BibTeX records: Xiangyang Luo

download as .bib file

@article{DBLP:journals/fcsc/ChenCYL24a,
  author       = {Xingxing Chen and
                  Qingfeng Cheng and
                  Weidong Yang and
                  Xiangyang Luo},
  title        = {An anonymous authentication and secure data transmission scheme for
                  the Internet of Things based on blockchain},
  journal      = {Frontiers Comput. Sci.},
  volume       = {18},
  number       = {3},
  pages        = {183807},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11704-023-2595-x},
  doi          = {10.1007/S11704-023-2595-X},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ChenCYL24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangYLLZ24,
  author       = {Fan Zhang and
                  Meijuan Yin and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Shuodi Zu},
  title        = {IP2vec: an {IP} node representation model for {IP} geolocation},
  journal      = {Frontiers Comput. Sci.},
  volume       = {18},
  number       = {6},
  pages        = {186506},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11704-023-2616-9},
  doi          = {10.1007/S11704-023-2616-9},
  timestamp    = {Sun, 14 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangYLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangWWLM24,
  author       = {Jiawei Zhang and
                  Jinwei Wang and
                  Hao Wang and
                  Xiangyang Luo and
                  Bin Ma},
  title        = {Trustworthy adaptive adversarial perturbations in social networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103675},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103675},
  doi          = {10.1016/J.JISA.2023.103675},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangWWLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamd/QiaoCZSSSL24,
  author       = {Tong Qiao and
                  Yuxing Chen and
                  Xiaofei Zhou and
                  Ran Shi and
                  Hang Shao and
                  Kunye Shen and
                  Xiangyang Luo},
  title        = {CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting
                  Synthesized Fake Images},
  journal      = {{IEEE} Trans. Cogn. Dev. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {369--379},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCDS.2023.3274450},
  doi          = {10.1109/TCDS.2023.3274450},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tamd/QiaoCZSSSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ChengWWLM24,
  author       = {Xin Cheng and
                  Jinwei Wang and
                  Hao Wang and
                  Xiangyang Luo and
                  Bin Ma},
  title        = {Quantization Step Estimation of Color Images Based on Res2Net-C With
                  Frequency Clustering Prior Knowledge},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {1},
  pages        = {632--646},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3284910},
  doi          = {10.1109/TCSVT.2023.3284910},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/ChengWWLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/MaXZZL24,
  author       = {Yuanyuan Ma and
                  Lige Xu and
                  Yi Zhang and
                  Tao Zhang and
                  Xiangyang Luo},
  title        = {Steganalysis Feature Selection With Multidimensional Evaluation and
                  Dynamic Threshold Allocation},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {3},
  pages        = {1954--1969},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3295364},
  doi          = {10.1109/TCSVT.2023.3295364},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/MaXZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/GaoZXLS24,
  author       = {Guangyong Gao and
                  Hui Zhang and
                  Zhihua Xia and
                  Xiangyang Luo and
                  Yun{-}Qing Shi},
  title        = {Reversible Data Hiding-Based Contrast Enhancement With Multi-Group
                  Stretching for {ROI} of Medical Image},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {3909--3923},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3318048},
  doi          = {10.1109/TMM.2023.3318048},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/GaoZXLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiaoMZWCXL23,
  author       = {Tong Qiao and
                  Yuyan Ma and
                  Ning Zheng and
                  Hanzhou Wu and
                  Yanli Chen and
                  Ming Xu and
                  Xiangyang Luo},
  title        = {A novel model watermarking for protecting generative adversarial network},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103102},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103102},
  doi          = {10.1016/J.COSE.2023.103102},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiaoMZWCXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiuLT23,
  author       = {Yimin Liu and
                  Xiangyang Luo and
                  Zhiyuan Tao},
  title        = {Construction of a high-precision general geographical location words
                  dataset},
  journal      = {Comput. Stand. Interfaces},
  volume       = {84},
  pages        = {103692},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103692},
  doi          = {10.1016/J.CSI.2022.103692},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiuLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/ZhangLL23,
  author       = {Fan Zhang and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Correction: Geolocation of covert communication entity on the Internet
                  for post-steganalysis},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2023},
  number       = {1},
  pages        = {2},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13640-023-00602-3},
  doi          = {10.1186/S13640-023-00602-3},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejivp/ZhangLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/FanLLZL23,
  author       = {Wentong Fan and
                  Zhenyu Li and
                  Hao Li and
                  Yi Zhang and
                  Xiangyang Luo},
  title        = {SNENet: An adaptive stego noise extraction network using parallel
                  dilated convolution for {JPEG} image steganalysis},
  journal      = {{IET} Image Process.},
  volume       = {17},
  number       = {10},
  pages        = {2894--2906},
  year         = {2023},
  url          = {https://doi.org/10.1049/ipr2.12835},
  doi          = {10.1049/IPR2.12835},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/FanLLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MaYLLZ23,
  author       = {Yuanyuan Ma and
                  Xinquan Yu and
                  Xiangyang Luo and
                  Dong Liu and
                  Yi Zhang},
  title        = {Adaptive feature selection for image steganalysis based on classification
                  metrics},
  journal      = {Inf. Sci.},
  volume       = {644},
  pages        = {118973},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.118973},
  doi          = {10.1016/J.INS.2023.118973},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/MaYLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QiaoLMZL23,
  author       = {Yaqiong Qiao and
                  Xiangyang Luo and
                  Jiangtao Ma and
                  Meng Zhang and
                  Chenliang Li},
  title        = {Twitter user geolocation based on heterogeneous relationship modeling
                  and representation learning},
  journal      = {Inf. Sci.},
  volume       = {647},
  pages        = {119427},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119427},
  doi          = {10.1016/J.INS.2023.119427},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/QiaoLMZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChenLZZG23,
  author       = {Jun Chen and
                  Xiangyang Luo and
                  Liyan Zhu and
                  Qikun Zhang and
                  Yong Gan},
  title        = {Handwritten {CAPTCHA} recognizer: a text {CAPTCHA} breaking method
                  based on style transfer network},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {9},
  pages        = {13025--13043},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-021-11485-9},
  doi          = {10.1007/S11042-021-11485-9},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChenLZZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/LiuLTZD23,
  author       = {Yimin Liu and
                  Xiangyang Luo and
                  Zhiyuan Tao and
                  Meng Zhang and
                  Shaoyong Du},
  title        = {{UGCC:} Social Media User Geolocation via Cyclic Coupling},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {9},
  number       = {4},
  pages        = {1128--1141},
  year         = {2023},
  url          = {https://doi.org/10.1109/TBDATA.2023.3242961},
  doi          = {10.1109/TBDATA.2023.3242961},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/LiuLTZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YangDGCLZR23,
  author       = {Yang Yang and
                  Robert H. Deng and
                  Wenzhong Guo and
                  Hongju Cheng and
                  Xiangyang Luo and
                  Xianghan Zheng and
                  Chunming Rong},
  title        = {Dual Traceable Distributed Attribute-Based Searchable Encryption and
                  Ownership Transfer},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {247--262},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3090519},
  doi          = {10.1109/TCC.2021.3090519},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YangDGCLZR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/MaoLZZL23,
  author       = {Chun Mao and
                  Zhenyu Li and
                  Mingliang Zhang and
                  Yi Zhang and
                  Xiangyang Luo},
  title        = {A Covert Communication Method Adapted to Social Media Based on Time
                  Modulation of Bullet Comments},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {69},
  number       = {3},
  pages        = {568--580},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCE.2023.3277919},
  doi          = {10.1109/TCE.2023.3277919},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/MaoLZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ZhangWWL23,
  author       = {Jiawei Zhang and
                  Jinwei Wang and
                  Hao Wang and
                  Xiangyang Luo},
  title        = {Self-Recoverable Adversarial Examples: {A} New Effective Protection
                  Mechanism in Social Networks},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {33},
  number       = {2},
  pages        = {562--574},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSVT.2022.3207008},
  doi          = {10.1109/TCSVT.2022.3207008},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/ZhangWWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ZhangZWLZZW23,
  author       = {Yulan Zhang and
                  Guopu Zhu and
                  Xing Wang and
                  Xiangyang Luo and
                  Yicong Zhou and
                  Hongli Zhang and
                  Ligang Wu},
  title        = {CNN-Transformer Based Generative Adversarial Network for Copy-Move
                  Source/ Target Distinguishment},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {33},
  number       = {5},
  pages        = {2019--2032},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSVT.2022.3220630},
  doi          = {10.1109/TCSVT.2022.3220630},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/ZhangZWLZZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuLLZ23,
  author       = {Hansong Du and
                  Jiu{-}fen Liu and
                  Xiangyang Luo and
                  Yi Zhang},
  title        = {Extraction Method of Secret Message Based on Optimal Hypothesis Test},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {5265--5277},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3243907},
  doi          = {10.1109/TDSC.2023.3243907},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaCL23,
  author       = {Yuqian Ma and
                  Qingfeng Cheng and
                  Xiangyang Luo},
  title        = {2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless
                  Authentication Scheme for Distributed Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5876--5889},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3318952},
  doi          = {10.1109/TIFS.2023.3318952},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/QiaoWZXL23,
  author       = {Tong Qiao and
                  Jiasheng Wu and
                  Ning Zheng and
                  Ming Xu and
                  Xiangyang Luo},
  title        = {FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {25},
  pages        = {7350--7363},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMM.2022.3221532},
  doi          = {10.1109/TMM.2022.3221532},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/QiaoWZXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/DingLWF23,
  author       = {Shichang Ding and
                  Xiangyang Luo and
                  Jinwei Wang and
                  Xiaoming Fu},
  title        = {GNN-Geo: {A} Graph Neural Network-Based Fine-Grained {IP} Geolocation
                  Framework},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {6},
  pages        = {3543--3560},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2023.3266752},
  doi          = {10.1109/TNSE.2023.3266752},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/DingLWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LiWXZVL23,
  author       = {Hao Li and
                  Jinwei Wang and
                  Neal Xiong and
                  Yi Zhang and
                  Athanasios V. Vasilakos and
                  Xiangyang Luo},
  title        = {A Siamese Inverted Residuals Network Image Steganalysis Scheme based
                  on Deep Learning},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {19},
  number       = {6},
  pages        = {214:1--214:23},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579166},
  doi          = {10.1145/3579166},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/LiWXZVL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangRZCCLL23,
