSLKCL15, author = {Fan Zhao and Yuhan Song and Fenlin Liu and Ke Ke and Jingning Chen and Xiangyang Luo}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {City-Level Geolocation Based on Routing Feature}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {414--419}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.215}, doi = {10.1109/AINA.2015.215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ZhaoSLKCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SongLYLZ15, author = {Xiaofeng Song and Fenlin Liu and Chunfang Yang and Xiangyang Luo and Yi Zhang}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro Comesa{\~{n}}a Alfaro}, title = {Steganalysis of Adaptive {JPEG} Steganography Using 2D Gabor Filters}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {15--23}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756608}, doi = {10.1145/2756601.2756608}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/SongLYLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/ZhuLLC15, author = {Guang Zhu and Xiangyang Luo and Fenlin Liu and Jingning Chen}, editor = {Leonard Barolli and Makoto Takizawa and Hui{-}Huang Hsu and Tomoya Enokido and Fatos Xhafa}, title = {An Algorithm of City-Level Landmark Mining Based on Internet Forum}, booktitle = {18th International Conference on Network-Based Information Systems, NBis 2015, Taipei, Taiwan, September 2-4, 2015}, pages = {294--301}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/NBiS.2015.46}, doi = {10.1109/NBIS.2015.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/ZhuLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LuLL14, author = {Jicang Lu and Fenlin Liu and Xiangyang Luo}, title = {Selection of image features for steganalysis based on the Fisher criterion}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {57--66}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2013.12.001}, doi = {10.1016/J.DIIN.2013.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LuLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuLL14, author = {Jicang Lu and Fenlin Liu and Xiangyang Luo}, title = {Recognizing F5-like Stego images from Multi-class {JPEG} Stego Images}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {11}, pages = {4153--4169}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.11.028}, doi = {10.3837/TIIS.2014.11.028}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LuLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuoYHLW14, author = {Xiangyang Luo and Lin Yang and Dai Hao and Fenlin Liu and Daoshun Wang}, title = {On Data and Virtualization Security Risks and Solutions of Cloud Computing}, journal = {J. Networks}, volume = {9}, number = {3}, pages = {571--581}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.3.571-581}, doi = {10.4304/JNW.9.3.571-581}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuoYHLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/YangYLMKZ13, author = {Zan Yang and Lin Yang and Xiangyang Luo and Linru Ma and Bao{-}sheng Kou and Kun Zhang}, title = {Model of Domain based {RBAC} and Supporting Technologies}, journal = {J. Comput.}, volume = {8}, number = {5}, pages = {1220--1229}, year = {2013}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=71\&\#38;id=960}, doi = {10.4304/JCP.8.5.1220-1229}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/YangYLMKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YangLLZ13, author = {Chunfang Yang and Fenlin Liu and Xiangyang Luo and Ying Zeng}, title = {Fusion of Two Typical Quantitative Steganalysis Based on {SVR}}, journal = {J. Softw.}, volume = {8}, number = {3}, pages = {731--736}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.3.731-736}, doi = {10.4304/JSW.8.3.731-736}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YangLLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YinLLL13, author = {Meijuan Yin and Xiaonan Liu and Junyong Luo and Xiangyang Luo}, title = {A System for Extracting and Ranking Name Aliases in Emails}, journal = {J. Softw.}, volume = {8}, number = {3}, pages = {737--745}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.3.737-745}, doi = {10.4304/JSW.8.3.737-745}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YinLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiLLYZ13, author = {Xiaolong Li and Bin Li and Xiangyang Luo and Bin Yang and Ruihui Zhu}, title = {Steganalysis of a PVD-based content adaptive image steganography}, journal = {Signal Process.}, volume = {93}, number = {9}, pages = {2529--2538}, year = {2013}, url = {https://doi.org/10.1016/j.sigpro.2013.03.029}, doi = {10.1016/J.SIGPRO.2013.03.029}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiLLYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WangLLL13, author = {Daoshun Wang and Song Liu and Xiangyang Luo and Shundong Li}, title = {A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition}, journal = {Telecommun. Syst.}, volume = {54}, number = {3}, pages = {359--371}, year = {2013}, url = {https://doi.org/10.1007/s11235-013-9739-5}, doi = {10.1007/S11235-013-9739-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/WangLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLLZ13, author = {Chunfang Yang and Fenlin Liu and Xiangyang Luo and Ying Zeng}, title = {Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {216--228}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2229987}, doi = {10.1109/TIFS.2012.2229987}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/YuYWZCML13, author = {Bo Yu and Lin Yang and Yongjun Wang and Bofeng Zhang and Yuan Cao and Linru Ma and Xiangyang Luo}, title = {Rule-Based Security Capabilities Matching for Web Services}, journal = {Wirel. Pers. Commun.