  author       = {Yang Yang and
                  Chunming Rong and
                  Xianghan Zheng and
                  Hongju Cheng and
                  Victor Chang and
                  Xiangyang Luo and
                  Zuoyong Li},
  title        = {Time Controlled Expressive Predicate Query With Accountable Anonymity},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {2},
  pages        = {1444--1457},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2022.3162285},
  doi          = {10.1109/TSC.2022.3162285},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangRZCCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChengCL23,
  author       = {Qingfeng Cheng and
                  Jinzheng Cao and
                  Xiangyang Luo},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Quantum Augmented Lattice Attack on {NTRU} with Side Information},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {317--328},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_18},
  doi          = {10.1007/978-981-97-0945-8\_18},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ChengCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LiLZ23,
  author       = {Hao Li and
                  Xiangyang Luo and
                  Yi Zhang},
  title        = {Improving CoatNet for Spatial and {JPEG} Domain Steganalysis},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023,
                  Brisbane, Australia, July 10-14, 2023},
  pages        = {1241--1246},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICME55011.2023.00216},
  doi          = {10.1109/ICME55011.2023.00216},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/LiLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LiXFLG23,
  author       = {Yi Li and
                  Xin Xie and
                  Haiyan Fu and
                  Xiangyang Luo and
                  Yanqing Guo},
  title        = {A Compact Transformer for Adaptive Style Transfer},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023,
                  Brisbane, Australia, July 10-14, 2023},
  pages        = {2687--2692},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICME55011.2023.00457},
  doi          = {10.1109/ICME55011.2023.00457},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/LiXFLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoQL0C23,
  author       = {Gejian Zhao and
                  Chuan Qin and
                  Xiangyang Luo and
                  Xinpeng Zhang and
                  Chin{-}Chen Chang},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Perceptual Robust Hashing for Video Copy Detection with Unsupervised
                  Learning},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595110},
  doi          = {10.1145/3577163.3595110},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoQL0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/WuWZWML23,
  author       = {Hao Wu and
                  Jinwei Wang and
                  Jiawei Zhang and
                  Yufeng Wu and
                  Bin Ma and
                  Xiangyang Luo},
  title        = {Improving the Transferability of Adversarial Attacks through Experienced
                  Precise Nesterov Momentum},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold
                  Coast, Australia, June 18-23, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IJCNN54540.2023.10191329},
  doi          = {10.1109/IJCNN54540.2023.10191329},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/WuWZWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prcv/WangWWML23,
  author       = {Jinwei Wang and
                  Maoyuan Wang and
                  Hao Wu and
                  Bin Ma and
                  Xiangyang Luo},
  editor       = {Qingshan Liu and
                  Hanzi Wang and
                  Zhanyu Ma and
                  Weishi Zheng and
                  Hongbin Zha and
                  Xilin Chen and
                  Liang Wang and
                  Rongrong Ji},
  title        = {Improving Transferability of Adversarial Attacks with Gaussian Gradient
                  Enhance Momentum},
  booktitle    = {Pattern Recognition and Computer Vision - 6th Chinese Conference,
                  {PRCV} 2023, Xiamen, China, October 13-15, 2023, Proceedings, Part
                  {IX}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14433},
  pages        = {421--432},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8546-3\_34},
  doi          = {10.1007/978-981-99-8546-3\_34},
  timestamp    = {Thu, 11 Jan 2024 22:28:07 +0100},
  biburl       = {https://dblp.org/rec/conf/prcv/WangWWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04502,
  author       = {Jinwei Wang and
                  Hao Wu and
                  Haihua Wang and
                  Jiawei Zhang and
                  Xiangyang Luo and
                  Bin Ma},
  title        = {Immune Defense: {A} Novel Adversarial Defense Mechanism for Preventing
                  the Generation of Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/2303.04502},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.04502},
  doi          = {10.48550/ARXIV.2303.04502},
  eprinttype    = {arXiv},
  eprint       = {2303.04502},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-04502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-04965,
  author       = {Guisheng Liu and
                  Yi Li and
                  Zhengcong Fei and
                  Haiyan Fu and
                  Xiangyang Luo and
                  Yanqing Guo},
  title        = {Prefix-diffusion: {A} Lightweight Diffusion Model for Diverse Image
                  Captioning},
  journal      = {CoRR},
  volume       = {abs/2309.04965},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.04965},
  doi          = {10.48550/ARXIV.2309.04965},
  eprinttype    = {arXiv},
  eprint       = {2309.04965},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-04965.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiLFYL22,
  author       = {Tengyao Li and
                  Kaiyue Liu and
                  Wangxin Feng and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {HeteroTiC: {A} robust network flow watermarking based on heterogeneous
                  time channels},
  journal      = {Comput. Networks},
  volume       = {219},
  pages        = {109424},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109424},
  doi          = {10.1016/J.COMNET.2022.109424},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LiLFYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiuLWL22,
  author       = {Wenyan Liu and
                  Xiangyang Luo and
                  Guo Wei and
                  Huaixing Liu},
  title        = {Node localization algorithm for wireless sensor networks based on
                  static anchor node location selection strategy},
  journal      = {Comput. Commun.},
  volume       = {192},
  pages        = {289--298},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.06.010},
  doi          = {10.1016/J.COMCOM.2022.06.010},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiuLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/LiLZZYL22,
  author       = {Jialin Li and
                  Xiangyang Luo and
                  Yi Zhang and
                  Pei Zhang and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Extracting embedded messages using adaptive steganography based on
                  optimal syndrome-trellis decoding paths},
  journal      = {Digit. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {455--465},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.dcan.2021.09.005},
  doi          = {10.1016/J.DCAN.2021.09.005},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/LiLZZYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZuLZ22,
  author       = {Shuodi Zu and
                  Xiangyang Luo and
                  Fan Zhang},
  title        = {IP-geolocater: a more reliable {IP} geolocation algorithm based on
                  router error training},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {1},
  pages        = {161504},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-021-0427-4},
  doi          = {10.1007/S11704-021-0427-4},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZuLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/CaoLXQ22,
  author       = {Rong Cao and
                  Xiangyang Luo and
                  Yaoyi Xi and
                  Yaqiong Qiao},
  title        = {Stance detection for online public opinion awareness: An overview},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {11944--11965},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23071},
  doi          = {10.1002/INT.23071},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/CaoLXQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiaGLWZ22,
  author       = {Xingxing Jia and
                  Yusheng Guo and
                  Xiangyang Luo and
                  Daoshun Wang and
                  Chaoyang Zhang},
  title        = {A perfect secret sharing scheme for general access structures},
  journal      = {Inf. Sci.},
  volume       = {595},
  pages        = {54--69},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.02.016},
  doi          = {10.1016/J.INS.2022.02.016},
  timestamp    = {Wed, 13 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JiaGLWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuLZTL22,
  author       = {Yimin Liu and
                  Xiangyang Luo and
                  Meng Zhang and
                  Zhiyuan Tao and
                  Fenlin Liu},
  title        = {Who are there: Discover Twitter users and tweets for target area using
                  mention relationship strength and local tweet ratio},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {199},
  pages        = {103302},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2021.103302},
  doi          = {10.1016/J.JNCA.2021.103302},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuLZTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WuLLG22,
  author       = {Fan Wu and
                  Xiong Li and
                  Xiangyang Luo and
                  Ke Gu},
  title        = {A novel authentication scheme for edge computing-enabled Internet
                  of Vehicles providing anonymity and identity tracing with drone-assistance},
  journal      = {J. Syst. Archit.},
  volume       = {132},
  pages        = {102737},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102737},
  doi          = {10.1016/J.SYSARC.2022.102737},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/WuLLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/QiaoLYS22,
  author       = {Tong Qiao and
                  Xiangyang Luo and
                  Hongwei Yao and
                  Ran Shi},
  title        = {Classifying between computer generated and natural images: An empirical
                  study from {RAW} to {JPEG} format},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {85},
  pages        = {103506},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jvcir.2022.103506},
  doi          = {10.1016/J.JVCIR.2022.103506},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/QiaoLYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/ChenWLLH22,
  author       = {Jian Chen and
                  Hao{-}Tian Wu and
                  Lu Lu and
                  Xiangyang Luo and
                  Jiankun Hu},
  title        = {Single underwater image haze removal with a learning-based approach
                  to blurriness estimation},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {89},
  pages        = {103656},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jvcir.2022.103656},
  doi          = {10.1016/J.JVCIR.2022.103656},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/ChenWLLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/WuWZLM22,
  author       = {Junfeng Wu and
                  Jinwei Wang and
                  Junjie Zhao and
                  Xiangyang Luo and
                  Bin Ma},
  title        = {{ESGAN} for generating high quality enhanced samples},
  journal      = {Multim. Syst.},
  volume       = {28},
  number       = {5},
  pages        = {1809--1822},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00530-022-00953-3},
  doi          = {10.1007/S00530-022-00953-3},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mms/WuWZLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/DuLTL22,
  author       = {Hansong Du and
                  Jiu{-}fen Liu and
                  Yu{-}guo Tian and
                  Xiangyang Luo},
  title        = {Steganographic key recovery for adaptive steganography under "known-message
                  attacks"},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {8},
  pages        = {10981--11004},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12109-6},
  doi          = {10.1007/S11042-022-12109-6},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/DuLTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangZMLYLJ22,
  author       = {Jinwei Wang and
                  Kehui Zeng and
                  Bin Ma and
                  Xiangyang Luo and
                  Qilin Yin and
                  Guangjie Liu and
                  Sunil Kr. Jha},
  title        = {GAN-generated fake face detection via two-stream {CNN} with {PRNU}
                  in the wild},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {29},
  pages        = {42527--42545},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-11592-7},
  doi          = {10.1007/S11042-021-11592-7},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/WangZMLYLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunLWM22,
  author       = {Yuchen Sun and
                  Xiangyang Luo and
                  Han Wang and
                  Zhaorui Ma},
  title        = {A Method for Identifying Tor Users Visiting Websites Based on Frequency
                  Domain Fingerprinting of Network Traffic},
  journal      = {Secur. Commun. Networks},
  volume       = {2022},
  pages        = {3306098:1--3306098:12},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/3306098},
  doi          = {10.1155/2022/3306098},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SunLWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/WuQCXZL22,
  author       = {Xiaoshuai Wu and
                  Tong Qiao and
                  Yanli Chen and
                  Ming Xu and
                  Ning Zheng and
                  Xiangyang Luo},
  title        = {Sign steganography revisited with robust domain selection},
  journal      = {Signal Process.},
  volume       = {196},
  pages        = {108522},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sigpro.2022.108522},
  doi          = {10.1016/J.SIGPRO.2022.108522},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/WuQCXZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/YinWLL22,
  author       = {Qilin Yin and
                  Jinwei Wang and
                  Wei Lu and
                  Xiangyang Luo},
  title        = {Contrastive Learning based Multi-task Network for Image Manipulation
                  Detection},
  journal      = {Signal Process.},
  volume       = {201},
  pages        = {108709},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sigpro.2022.108709},
  doi          = {10.1016/J.SIGPRO.2022.108709},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/YinWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZhangLZZL22,
  author       = {Mingliang Zhang and
                  Zhenyu Li and
                  Pei Zhang and
                  Yi Zhang and
                  Xiangyang Luo},
  title        = {A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp
                  Modulation and Carrier Selection Based on Social Networks},
  journal      = {Symmetry},
  volume       = {14},
  number       = {1},
  pages        = {111},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14010111},
  doi          = {10.3390/SYM14010111},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZhangLZZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XuLDZLL22,
  author       = {Shengmin Xu and
                  Yingjiu Li and
                  Robert H. Deng and
                  Yinghui Zhang and
                  Xiangyang Luo and
                  Ximeng Liu},
  title        = {Lightweight and Expressive Fine-Grained Access Control for Healthcare
                  Internet-of-Things},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {1},
  pages        = {474--490},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2019.2936481},
  doi          = {10.1109/TCC.2019.2936481},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/XuLDZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ZhuLZYL22,
  author       = {Liyan Zhu and
                  Xiangyang Luo and
                  Yi Zhang and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Inverse Interpolation and Its Application in Robust Image Steganography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {6},
  pages        = {4052--4064},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3107342},
  doi          = {10.1109/TCSVT.2021.3107342},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ZhuLZYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/WangWLZMSJ22,
  author       = {Hao Wang and
                  Jinwei Wang and
                  Xiangyang Luo and
                  Yuhui Zheng and
                  Bin Ma and
                  Jinsheng Sun and
                  Sunil Kr. Jha},
  title        = {Detecting Aligned Double {JPEG} Compressed Color Image With Same Quantization
                  Matrix Based on the Stability of Image},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {6},
  pages        = {4065--4080},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3111195},
  doi          = {10.1109/TCSVT.2021.3111195},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/WangWLZMSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ChangZZZLW22,
  author       = {Jie Chang and
                  Guopu Zhu and
                  Hongli Zhang and
                  Yicong Zhou and
                  Xiangyang Luo and
                  Ligang Wu},
  title        = {Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error
                  Expansion and Double Deep Q-Network},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {8},
  pages        = {5055--5067},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2022.3146517},
  doi          = {10.1109/TCSVT.2022.3146517},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/ChangZZZLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/WuLLZZ22,
  author       = {Haorui Wu and
                  Xiaolong Li and
                  Xiangyang Luo and
                  Xinpeng Zhang and
                  Yao Zhao},
  title        = {General Expansion-Shifting Model for Reversible Data Hiding: Theoretical
                  Investigation and Practical Algorithm Design},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {9},
  pages        = {5989--6001},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2022.3166207},
  doi          = {10.1109/TCSVT.2022.3166207},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/WuLLZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LuoZZLC22,
  author       = {Xiangyang Luo and
                  Pei Zhang and
                  Mingliang Zhang and
                  Hao Li and
                  Qingfeng Cheng},
  title        = {A Novel Covert Communication Method Based on Bitcoin Transaction},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {4},
  pages        = {2830--2839},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3100480},
  doi          = {10.1109/TII.2021.3100480},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/LuoZZLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/WangZYLZSJ22,
  author       = {Jinwei Wang and
                  Junjie Zhao and
                  Qilin Yin and
                  Xiangyang Luo and
                  Yuhui Zheng and
                  Yun{-}Qing Shi and
                  Sunil Kr. Jha},
  title        = {SmsNet: {A} New Deep Convolutional Neural Network Model for Adversarial
                  Example Detection},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {24},
  pages        = {230--244},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMM.2021.3050057},
  doi          = {10.1109/TMM.2021.3050057},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/WangZYLZSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhangCZL22,
  author       = {Pei Zhang and
                  Qingfeng Cheng and
                  Mingliang Zhang and
                  Xiangyang Luo},
  title        = {A Group Covert Communication Method of Digital Currency Based on Blockchain
                  Technology},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {6},
  pages        = {4266--4276},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2022.3196816},
  doi          = {10.1109/TNSE.2022.3196816},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhangCZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LiuZ0LKL22,
  author       = {Zuquan Liu and
                  Guopu Zhu and
                  Feng Ding and
                  Xiangyang Luo and
                  Sam Kwong and
                  Peng Li},
  title        = {Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {18},
  number       = {3s},
  pages        = {148:1--148:16},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508394},
  doi          = {10.1145/3508394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/LiuZ0LKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/WeiLDYL22,
  author       = {Guo Wei and
                  Xiangyang Luo and
                  Shichang Ding and
                  Baoshan Yang and
                  Wenyan Liu},
  title        = {{DR-NET:} a novel mobile anchor-assisted localization method based
                  on the density of nodes distribution},
  journal      = {Wirel. Networks},
  volume       = {28},
  number       = {8},
  pages        = {3431--3451},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11276-022-03056-z},
  doi          = {10.1007/S11276-022-03056-Z},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/WeiLDYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuLLL22,
  author       = {Shaoyong Du and
                  Xin Liu and
                  Guoqing Lai and
                  Xiangyang Luo},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Watch Out for Race Condition Attacks When Using Android External Storage},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {891--904},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560666},
  doi          = {10.1145/3548606.3560666},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coling/LiuLGLW22,
  author       = {Guisheng Liu and
                  Yi Li and
                  Yanqing Guo and
                  Xiangyang Luo and
                  Bo Wang},
  editor       = {Nicoletta Calzolari and
                  Chu{-}Ren Huang and
                  Hansaem Kim and
                  James Pustejovsky and
                  Leo Wanner and
                  Key{-}Sun Choi and
                  Pum{-}Mo Ryu and
                  Hsin{-}Hsi Chen and
                  Lucia Donatelli and
                  Heng Ji and
                  Sadao Kurohashi and
                  Patrizia Paggio and
                  Nianwen Xue and
                  Seokhwan Kim and
                  Younggyun Hahm and
                  Zhong He and
                  Tony Kyungil Lee and
                  Enrico Santus and
                  Francis Bond and
                  Seung{-}Hoon Na},
  title        = {Multi-Attribute Controlled Text Generation with Contrastive-Generator
                  and External-Discriminator},
  booktitle    = {Proceedings of the 29th International Conference on Computational
                  Linguistics, {COLING} 2022, Gyeongju, Republic of Korea, October 12-17,
                  2022},
  pages        = {5904--5913},
  publisher    = {International Committee on Computational Linguistics},
  year         = {2022},
  url          = {https://aclanthology.org/2022.coling-1.516},
  timestamp    = {Fri, 14 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coling/LiuLGLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbds/ZhouLDSG22,
  author       = {Pei Zhou and
                  Xiangyang Luo and
                  Shaoyong Du and
                  Wenqi Shi and
                  Jiashan Guo},
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Qingshan Jiang and
                  Qi Liu and
                  Muhammad Khurram Khan},
  title        = {A Cross-Platform Instant Messaging User Association Method Based on
                  Supervised Learning},
  booktitle    = {Big Data and Security - 4th International Conference, {ICBDS} 2022,
                  Xiamen, China, December 8-12, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1796},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-99-3300-6\_6},
  doi          = {10.1007/978-981-99-3300-6\_6},
  timestamp    = {Wed, 13 Sep 2023 16:02:27 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/ZhouLDSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangLDLYL22,
  author       = {Xiuting Wang and
                  Xiangyang Luo and
                  Shaoyong Du and
                  Lingling Li and
                  Yang Yang and
                  Fenlin Liu},
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {A Rapid Device Type Identification Method Based on Feature Reduction
                  and Dynamical Feature Weights Assignment},
  booktitle    = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13340},
  pages        = {663--677},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06791-4\_52},
  doi          = {10.1007/978-3-031-06791-4\_52},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangLDLYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WuWZLM22,
  author       = {Hao Wu and
                  Jinwei Wang and
                  Jiawei Zhang and
                  Xiangyang Luo and
                  Bin Ma},
  editor       = {Xianfeng Zhao and
                  Zhenjun Tang and
                  Pedro Comesa{\~{n}}a Alfaro and
                  Alessandro Piva},
  title        = {Improving the Transferability of Adversarial Attacks Through Both
                  Front and Rear Vector Method},
  booktitle    = {Digital Forensics and Watermarking - 21st International Workshop,
                  {IWDW} 2022, Guilin, China, November 18-19, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13825},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25115-3\_6},
  doi          = {10.1007/978-3-031-25115-3\_6},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WuWZLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-12050,
  author       = {Jiawei Zhang and
                  Jinwei Wang and
                  Hao Wang and
                  Xiangyang Luo},
  title        = {Self-recoverable Adversarial Examples: {A} New Effective Protection
                  Mechanism in Social Networks},
  journal      = {CoRR},
  volume       = {abs/2204.12050},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.12050},
  doi          = {10.48550/ARXIV.2204.12050},
  eprinttype    = {arXiv},
  eprint       = {2204.12050},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-12050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-02822,
  author       = {Qingliang Liu and
                  Jiangqun Ni and
                  Weizhe Zhang and
                  Xiangyang Luo and
                  Jiwu Huang},
  title        = {A Robust Image Steganographic Scheme against General Scaling Attacks},
  journal      = {CoRR},
  volume       = {abs/2212.02822},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.02822},
  doi          = {10.48550/ARXIV.2212.02822},
  eprinttype    = {arXiv},
  eprint       = {2212.02822},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-02822.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/CaoSLQC21,
  author       = {Fang Cao and
                  Jiayi Sun and
                  Xiangyang Luo and
                  Chuan Qin and
                  Ching{-}Chun Chang},
  title        = {Privacy-preserving inpainting for outsourced image},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {17},
  number       = {11},
  pages        = {155014772110590},
  year         = {2021},
  url          = {https://doi.org/10.1177/15501477211059092},
  doi          = {10.1177/15501477211059092},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/CaoSLQC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/LiuZLLZ21,
  author       = {Jiarui Liu and
                  Kaiman Zhu and
                  Wei Lu and
                  Xiangyang Luo and
                  Xianfeng Zhao},
  title        = {A lightweight 3D convolutional neural network for deepfake detection},