}, volume = {73}, number = {4}, pages = {1349--1367}, year = {2013}, url = {https://doi.org/10.1007/s11277-013-1254-1}, doi = {10.1007/S11277-013-1254-1}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/YuYWZCML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/LiuLLG13, author = {Yuan Liu and Xiangyang Luo and Jicang Lu and Daofu Gong}, editor = {Ke Lu and Tao Mei and Xindong Wu}, title = {Steganalysis of F5-like steganography based on selection of joint distribution features}, booktitle = {International Conference on Internet Multimedia Computing and Service, {ICIMCS} '13, Huangshan, China - August 17 - 19, 2013}, pages = {71--75}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2499788.2499821}, doi = {10.1145/2499788.2499821}, timestamp = {Mon, 07 Jan 2019 17:17:42 +0100}, biburl = {https://dblp.org/rec/conf/icimcs/LiuLLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiHLL13, author = {Zhenyu Li and Zongyun Hu and Xiangyang Luo and Bin Lu}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Embedding change rate estimation based on ensemble learning}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {77--84}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482528}, doi = {10.1145/2482513.2482528}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiHLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LuoLYLW12, author = {Xiangyang Luo and Fenlin Liu and Chunfang Yang and Shiguo Lian and Daoshun Wang}, title = {On {F5} Steganography in Images}, journal = {Comput. J.}, volume = {55}, number = {4}, pages = {447--456}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr092}, doi = {10.1093/COMJNL/BXR092}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LuoLYLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangLLLW12, author = {Chunfang Yang and Fenlin Liu and Shiguo Lian and Xiangyang Luo and Daoshun Wang}, title = {Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane}, journal = {Comput. J.}, volume = {55}, number = {6}, pages = {717--727}, year = {2012}, url = {https://doi.org/10.1093/comjnl/bxr112}, doi = {10.1093/COMJNL/BXR112}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangLLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZengLLL12, author = {Ying Zeng and Fenlin Liu and Xiangyang Luo and Shiguo Lian}, title = {Abstract interpretation-based semantic framework for software birthmark}, journal = {Comput. Secur.}, volume = {31}, number = {4}, pages = {377--390}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.03.004}, doi = {10.1016/J.COSE.2012.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZengLLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZongLL12, author = {Han Zong and Fenlin Liu and Xiangyang Luo}, title = {Blind image steganalysis based on wavelet coefficient correlation}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {58--68}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.02.003}, doi = {10.1016/J.DIIN.2012.02.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZongLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuLLY12, author = {Jicang Lu and Fenlin Liu and Xiangyang Luo and Chunfang Yang}, title = {Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis}, journal = {Multim. Tools Appl.}, volume = {57}, number = {1}, pages = {91--107}, year = {2012}, url = {https://doi.org/10.1007/s11042-010-0588-x}, doi = {10.1007/S11042-010-0588-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LuLLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuoLYLZ12, author = {Xiangyang Luo and Fenlin Liu and Chunfang Yang and Shiguo Lian and Ying Zeng}, title = {Steganalysis of adaptive image steganography in multiple gray code bit-planes}, journal = {Multim. Tools Appl.}, volume = {57}, number = {3}, pages = {651--667}, year = {2012}, url = {https://doi.org/10.1007/s11042-010-0663-3}, doi = {10.1007/S11042-010-0663-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LuoLYLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhaoLLXY12, author = {Zheng Zhao and Fenlin Liu and Xiangyang Luo and Xin Xie and Lu Yu}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {{LSB} Replacement Steganography Software Detection Based on Model Checking}, booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW} 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7809}, pages = {54--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40099-5\_6}, doi = {10.1007/978-3-642-40099-5\_6}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhaoLLXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmis/LuHLL11, author = {Jicang Lu and Yongfeng Huang and Fenlin Liu and Xiangyang Luo}, title = {Pulse position checking-based steganalysis of {G.723.1} compressed speech in VoIP}, journal = {Int. J. Multim. Intell. Secur.}, volume = {2}, number = {3/4}, pages = {225--237}, year = {2011}, url = {https://doi.org/10.1504/IJMIS.2011.044762}, doi = {10.1504/IJMIS.2011.044762}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmis/LuHLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmis/ZhengLYZL11, author = {Dongning Zheng and Fenlin Liu and Chunfang Yang and Qian Zhang and Xiangyang Luo}, title = {Identification of steganography software based on register dependence}, journal = {Int. J. Multim. Intell. Secur.}, volume = {2}, number = {3/4}, pages = {339--350}, year = {2011}, url = {https://doi.org/10.1504/IJMIS.2011.044764}, doi = {10.1504/IJMIS.2011.044764}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmis/ZhengLYZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/ZengLLY11, author = {Ying Zeng and Fenlin Liu and Xiangyang Luo and Chunfang Yang}, title = {Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis}, journal = {J. Multim.}, volume = {6}, number = {4}, pages = {329--340}, year = {2011}, url = {https://doi.org/10.4304/jmm.6.4.329-340}, doi = {10.4304/JMM.6.4.329-340}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/ZengLLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LuoLLYG11, author = {Xiangyang Luo and Fenlin Liu and Shiguo Lian and Chunfang Yang and Stefanos Gritzalis}, title = {On the Typical Statistic Features for Image Blind Steganalysis}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {29}, number = {7}, pages = {1404--1422}, year = {2011}, url = {https://doi.org/10.1109/JSAC.2011.110807}, doi = {10.1109/JSAC.2011.110807}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LuoLLYG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuoLYW10, author = {Xiangyang Luo and Fenlin Liu and Chunfang Yang and Daoshun Wang}, title = {Image universal steganalysis based on best wavelet packet decomposition}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {634--647}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0044-6}, doi = {10.1007/S11432-010-0044-6}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LuoLYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuoLYL10, author = {Xiangyang Luo and Fenlin Liu and Chunfang Yang and Shiguo Lian}, title = {Modification ratio estimation for a category of adaptive steganography}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {12}, pages = {2472--2484}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-4105-7}, doi = {10.1007/S11432-010-4105-7}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LuoLYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangLL09, author = {Chunfang Yang and Xiangyang Luo and Fenlin Liu}, editor = {Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Embedding Ratio Estimating for Each Bit Plane of Image}, booktitle = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5806}, pages = {59--72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04431-1\_5}, doi = {10.1007/978-3-642-04431-1\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/YangLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/HeLLY09, author = {Xiongfei He and Fenlin Liu and Xiangyang Luo and Chunfang Yang}, title = {Classification between {PS} and Stego Images Based on Noise Model}, booktitle = {2009 Third International Conference on Multimedia and Ubiquitous Engineering, {MUE} 2009, Qingdao, China, June 4-6, 2009}, pages = {31--36}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MUE.2009.16}, doi = {10.1109/MUE.2009.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/HeLLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LuoWWL08, author = {Xiangyang Luo and Daoshun Wang and Ping Wang and Fenlin Liu}, title = {A review on blind detection for image steganography}, journal = {Signal Process.}, volume = {88}, number = {9}, pages = {2138--2157}, year = {2008}, url = {https://doi.org/10.1016/j.sigpro.2008.03.016}, doi = {10.1016/J.SIGPRO.2008.03.016}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LuoWWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangLLL08, author = {Chunfang Yang and Fenlin Liu and Xiangyang Luo and Bin Liu}, title = {Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {662--672}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2007240}, doi = {10.1109/TIFS.2008.2007240}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangLLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/LuoLCZ08, author = {Xiangyang Luo and Fenlin Liu and Jianming Chen and Yining Zhang}, title = {Image universal steganalysis based on wavelet packet transform}, booktitle = {International Workshop on Multimedia Signal Processing, {MMSP} 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia}, pages = {780--784}, publisher = {{IEEE} Signal Processing Society}, year = {2008}, url = {https://doi.org/10.1109/MMSP.2008.4665180}, doi = {10.1109/MMSP.2008.4665180}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/LuoLCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LuoYWL07, author = {Xiangyang Luo and Chunfang Yang and Daoshun Wang and Fenlin Liu}, title = {{LTSB} Steganalysis Based on Quartic Equation}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {68--90}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_4}, doi = {10.1007/978-3-540-73092-7\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LuoYWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuoWWL07, author = {Xiangyang Luo and Daoshun Wang and Ping Wang and Fenlin Liu}, title = {Secret Key Estimation for Image Sequential Steganograph in Transform Domain}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {538--542}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.106}, doi = {10.1109/GLOCOM.2007.106}, timestamp = {Fri, 26 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LuoWWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semco/LuLGLL07, author = {Bin Lu and Fenlin Liu and Xin Ge and Bin Liu and Xiangyang Luo}, title = {A Software Birthmark Based on Dynamic Opcode n-gram}, booktitle = {Proceedings of the First {IEEE} International Conference on Semantic Computing {(ICSC} 2007), September 17-19, 2007, Irvine, California, {USA}}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSC.2007.15}, doi = {10.1109/ICSC.2007.