  journal      = {Int. J. Intell. Syst.},
  volume       = {36},
  number       = {9},
  pages        = {4990--5004},
  year         = {2021},
  url          = {https://doi.org/10.1002/int.22499},
  doi          = {10.1002/INT.22499},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/LiuZLLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/GuoXSZL21,
  author       = {Jiadong Guo and
                  Rui Xu and
                  Wenqi Shi and
                  Pei Zhou and
                  Xiangyang Luo},
  title        = {Instant messaging user geolocating method based on multi-source information
                  association},
  journal      = {Int. J. Sens. Networks},
  volume       = {35},
  number       = {2},
  pages        = {99--110},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSNET.2021.113629},
  doi          = {10.1504/IJSNET.2021.113629},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/GuoXSZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangLWGL21,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Jinwei Wang and
                  Yanqing Guo and
                  Fenlin Liu},
  title        = {Image robust adaptive steganography adapted to lossy channels in open
                  social networks},
  journal      = {Inf. Sci.},
  volume       = {564},
  pages        = {306--326},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.02.058},
  doi          = {10.1016/J.INS.2021.02.058},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangLWGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/TaoLLL21,
  author       = {Zhiyuan Tao and
                  Fenlin Liu and
                  Yan Liu and
                  Xiangyang Luo},
  title        = {A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional
                  Approaching},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {15},
  number       = {8},
  pages        = {2764--2782},
  year         = {2021},
  url          = {https://doi.org/10.3837/tiis.2021.08.004},
  doi          = {10.3837/TIIS.2021.08.004},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/TaoLLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DuLTL21,
  author       = {Hansong Du and
                  Jiu{-}fen Liu and
                  Yu{-}guo Tian and
                  Xiangyang Luo},
  title        = {Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis
                  Codes},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5495941:1--5495941:16},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5495941},
  doi          = {10.1155/2021/5495941},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DuLTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DingZL21,
  author       = {Shichang Ding and
                  Fan Zhao and
                  Xiangyang Luo},
  title        = {A Street-Level {IP} Geolocation Method Based on Delay-Distance Correlation
                  and Multilayered Common Routers},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6658642:1--6658642:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6658642},
  doi          = {10.1155/2021/6658642},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DingZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SiZQLCN21,
  author       = {Nianwen Si and
                  Wenlin Zhang and
                  Dan Qu and
                  Xiangyang Luo and
                  Heyu Chang and
                  Tong Niu},
  title        = {Spatial-Channel Attention-Based Class Activation Mapping for Interpreting
                  CNN-Based Image Classification Models},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6682293:1--6682293:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6682293},
  doi          = {10.1155/2021/6682293},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SiZQLCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuWLZYL21,
  author       = {Liyan Zhu and
                  Jinwei Wang and
                  Xiangyang Luo and
                  Yi Zhang and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {{PRUDA:} {A} Novel Measurement Attribute Set towards Robust Steganography
                  in Social Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9864833:1--9864833:15},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9864833},
  doi          = {10.1155/2021/9864833},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuWLZYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ZhuLYZL21,
  author       = {Liyan Zhu and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Yi Zhang and
                  Fenlin Liu},
  title        = {Invariances of JPEG-quantized {DCT} coefficients and their application
                  in robust image steganography},
  journal      = {Signal Process.},
  volume       = {183},
  pages        = {108015},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2021.108015},
  doi          = {10.1016/J.SIGPRO.2021.108015},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/ZhuLYZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/QiaoWLZ21,
  author       = {Tong Qiao and
                  Shuai Wang and
                  Xiangyang Luo and
                  Zhiqiang Zhu},
  title        = {Robust steganography resisting {JPEG} compression by improving selection
                  of cover element},
  journal      = {Signal Process.},
  volume       = {183},
  pages        = {108048},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2021.108048},
  doi          = {10.1016/J.SIGPRO.2021.108048},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/QiaoWLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/GuoJZWL21,
  author       = {Yanqing Guo and
                  Caijuan Ji and
                  Xin Zheng and
                  Qianyu Wang and
                  Xiangyang Luo},
  title        = {Multi-scale Multi-attention Network for Moir{\'{e}} Document
                  Image Binarization},
  journal      = {Signal Process. Image Commun.},
  volume       = {90},
  pages        = {116046},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.image.2020.116046},
  doi          = {10.1016/J.IMAGE.2020.116046},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/GuoJZWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ShiLGLL21,
  author       = {Wenqi Shi and
                  Xiangyang Luo and
                  Jiadong Guo and
                  Chong Liu and
                  Fenlin Liu},
  title        = {Where Are WeChat Users: {A} Geolocation Method Based on User Missequence
                  State Analysis},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {8},
  number       = {2},
  pages        = {319--331},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSS.2021.3049120},
  doi          = {10.1109/TCSS.2021.3049120},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ShiLGLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoHWJSLH21,
  author       = {Lingchen Zhao and
                  Shengshan Hu and
                  Qian Wang and
                  Jianlin Jiang and
                  Chao Shen and
                  Xiangyang Luo and
                  Pengfei Hu},
  title        = {Shielding Collaborative Learning: Mitigating Poisoning Attacks Through
                  Client-Side Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2029--2041},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.2986205},
  doi          = {10.1109/TDSC.2020.2986205},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoHWJSLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QiaoLWXQ21,
  author       = {Tong Qiao and
                  Xiangyang Luo and
                  Ting Wu and
                  Ming Xu and
                  Zhenxing Qian},
  title        = {Adaptive Steganalysis Based on Statistical Model of Quantized {DCT}
                  Coefficients for {JPEG} Images},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2736--2751},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2962672},
  doi          = {10.1109/TDSC.2019.2962672},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/QiaoLWXQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiot/LiXML21,
  author       = {Ruixiang Li and
                  Rui Xu and
                  Yuanyuan Ma and
                  Xiangyang Luo},
  title        = {LandmarkMiner: Street-level Network Landmarks Mining Method for {IP}
                  Geolocation},
  journal      = {{ACM} Trans. Internet Things},
  volume       = {2},
  number       = {3},
  pages        = {21:1--21:22},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457409},
  doi          = {10.1145/3457409},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tiot/LiXML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/WangHLSJ21,
  author       = {Jinwei Wang and
                  Wei Huang and
                  Xiangyang Luo and
                  Yun Qing Shi and
                  Sunil Kr. Jha},
  title        = {Detecting Non-Aligned Double {JPEG} Compression Based on Amplitude-Angle
                  Feature},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {17},
  number       = {4},
  pages        = {138:1--138:18},
  year         = {2021},
  url          = {https://doi.org/10.1145/3464388},
  doi          = {10.1145/3464388},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomccap/WangHLSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/ZhangWLMX21,
  author       = {Jiawei Zhang and
                  Jinwei Wang and
                  Xiangyang Luo and
                  Bin Ma and
                  Naixue Xiong},
  editor       = {Chunjie Cao and
                  Yuqing Zhang and
                  Yuan Hong and
                  Ding Wang},
  title        = {Imperceptible and Reliable Adversarial Attack},
  booktitle    = {Frontiers in Cyber Security - 4th International Conference, {FCS}
                  2021, Haikou, China, December 17-19, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1558},
  pages        = {49--62},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0523-0\_4},
  doi          = {10.1007/978-981-19-0523-0\_4},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/ZhangWLMX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuLL21,
  author       = {Yimin Liu and
                  Xiangyang Luo and
                  Han Li},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Microblog User Location Inference Based on {POI} and Query Likelihood
                  Model},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12918},
  pages        = {464--480},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86890-1\_26},
  doi          = {10.1007/978-3-030-86890-1\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiuLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuWZL21,
  author       = {Junfeng Wu and
                  Jinwei Wang and
                  Junjie Zhao and
                  Xiangyang Luo},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  Guilin Wang and
                  Jian Shen and
                  Mark Ryan and
                  Weizhi Meng and
                  Ding Wang},
  title        = {StrGAN for Generating Enhanced Samples},
  booktitle    = {Information Security Practice and Experience: 16th International Conference,
                  {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13107},
  pages        = {363--373},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93206-0\_22},
  doi          = {10.1007/978-3-030-93206-0\_22},
  timestamp    = {Wed, 08 Mar 2023 16:36:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WuWZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangWLYMS21,
  author       = {Hao Wang and
                  Jinwei Wang and
                  Xiangyang Luo and
                  Qilin Yin and
                  Bin Ma and
                  Jinsheng Sun},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro Comesa{\~{n}}a Alfaro},
  title        = {Modify the Quantization Table in the {JPEG} Header File for Forensics
                  and Anti-forensics},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_6},
  doi          = {10.1007/978-3-030-95398-0\_6},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangWLYMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prcv/LuoZL21,
  author       = {Xiangyang Luo and
                  Chao Zhang and
                  Zhao Lv},
  editor       = {Huimin Ma and
                  Liang Wang and
                  Changshui Zhang and
                  Fei Wu and
                  Tieniu Tan and
                  Yaonan Wang and
                  Jianhuang Lai and
                  Yao Zhao},
  title        = {Research of Robust Video Object Tracking Algorithm Based on Jetson
                  Nano Embedded Platform},
  booktitle    = {Pattern Recognition and Computer Vision - 4th Chinese Conference,
                  {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13019},
  pages        = {392--403},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88004-0\_32},
  doi          = {10.1007/978-3-030-88004-0\_32},
  timestamp    = {Mon, 20 Nov 2023 17:42:11 +0100},
  biburl       = {https://dblp.org/rec/conf/prcv/LuoZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/LiGTLLB21,
  author       = {Zhenyu Li and
                  Daofu Gong and
                  Lei Tan and
                  Xiangyang Luo and
                  Fenlin Liu and
                  Adrian G. Bors},
  title        = {Self-embedding watermarking method for G-code used in 3D printing},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2021, Montpellier, France, December 7-10, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WIFS53200.2021.9648386},
  doi          = {10.1109/WIFS53200.2021.9648386},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/LiGTLLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10767,
  author       = {Shichang Ding and
                  Xiangyang Luo and
                  Jinwei Wang and
                  Neal Naixue Xiong},
  title        = {GCN-Geo: {A} Graph Convolution Network-based Fine-grained {IP} Geolocation
                  System},
  journal      = {CoRR},
  volume       = {abs/2112.10767},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10767},
  eprinttype    = {arXiv},
  eprint       = {2112.10767},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/ZhangLL20,
  author       = {Fan Zhang and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Geolocation of covert communication entity on the Internet for post-steganalysis},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2020},
  number       = {1},
  pages        = {15},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13640-020-00504-8},
  doi          = {10.1186/S13640-020-00504-8},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejivp/ZhangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangLWSYL20,
  author       = {Zhiqian Zhang and
                  Chenliang Li and
                  Zhiyong Wu and
                  Aixin Sun and
                  Dengpan Ye and
                  Xiangyang Luo},
  title        = {{NEXT:} a neural network framework for next {POI} recommendation},
  journal      = {Frontiers Comput. Sci.},
  volume       = {14},
  number       = {2},
  pages        = {314--333},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11704-018-8011-2},
  doi          = {10.1007/S11704-018-8011-2},
  timestamp    = {Mon, 17 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangLWSYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiWL20,
  author       = {Yan Li and
                  Junwei Wang and
                  Xiangyang Luo},
  title        = {A reversible database watermarking method non-redundancy shifting-based
                  histogram gaps},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720921769},
  doi          = {10.1177/1550147720921769},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/YangKLSWL20,
  author       = {Chunfang Yang and
                  Yuhan Kang and
                  Fenlin Liu and
                  Xiaofeng Song and
                  Jie Wang and
                  Xiangyang Luo},
  title        = {Color image steganalysis based on embedding change probabilities in
                  differential channels},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720917826},
  doi          = {10.1177/1550147720917826},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/YangKLSWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/QiaoLLTM20,
  author       = {Yaqiong Qiao and
                  Xiangyang Luo and
                  Chenliang Li and
                  Hechan Tian and
                  Jiangtao Ma},
  title        = {Heterogeneous graph-based joint representation learning for users
                  and POIs in location-based social network},
  journal      = {Inf. Process. Manag.},
  volume       = {57},
  number       = {2},
  pages        = {102151},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ipm.2019.102151},
  doi          = {10.1016/J.IPM.2019.102151},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/QiaoLLTM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/LuoQLML20,
  author       = {Xiangyang Luo and
                  Yaqiong Qiao and
                  Chenliang Li and
                  Jiangtao Ma and
                  Yimin Liu},
  title        = {An overview of microblog user geolocation methods},
  journal      = {Inf. Process. Manag.},
  volume       = {57},
  number       = {6},
  pages        = {102375},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ipm.2020.102375},
  doi          = {10.1016/J.IPM.2020.102375},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/LuoQLML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangNLLJ20,
  author       = {Jinwei Wang and
                  Qiye Ni and
                  Guangjie Liu and
                  Xiangyang Luo and
                  Sunil Kr. Jha},
  title        = {Image splicing detection based on convolutional neural network with
                  weight combination strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102523},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102523},
  doi          = {10.1016/J.JISA.2020.102523},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangNLLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/TianLLZQ20,
  author       = {Hechan Tian and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Fan Zhang and
                  Yaqiong Qiao},
  title        = {Microblog User Geolocation by Extracting Local Words Based on Word
                  Clustering and Wrapper Feature Selection},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {14},
  number       = {10},
  pages        = {3972--3988},
  year         = {2020},
  url          = {https://doi.org/10.3837/tiis.2020.10.003},
  doi          = {10.3837/TIIS.2020.10.003},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/TianLLZQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/BaoGLZXL20,
  author       = {Zhenkun Bao and
                  Yanqing Guo and
                  Xiaolong Li and
                  Yi Zhang and
                  Meng Xu and
                  Xiangyang Luo},
  title        = {A robust image steganography based on the concatenated error correction
                  encoder and discrete cosine transform coefficients},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {1889--1901},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12652-019-01345-8},
  doi          = {10.1007/S12652-019-01345-8},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/BaoGLZXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/BaoGLZXL20a,
  author       = {Zhenkun Bao and
                  Yanqing Guo and
                  Xiaolong Li and
                  Yi Zhang and
                  Meng Xu and
                  Xiangyang Luo},
  title        = {Correction to: {A} robust image steganography based on the concatenated
                  error correction encoder and discrete cosine transform coefficients},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {11},
  number       = {5},
  pages        = {1903},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12652-019-01376-1},
  doi          = {10.1007/S12652-019-01376-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/BaoGLZXL20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/WangHLSJ20,
  author       = {Jinwei Wang and
                  Wei Huang and
                  Xiangyang Luo and
                  Yun{-}Qing Shi and
                  Sunil Kr. Jha},
  title        = {Non-aligned double {JPEG} compression detection based on refined Markov
                  features in {QDCT} domain},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {1},
  pages        = {7--16},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-019-00929-z},
  doi          = {10.1007/S11554-019-00929-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/WangHLSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/ZhangLZLB20,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Xiaodong Zhu and
                  Zhenyu Li and
                  Adrian G. Bors},
  title        = {Enhancing reliability and efficiency for real-time robust adaptive
                  steganography using cyclic redundancy check codes},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {1},
  pages        = {115--123},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-019-00905-7},
  doi          = {10.1007/S11554-019-00905-7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrtip/ZhangLZLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/QiYTLL20,
  author       = {Baojun Qi and
                  Chunfang Yang and
                  Lei Tan and
                  Xiangyang Luo and
                  Fenlin Liu},
  title        = {A novel haze image steganography method via cover-source switching},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {70},
  pages        = {102814},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jvcir.2020.102814},
  doi          = {10.1016/J.JVCIR.2020.102814},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/QiYTLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiYJLNL20,
  author       = {Shiyu Li and
                  Dengpan Ye and
                  Shunzhi Jiang and
                  Changrui Liu and
                  Xiaoguang Niu and
                  Xiangyang Luo},
  title        = {Anti-steganalysis for image on convolutional neural networks},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {7-8},
  pages        = {4315--4331},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-018-7046-6},
  doi          = {10.1007/S11042-018-7046-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiYJLNL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/TanYLLQL20,
  author       = {Lei Tan and
                  Chunfang Yang and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Baojun Qi and
                  Zhenyu Li},
  title        = {Steganalysis of homogeneous-representation based steganography for
                  high dynamic range images},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {27-28},
  pages        = {20079--20105},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08257-x},
  doi          = {10.1007/S11042-019-08257-X},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/TanYLLQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YinYLL20,
  author       = {Meijuan Yin and
                  Wen Yang and
                  Xiaonan Liu and
                  Xiangyang Luo},
  title        = {Evaluator: {A} Multilevel Decision Approach for Web-Based Landmark
                  Evaluation},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8843188:1--8843188:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8843188},
  doi          = {10.1155/2020/8843188},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YinYLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/WangWLLSJ20,
  author       = {Jinwei Wang and
                  Hao Wang and
                  Jian Li and
                  Xiangyang Luo and
                  Yun{-}Qing Shi and
                  Sunil Kr. Jha},
  title        = {Detecting Double {JPEG} Compressed Color Images With the Same Quantization
                  Matrix in Spherical Coordinates},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {8},
  pages        = {2736--2749},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2922309},
  doi          = {10.1109/TCSVT.2019.2922309},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/WangWLLSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ZhangLGQL20,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Yanqing Guo and
                  Chuan Qin and
                  Fenlin Liu},
  title        = {Multiple Robustness Enhancements for Image Adaptive Steganography
                  in Lossy Channels},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {8},
  pages        = {2750--2764},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2923980},
  doi          = {10.1109/TCSVT.2019.2923980},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ZhangLGQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WuCLLLL20,
  author       = {Shuangke Wu and
                  Yanjiao Chen and
                  Minghui Li and
                  Xiangyang Luo and
                  Zhe Liu and
                  Lan Liu},
  title        = {Survive and Thrive: {A} Stochastic Game for DDoS Attacks in Bitcoin
                  Mining Pools},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {2},
  pages        = {874--887},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2020.2973410},
  doi          = {10.1109/TNET.2020.2973410},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/WuCLLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YuanLXLL20,
  author       = {Fuxiang Yuan and
                  Fenlin Liu and
                  Rui Xu and
                  Yan Liu and
                  Xiangyang Luo},
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {Network Topology Boundary Routing {IP} Identification for {IP} Geolocation},
  booktitle    = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12240},
  pages        = {534--544},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57881-7\_47},
  doi          = {10.1007/978-3-030-57881-7\_47},
  timestamp    = {Mon, 07 Sep 2020 19:48:42 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YuanLXLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuLYL20,
  author       = {Chong Liu and
                  Xiangyang Luo and
                  Fuxiang Yuan and
                  Fenlin Liu},
  title        = {{RNBG:} {A} Ranking Nodes Based {IP} Geolocation Method},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops
                  2020, Toronto, ON, Canada, July 6-9, 2020},
  pages        = {80--84},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162976},
  doi          = {10.1109/INFOCOMWKSHPS50562.2020.9162976},
  timestamp    = {Tue, 18 Aug 2020 11:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuLYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YinWL20,
  author       = {Qilin Yin and
                  Jinwei Wang and
                  Xiangyang Luo},
  editor       = {Xianfeng Zhao and
                  Yun{-}Qing Shi and
                  Alessandro Piva and
                  Hyoung Joong Kim},
  title        = {A Hybrid Loss Network for Localization of Image Manipulation},
  booktitle    = {Digital Forensics and Watermarking - 19th International Workshop,
                  {IWDW} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12617},
  pages        = {237--247},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69449-4\_18},
  doi          = {10.1007/978-3-030-69449-4\_18},
  timestamp    = {Fri, 12 Feb 2021 13:59:58 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/YinWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spde/LiLZZYL20,
  author       = {Jialin Li and
                  Xiangyang Luo and
                  Yi Zhang and
                  Pei Zhang and
                  Chunfang Yang and
                  Fenlin Liu},
  editor       = {Shui Yu and
                  Peter Mueller and
                  Jiangbo Qian},
  title        = {Steganalysis of Adaptive Steganography Under the Known Cover Image},
  booktitle    = {Security and Privacy in Digital Economy - First International Conference,
                  {SPDE} 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1268},
  pages        = {560--574},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9129-7\_39},
  doi          = {10.1007/978-981-15-9129-7\_39},
  timestamp    = {Sun, 12 Nov 2023 02:16:41 +0100},
  biburl       = {https://dblp.org/rec/conf/spde/LiLZZYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/TianZLLQ20,
  author       = {Hechan Tian and
                  Meng Zhang and
                  Xiangyang Luo and
                  Fenlin Liu and
                  Yaqiong Qiao},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Twitter User Location Inference Based on Representation Learning and