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/semco/LuLGLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/LuoYL06, author = {Xiangyang Luo and Chunfang Yang and Fenlin Liu}, editor = {Herbert Leitold and Evangelos P. Markatos}, title = {Equivalence Analysis Among DIH, SPA, and {RS} Steganalysis Methods}, booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4237}, pages = {161--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11909033\_15}, doi = {10.1007/11909033\_15}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/LuoYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/WangLL06, author = {Ping Wang and Xiangyang Luo and Fenlin Liu}, title = {An Improved Secret Key Estimation Method for Sequential Steganography}, booktitle = {Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings}, pages = {396--402}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IIH-MSP.2006.265026}, doi = {10.1109/IIH-MSP.2006.265026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/WangLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/LuoWLL06, author = {Xiangyang Luo and Ping Wang and Peizhong Lu and Fenlin Liu}, editor = {Jun Ni and Jack J. Dongarra}, title = {Fast and Blind Restoration Scheme for the Initial States of LFSRs}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 1}, pages = {192--198}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.62}, doi = {10.1109/IMSCCS.2006.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/LuoWLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuLL06, author = {Fenlin Liu and Bin Lu and Xiangyang Luo}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {A Chaos-Based Robust Software Watermarking}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {355--366}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_33}, doi = {10.1007/11689522\_33}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mrcs/LiuLLL06, author = {Bin Liu and Fenlin Liu and Bin Lu and Xiangyang Luo}, editor = {Bilge G{\"{u}}nsel and Anil K. Jain and A. Murat Tekalp and B{\"{u}}lent Sankur}, title = {Real-Time Steganography in Compressed Video}, booktitle = {Multimedia Content Representation, Classification and Security, International Workshop, {MRCS} 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4105}, pages = {43--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11848035\_8}, doi = {10.1007/11848035\_8}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mrcs/LiuLLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcn/LuoLL06, author = {Xiangyang Luo and Junyong Luo and Fenlin Liu}, editor = {Thomas Fahringer}, title = {Searching and Detecting Spatial {LSB} Steganographic Images on the Internet}, booktitle = {Proceedings of the {IASTED} International Conference on Parallel and Distributed Computing and Networks, as part of the 24th {IASTED} International Multi-Conference on Applied Informatics, February 14-16 2006, Innsbruck, Austria}, pages = {273--278}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Mon, 19 Jun 2006 11:10:28 +0200}, biburl = {https://dblp.org/rec/conf/pdcn/LuoLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuLZL05, author = {Peizhong Lu and Shen Li and Yan Zou and Xiangyang Luo}, title = {Blind recognition of punctured convolutional codes}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {48}, number = {4}, pages = {484--498}, year = {2005}, url = {https://doi.org/10.1360/03yf0480}, doi = {10.1360/03YF0480}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LuLZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LuoLL05, author = {Xiangyang Luo and Bin Liu and Fenlin Liu}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Improved {RS} Method for Detection of {LSB} Steganography}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {508--516}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_54}, doi = {10.1007/11424826\_54}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LuoLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/LuoLL05, author = {Xiangyang Luo and Bin Liu and Fenlin Liu}, title = {Detecting {LSB} Steganography Based on Dynamic Masks}, booktitle = {Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications {(ISDA} 2005), 8-10 September 2005, Wroclaw, Poland}, pages = {251--255}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISDA.2005.37}, doi = {10.1109/ISDA.2005.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isda/LuoLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LuLTS04, author = {Peizhong Lu and Xiangyang Luo and Qingyang Tang and Shen Li}, editor = {Jessica J. Fridrich}, title = {An Improved Sample Pairs Method for Detection of {LSB} Embedding}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {116--127}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_9}, doi = {10.1007/978-3-540-30114-1\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LuLTS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LuSLZ04, author = {Peizhong Lu and Li Shen and Xiangyang Luo and Yan Zou}, title = {Blind recognition of punctured convolutional codes}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {459}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365494}, doi = {10.1109/ISIT.2004.1365494}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LuSLZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/ShenLLZ04, author = {Shen Li and Peizhong Lu and Xiangyang Luo and Yan Zou}, title = {Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {786}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286564}, doi = {10.1109/ITCC.2004.1286564}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/ShenLLZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.