                  Label Propagation},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {2648--2654},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380019},
  doi          = {10.1145/3366423.3380019},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/TianZLLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YinWLZJS19,
  author       = {Qilin Yin and
                  Jinwei Wang and
                  Xiangyang Luo and
                  Jiangtao Zhai and
                  Sunil Kr. Jha and
                  Yun{-}Qing Shi},
  title        = {Quaternion Convolutional Neural Network for Color Image Classification
                  and Forensics},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {20293--20301},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2897000},
  doi          = {10.1109/ACCESS.2019.2897000},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YinWLZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenLLWM19,
  author       = {Jun Chen and
                  Xiangyang Luo and
                  Yingying Liu and
                  Jinwei Wang and
                  Yuanyuan Ma},
  title        = {Selective Learning Confusion Class for Text-Based {CAPTCHA} Recognition},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {22246--22259},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2899044},
  doi          = {10.1109/ACCESS.2019.2899044},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChenLLWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLGQL19,
  author       = {Yue Zhang and
                  Xiangyang Luo and
                  Yanqing Guo and
                  Chuan Qin and
                  Fenlin Liu},
  title        = {Zernike Moment-Based Spatial Image Steganography Resisting Scaling
                  Attack and Statistic Detection},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {24282--24289},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2900286},
  doi          = {10.1109/ACCESS.2019.2900286},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangLGQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuanLHLL19,
  author       = {Fuxiang Yuan and
                  Fenlin Liu and
                  Donghua Huang and
                  Yan Liu and
                  Xiangyang Luo},
  title        = {A High Completeness PoP Partition Algorithm for {IP} Geolocation},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {28340--28355},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2902337},
  doi          = {10.1109/ACCESS.2019.2902337},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YuanLHLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhaoXLZL19,
  author       = {Fan Zhao and
                  Rui Xu and
                  Ruixiang Li and
                  Ma Zhu and
                  Xiangyang Luo},
  title        = {Street-Level Geolocation Based on Router Multilevel Partitioning},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {59237--59248},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2914972},
  doi          = {10.1109/ACCESS.2019.2914972},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhaoXLZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangYGCLJ19,
  author       = {Qikun Zhang and
                  Yongjiao Li and
                  Yong Gan and
                  Zheng Chuanyang and
                  Xiangyang Luo and
                  Jun Zheng},
  title        = {Group Key Agreement Protocol Based on Privacy Protection and Attribute
                  Authentication},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {87085--87096},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2926404},
  doi          = {10.1109/ACCESS.2019.2926404},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangYGCLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangWZL19a,
  author       = {Hao Wang and
                  Jinwei Wang and
                  Jiangtao Zhai and
                  Xiangyang Luo},
  title        = {Detection of Triple {JPEG} Compressed Color Images},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {113094--113102},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2934160},
  doi          = {10.1109/ACCESS.2019.2934160},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangWZL19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangHLCWLC19,
  author       = {Yang Yang and
                  Xindi Huang and
                  Ximeng Liu and
                  Hongju Cheng and
                  Jian Weng and
                  Xiangyang Luo and
                  Victor Chang},
  title        = {A Comprehensive Survey on Secure Outsourced Computation and Its Applications},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {159426--159465},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2949782},
  doi          = {10.1109/ACCESS.2019.2949782},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YangHLCWLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhaoSGPL19,
  author       = {Fan Zhao and
                  Wenqi Shi and
                  Yong Gan and
                  Ziru Peng and
                  Xiangyang Luo},
  title        = {A localization and tracking scheme for target gangs based on big data
                  of Wi-Fi locations},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {1679--1690},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-1737-7},
  doi          = {10.1007/S10586-018-1737-7},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhaoSGPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ZhaoLGZCL19,
  author       = {Fan Zhao and
                  Xiangyang Luo and
                  Yong Gan and
                  Shuodi Zu and
                  Qingfeng Cheng and
                  Fenlin Liu},
  title        = {{IP} Geolocation based on identification routers and local delay distribution
                  similarity},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4722},
  doi          = {10.1002/CPE.4722},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ZhaoLGZCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiWYL19,
  author       = {Jian Li and
                  Jinwei Wang and
                  Shuang Yu and
                  Xiangyang Luo},
  title        = {A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {1},
  pages        = {100--113},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019010108},
  doi          = {10.4018/IJDCF.2019010108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiWYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KangLYXLW19,
  author       = {Yuhan Kang and
                  Fenlin Liu and
                  Chunfang Yang and
                  Lingyun Xiang and
                  Xiangyang Luo and
                  Ping Wang},
  title        = {Color image steganalysis based on channel gradient correlation},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719852031},
  doi          = {10.1177/1550147719852031},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KangLYXLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiuLMLL19,
  author       = {Wenyan Liu and
                  Xiangyang Luo and
                  Qing Mu and
                  Yimin Liu and
                  Fenlin Liu},
  title        = {An indoor Wi-Fi access points localization algorithm based on improved
                  path loss model parameter calculation method and recursive partition},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719852034},
  doi          = {10.1177/1550147719852034},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiuLMLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiaWNLS19,
  author       = {Xingxing Jia and
                  Daoshun Wang and
                  Daxin Nie and
                  Xiangyang Luo and
                  Jonathan Zheng Sun},
  title        = {A new threshold changeable secret sharing scheme based on the Chinese
                  Remainder Theorem},
  journal      = {Inf. Sci.},
  volume       = {473},
  pages        = {13--30},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.024},
  doi          = {10.1016/J.INS.2018.09.024},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/JiaWNLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLLLSJ19,
  author       = {Jinwei Wang and
                  Yangyang Li and
                  Jian Li and
                  Xiangyang Luo and
                  Yun{-}Qing Shi and
                  Sunil Kr. Jha},
  title        = {Color image-spliced localization based on quaternion principal component
                  analysis and quaternion skewness},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {353--362},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.004},
  doi          = {10.1016/J.JISA.2019.06.004},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLLLSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiaCLYLLW19,
  author       = {Hongyong Jia and
                  Yue Chen and
                  Yan Li and
                  Xincheng Yan and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Bo Wang},
  title        = {Attributes revocation through ciphertext puncturation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.011},
  doi          = {10.1016/J.JISA.2019.06.011},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiaCLYLLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/LiuGWXL19,
  author       = {Jiu{-}fen Liu and
                  Junjun Gan and
                  Junchao Wang and
                  Che Xu and
                  Xiangyang Luo},
  title        = {Efficient stego key recovery based on distribution differences of
                  extracting message bits},
  journal      = {J. Real Time Image Process.},
  volume       = {16},
  number       = {3},
  pages        = {649--660},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11554-018-0805-9},
  doi          = {10.1007/S11554-018-0805-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/LiuGWXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/JanickiMLY19,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Xiangyang Luo and
                  Dengpan Ye},
  title        = {Recent Advances in Detection, Investigation and Mitigation of Cyber
                  Crimes},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {9},
  pages        = {1039--1042},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_9/recent\_advances\_in\_detection},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/JanickiMLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangLYL19,
  author       = {Ping Wang and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {Steganalysis aided by fragile detection of image manipulations},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {16},
  pages        = {23309--23328},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7654-9},
  doi          = {10.1007/S11042-019-7654-9},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WangLYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangLLYGL19,
  author       = {Qikun Zhang and
                  Yongjiao Li and
                  Zhigang Li and
                  Junling Yuan and
                  Yong Gan and
                  Xiangyang Luo},
  title        = {Access Control Based on Ciphertext Attribute Authentication and Threshold
                  Policy for the Internet of Things},
  journal      = {Sensors},
  volume       = {19},
  number       = {23},
  pages        = {5237},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19235237},
  doi          = {10.3390/S19235237},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangLLYGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/MaLLBZ19,
  author       = {Yuanyuan Ma and
                  Xiangyang Luo and
                  Xiaolong Li and
                  Zhenkun Bao and
                  Yi Zhang},
  title        = {Selection of Rich Model Steganalysis Features Based on Decision Rough
                  Set {\(\alpha\)}-Positive Region Reduction},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {29},
  number       = {2},
  pages        = {336--350},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSVT.2018.2799243},
  doi          = {10.1109/TCSVT.2018.2799243},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/MaLLBZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/QianXLZ19,
  author       = {Zhenxing Qian and
                  Haisheng Xu and
                  Xiangyang Luo and
                  Xinpeng Zhang},
  title        = {New Framework of Reversible Data Hiding in Encrypted {JPEG} Bitstreams},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {29},
  number       = {2},
  pages        = {351--362},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSVT.2018.2797897},
  doi          = {10.1109/TCSVT.2018.2797897},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/QianXLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/WangLLSJ19,
  author       = {Jinwei Wang and
                  Ting Li and
                  Xiangyang Luo and
                  Yun{-}Qing Shi and
                  Sunil Kr. Jha},
  title        = {Identifying Computer Generated Images Based on Quaternion Central
                  Moments in Color Quaternion Wavelet Domain},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {29},
  number       = {9},
  pages        = {2775--2785},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSVT.2018.2867786},
  doi          = {10.1109/TCSVT.2018.2867786},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/WangLLSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHCWXL19,
  author       = {Qian Wang and
                  Jing Huang and
                  Yanjiao Chen and
                  Cong Wang and
                  Fu Xiao and
                  Xiangyang Luo},
  title        = {\emph{PROST}: Privacy-Preserving and Truthful Online Double Auction
                  for Spectrum Allocation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {2},
  pages        = {374--386},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2850330},
  doi          = {10.1109/TIFS.2018.2850330},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangHCWXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuC0L0L19,
  author       = {Shuangke Wu and
                  Yanjiao Chen and
                  Qian Wang and
                  Minghui Li and
                  Cong Wang and
                  Xiangyang Luo},
  title        = {CReam: {A} Smart Contract Enabled Collusion-Resistant e-Auction},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {7},
  pages        = {1687--1701},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2883275},
  doi          = {10.1109/TIFS.2018.2883275},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuC0L0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/QiaoSLXZW19,
  author       = {Tong Qiao and
                  Ran Shi and
                  Xiangyang Luo and
                  Ming Xu and
                  Ning Zheng and
                  Yiming Wu},
  title        = {Statistical Model-Based Detector via Texture Weight Map: Application
                  in Re-Sampling Authentication},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {21},
  number       = {5},
  pages        = {1077--1092},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMM.2018.2872863},
  doi          = {10.1109/TMM.2018.2872863},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/QiaoSLXZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/WuQLWZL19,
  author       = {Libing Wu and
                  Cong Quan and
                  Chenliang Li and
                  Qian Wang and
                  Bolong Zheng and
                  Xiangyang Luo},
  title        = {A Context-Aware User-Item Representation Learning for Item Recommendation},
  journal      = {{ACM} Trans. Inf. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {22:1--22:29},
  year         = {2019},
  url          = {https://doi.org/10.1145/3298988},
  doi          = {10.1145/3298988},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tois/WuQLWZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/MaL00B19,
  author       = {Yuanyuan Ma and
                  Xiangyang Luo and
                  Zhenyu Li and
                  Yi Zhang and
                  Adrian G. Bors},
  title        = {Feature selection method for image steganalysis based on weighted
                  inner-inter class distance and dispersion criterion},
  booktitle    = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM}
                  {TUR-C} 2019, Chengdu, China, May 17-19, 2019},
  pages        = {66:1--66:5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321408.3321572},
  doi          = {10.1145/3321408.3321572},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/acmturc/MaL00B19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/LuoRSXW19,
  author       = {Xiangyang Luo and
                  Xiangying Ran and
                  Wei Sun and
                  Yunlai Xu and
                  Chongjun Wang},
  editor       = {Igor V. Tetko and
                  Vera Kurkov{\'{a}} and
                  Pavel Karpov and
                  Fabian J. Theis},
  title        = {A Label-Specific Attention-Based Network with Regularized Loss for
                  Multi-label Classification},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2019: Deep
                  Learning - 28th International Conference on Artificial Neural Networks,
                  Munich, Germany, September 17-19, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11728},
  pages        = {731--742},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30484-3\_57},
  doi          = {10.1007/978-3-030-30484-3\_57},
  timestamp    = {Sat, 19 Oct 2019 20:11:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icann/LuoRSXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/MaLZL19,
  author       = {Te Ma and
                  Fenlin Liu and
                  Fan Zhang and
                  Xiangyang Luo},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {An Landmark Evaluation Algorithm Based on Router Identification and
                  Delay Measurement},
  booktitle    = {Artificial Intelligence and Security - 5th International Conference,
                  {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11634},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24271-8\_15},
  doi          = {10.1007/978-3-030-24271-8\_15},
  timestamp    = {Fri, 19 Jul 2019 12:53:39 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/MaLZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/GaoGZWL19,
  author       = {Tianyu Gao and
                  Yanqing Guo and
                  Xin Zheng and
                  Qianyu Wang and
                  Xiangyang Luo},
  title        = {Moir{\'{e}} Pattern Removal with Multi-scale Feature Enhancing
                  Network},
  booktitle    = {{IEEE} International Conference on Multimedia {\&} Expo Workshops,
                  {ICME} Workshops 2019, Shanghai, China, July 8-12, 2019},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICMEW.2019.00048},
  doi          = {10.1109/ICMEW.2019.00048},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/GaoGZWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/LiNLCQ19,
  author       = {Chenliang Li and
                  Xichuan Niu and
                  Xiangyang Luo and
                  Zhenzhong Chen and
                  Cong Quan},
  editor       = {Sarit Kraus},
  title        = {A Review-Driven Neural Model for Sequential Recommendation},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {2866--2872},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/397},
  doi          = {10.24963/IJCAI.2019/397},
  timestamp    = {Tue, 20 Aug 2019 16:18:18 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/LiNLCQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/SunRLW19,
  author       = {Wei Sun and
                  Xiangying Ran and
                  Xiangyang Luo and
                  Chongjun Wang},
  title        = {An Efficient Framework by Topic Model for Multi-label Text Classification},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8852091},
  doi          = {10.1109/IJCNN.2019.8852091},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/SunRLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/XuRSLW19,
  author       = {Yunlai Xu and
                  Xiangying Ran and
                  Wei Sun and
                  Xiangyang Luo and
                  Chongjun Wang},
  title        = {Gated Neural Network with Regularized Loss for Multi-label Text Classification},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8851686},
  doi          = {10.1109/IJCNN.2019.8851686},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/XuRSLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0002LZCWLL19,
  author       = {Qian Wang and
                  Xiu Lin and
                  Man Zhou and
                  Yanjiao Chen and
                  Cong Wang and
                  Qi Li and
                  Xiangyang Luo},
  title        = {VoicePop: {A} Pop Noise based Anti-spoofing System for Voice Authentication
                  on Smartphones},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2062--2070},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737422},
  doi          = {10.1109/INFOCOM.2019.8737422},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/0002LZCWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangHLS19,
  author       = {Jinwei Wang and
                  Wei Huang and
                  Xiangyang Luo and
                  Yung{-}Qing Shi},
  editor       = {Hongxia Wang and
                  Xianfeng Zhao and
                  Yunqing Shi and
                  Hyoung Joong Kim and
                  Alessandro Piva},
  title        = {Double {JPEG} Compression Detection Based on Markov Model},
  booktitle    = {Digital Forensics and Watermarking - 18th International Workshop,
                  {IWDW} 2019, Chengdu, China, November 2-4, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12022},
  pages        = {141--149},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43575-2\_11},
  doi          = {10.1007/978-3-030-43575-2\_11},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangHLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/XuLLPLJ19,
  author       = {Canwen Xu and
                  Jing Li and
                  Xiangyang Luo and
                  Jiaxin Pei and
                  Chenliang Li and
                  Donghong Ji},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {DLocRL: {A} Deep Learning Pipeline for Fine-Grained Location Recognition
                  and Linking in Tweets},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {3391--3397},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313491},
  doi          = {10.1145/3308558.3313491},
  timestamp    = {Mon, 16 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/XuLLPLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-07005,
  author       = {Canwen Xu and
                  Jing Li and
                  Xiangyang Luo and
                  Jiaxin Pei and
                  Chenliang Li and
                  Donghong Ji},
  title        = {DLocRL: {A} Deep Learning Pipeline for Fine-Grained Location Recognition
                  and Linking in Tweets},
  journal      = {CoRR},
  volume       = {abs/1901.07005},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.07005},
  eprinttype    = {arXiv},
  eprint       = {1901.07005},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-07005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-00590,
  author       = {Chenliang Li and
                  Xichuan Niu and
                  Xiangyang Luo and
                  Zhenzhong Chen and
                  Cong Quan},
  title        = {A Review-Driven Neural Model for Sequential Recommendation},
  journal      = {CoRR},
  volume       = {abs/1907.00590},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.00590},
  eprinttype    = {arXiv},
  eprint       = {1907.00590},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-00590.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-02439,
  author       = {Shichang Ding and
                  Xiangyang Luo and
                  Dengpan Ye and
                  Fenlin Liu},
  title        = {Delay-Distance Correlation Study for {IP} Geolocation},
  journal      = {CoRR},
  volume       = {abs/1909.02439},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.02439},
  eprinttype    = {arXiv},
  eprint       = {1909.02439},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-02439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-13111,
  author       = {Lingchen Zhao and
                  Shengshan Hu and
                  Qian Wang and
                  Jianlin Jiang and
                  Chao Shen and
                  Xiangyang Luo},
  title        = {Shielding Collaborative Learning: Mitigating Poisoning Attacks through
                  Client-Side Detection},
  journal      = {CoRR},
  volume       = {abs/1910.13111},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.13111},
  eprinttype    = {arXiv},
  eprint       = {1910.13111},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-13111.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangGWLK18,
  author       = {Qianyu Wang and
                  Yanqing Guo and
                  Jiujun Wang and
                  Xiangyang Luo and
                  Xiangwei Kong},
  title        = {Multi-View Analysis Dictionary Learning for Image Classification},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {20174--20183},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2791578},
  doi          = {10.1109/ACCESS.2018.2791578},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangGWLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZuLLLL18,
  author       = {Shuodi Zu and
                  Xiangyang Luo and
                  Siqi Liu and
                  Yan Liu and
                  Fenlin Liu},
  title        = {City-Level {IP} Geolocation Algorithm Based on PoP Network Topology},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {64867--64875},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2878309},
  doi          = {10.1109/ACCESS.2018.2878309},
  timestamp    = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZuLLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YangLLL18,
  author       = {Chunfang Yang and
                  Xiangyang Luo and
                  Jicang Lu and
                  Fenlin Liu},
  title        = {Extracting hidden messages of {MLSB} steganography based on optimal
                  stego subset},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {11},
  pages        = {119103:1--119103:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9328-2},
  doi          = {10.1007/S11432-017-9328-2},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/YangLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLL18,
  author       = {Yimin Liu and
                  Wenyan Liu and
                  Xiangyang Luo},
  title        = {Survey on the Indoor Localization Technique of Wi-Fi Access Points},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {10},
  number       = {3},
  pages        = {27--42},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDCF.2018070103},
  doi          = {10.4018/IJDCF.2018070103},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ShiLZPCG18,
  author       = {Wenqi Shi and
                  Xiangyang Luo and
                  Fan Zhao and
                  Ziru Peng and
                  Qingfeng Cheng and
                  Yong Gan},
  title        = {Geolocating a WeChat user based on the relation between reported and
                  actual distance},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {14},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1177/1550147718774462},
  doi          = {10.1177/1550147718774462},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ShiLZPCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinCLZS18,
  author       = {Chuan Qin and
                  Xueqin Chen and
                  Xiangyang Luo and
                  Xinpeng Zhang and
                  Xingming Sun},
  title        = {Perceptual image hashing via dual-cross pattern encoding and salient
                  structure detection},
  journal      = {Inf. Sci.},
  volume       = {423},
  pages        = {284--302},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2017.09.060},
  doi          = {10.1016/J.INS.2017.09.060},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/QinCLZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QinHLD18,
  author       = {Chuan Qin and
                  Zhihong He and
                  Xiangyang Luo and
                  Jing Dong},
  title        = {Reversible data hiding in encrypted image with separable capability
                  and high embedding capacity},
  journal      = {Inf. Sci.},
  volume       = {465},
  pages        = {285--304},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.07.021},
  doi          = {10.1016/J.INS.2018.07.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/QinHLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/LuYLL18,
  author       = {Jicang Lu and
                  Chunfang Yang and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Quantitative steganalysis of {JPEG} additive steganography based on
                  boundary effect},
  journal      = {J. Electronic Imaging},
  volume       = {27},
  number       = {2},
  pages        = {023004},
  year         = {2018},
  url          = {https://doi.org/10.1117/1.JEI.27.2.023004},
  doi          = {10.1117/1.JEI.27.2.023004},
  timestamp    = {Wed, 28 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/LuYLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangGLWLL18,
  author       = {Qikun Zhang and
                  Yong Gan and
                  Lu Liu and
                  Xianmin Wang and
                  Xiangyang Luo and
                  Yuanzhang Li},
  title        = {An authenticated asymmetric group key agreement based on attribute
                  encryption},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {123},
  pages        = {1--10},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.08.013},
  doi          = {10.1016/J.JNCA.2018.08.013},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangGLWLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhouXLLZH18,
  author       = {Yang Zhou and
                  Qing Xu and
                  Xiangyang Luo and
                  Fenlin Liu and
                  Long Zhang and
                  Xiaofei Hu},
  title        = {{\unicode{32593}}{\unicode{32476}}{\unicode{31354}}{\unicode{38388}}{\unicode{27979}}{\unicode{32472}}{\unicode{30340}}{\unicode{27010}}{\unicode{24565}}{\unicode{21450}}{\unicode{20854}}{\unicode{25216}}{\unicode{26415}}{\unicode{20307}}{\unicode{31995}}{\unicode{30340}}{\unicode{30740}}{\unicode{31350}}
                  (Research on Definition and Technological System of Cyberspace Surveying
                  and Mapping)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {5},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2018.05.001},
  doi          = {10.11896/J.ISSN.1002-137X.2018.05.001},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhouXLLZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WangLYL18,
  author       = {Ping Wang and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {Blind forensics of image gamma transformation and its application
                  in splicing detection},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {55},
  pages        = {80--90},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jvcir.2018.05.020},
  doi          = {10.1016/J.JVCIR.2018.05.020},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/WangLYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangZQYL18,
  author       = {Yi Zhang and
                  Xiaodong Zhu and
                  Chuan Qin and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {Dither modulation based adaptive steganography resisting jpeg compression
                  and statistic detection},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {17913--17935},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4506-3},
  doi          = {10.1007/S11042-017-4506-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangZQYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XuLGL18,
  author       = {Che Xu and
                  Jiu{-}fen Liu and
                  Junjun Gan and
                  Xiangyang Luo},
  title        = {Stego key recovery based on the optimal hypothesis test},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {17973--17992},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4878-4},
  doi          = {10.1007/S11042-017-4878-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XuLGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GanLLYL18,
  author       = {Junjun Gan and
                  Jiu{-}fen Liu and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Reliable steganalysis of {HUGO} steganography based on partially known
                  plaintext},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {18007--18027},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5134-7},
  doi          = {10.1007/S11042-017-5134-7},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/GanLLYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiSHML18,
  author       = {Ruixiang Li and
                  Yuchen Sun and
                  Jianwei Hu and
                  Te Ma and
                  Xiangyang Luo},
  title        = {Street-Level Landmark Evaluation Based on Nearest Routers},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {2507293:1--2507293:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2507293},
  doi          = {10.1155/2018/2507293},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiSHML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SzczypiorskiWLY18,
  author       = {Krzysztof Szczypiorski and
                  Liqiang Wang and
                  Xiangyang Luo and
                  Dengpan Ye},
  title        = {Big Data Analytics for Information Security},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7657891:1--7657891:2},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7657891},
  doi          = {10.1155/2018/7657891},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SzczypiorskiWLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ZhangQZLL18,
  author       = {Yi Zhang and
                  Chuan Qin and
                  Weiming Zhang and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {On the fault-tolerant performance for a class of robust image steganography},
  journal      = {Signal Process.},
  volume       = {146},
  pages        = {99--111},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.sigpro.2018.01.011},
  doi          = {10.1016/J.SIGPRO.2018.01.011},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/ZhangQZLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/WangLYL18,
  author       = {Ping Wang and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {Parameter estimation of image gamma transformation based on zero-value
                  histogram bin locations},
  journal      = {Signal Process. Image Commun.},
  volume       = {64},
  pages        = {33--45},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.image.2018.02.011},
  doi          = {10.1016/J.IMAGE.2018.02.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/WangLYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/PengLZCL18,
  author       = {Ziru Peng and
                  Xiangyang Luo and
                  Fan Zhao and
                  Qingfeng Cheng and
                  Fenlin Liu},
  title        = {Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information
                  Capture Method for Android Device},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {2769417:1--2769417:19},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2769417},
  doi          = {10.1155/2018/2769417},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/PengLZCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiYJLNL18,
  author       = {Shiyu Li and
                  Dengpan Ye and
                  Shunzhi Jiang and
                  Changrui Liu and
                  Xiaoguang Niu and
                  Xiangyang Luo},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Attack on Deep Steganalysis Neural Networks},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11066},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00015-8\_23},
  doi          = {10.1007/978-3-030-00015-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiYJLNL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HuCWWL018,
  author       = {Shengshan Hu and
                  Chengjun Cai and
                  Qian Wang and
                  Cong Wang and
                  Xiangyang Luo and
                  Kui Ren},
  title        = {Searching an Encrypted Cloud Meets Blockchain: {A} Decentralized,
                  Reliable and Fair Realization},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {792--800},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8485890},
  doi          = {10.1109/INFOCOM.2018.8485890},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/HuCWWL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/XuGZWL18,
  author       = {Nan Xu and
                  Yanqing Guo and
                  Xin Zheng and
                  Qianyu Wang and
                  Xiangyang Luo},
  editor       = {Susanne Boll and
                  Kyoung Mu Lee and
                  Jiebo Luo and
                  Wenwu Zhu and
                  Hyeran Byun and
                  Chang Wen Chen and
                  Rainer Lienhart and
                  Tao Mei},
  title        = {Partial Multi-view Subspace Clustering},
  booktitle    = {2018 {ACM} Multimedia Conference on Multimedia Conference, {MM} 2018,
                  Seoul, Republic of Korea, October 22-26, 2018},
  pages        = {1794--1801},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3240508.3240679},
  doi          = {10.1145/3240508.3240679},
  timestamp    = {Mon, 18 Nov 2019 15:08:26 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/XuGZWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLYL17,
  author       = {Zhe Chen and
                  Jicang Lu and
                  Pengfei Yang and
                  Xiangyang Luo},
  title        = {Recognizing Substitution Steganography of Spatial Domain Based on
                  the Characteristics of Pixels Correlation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {48--61},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100105},
  doi          = {10.4018/IJDCF.2017100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/SongLCYL17,
  author       = {Xiaofeng Song and
                  Fenlin Liu and
                  Liju Chen and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {Optimal Gabor Filters for Steganalysis of Content-Adaptive {JPEG}
                  Steganography},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {552--569},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.01.029},
  doi          = {10.3837/TIIS.2017.01.029},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/SongLCYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/ZhangLYLSL17,
  author       = {Yi Zhang and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo and
                  Xiaofeng Song and
                  Jicang Lu},
  title        = {Steganalysis of content-adaptive {JPEG} steganography based on Gauss
                  partial derivative filter bank},
  journal      = {J. Electronic Imaging},
  volume       = {26},
  number       = {1},
  pages        = {13011},
  year         = {2017},
  url          = {https://doi.org/10.1117/1.JEI.26.1.013011},
  doi          = {10.1117/1.JEI.26.1.013011},
  timestamp    = {Thu, 18 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jei/ZhangLYLSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/BaoLL17,
  author       = {Zhenkun Bao and
                  Xiaolong Li and
                  Xiangyang Luo},
  title        = {On the probability density function and characteristic function moments
                  of image steganalysis in the log prediction error wavelet subband},
  journal      = {J. Electronic Imaging},
  volume       = {26},
  number       = {1},
  pages        = {13025},
  year         = {2017},
  url          = {https://doi.org/10.1117/1.JEI.26.1.013025},
  doi          = {10.1117/1.JEI.26.1.013025},
  timestamp    = {Fri, 07 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/BaoLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangLYL17,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Joint {JPEG} compression and detection resistant performance enhancement
                  for adaptive steganography using feature regions selection},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {3},
  pages        = {3649--3668},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3914-0},
  doi          = {10.1007/S11042-016-3914-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangLYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/BaoLZYL17,
  author       = {Zhenkun Bao and
                  Xiangyang Luo and
                  Weiming Zhang and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Improving side-informed {JPEG} steganography using two-dimensional
                  decomposition embedding method},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {12},
  pages        = {14345--14374},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3823-2},
  doi          = {10.1007/S11042-016-3823-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/BaoLZYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SongLZYLC17,
  author       = {Xiaofeng Song and
                  Fenlin Liu and
                  Zhengui Zhang and
                  Chunfang Yang and
                  Xiangyang Luo and
                  Liju Chen},
  title        = {2D Gabor filters-based steganalysis of content-adaptive {JPEG} steganography},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {24},
  pages        = {26391--26419},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-4157-9},
  doi          = {10.1007/S11042-016-4157-9},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SongLZYLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLGZG17,
  author       = {Jun Chen and
                  Xiangyang Luo and
                  Yanqing Guo and
                  Yi Zhang and
                  Daofu Gong},
  title        = {A Survey on Breaking Technique of Text-Based {CAPTCHA}},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {6898617:1--6898617:15},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6898617},
  doi          = {10.1155/2017/6898617},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenLGZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/WangGGLK17,
  author       = {Jiujun Wang and
                  Yanqing Guo and
                  Jun Guo and
                  Xiangyang Luo and
                  Xiangwei Kong},
  title        = {Class-Aware Analysis Dictionary Learning for Pattern Classification},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {24},
  number       = {12},
  pages        = {1822--1826},
  year         = {2017},
  url          = {https://doi.org/10.1109/LSP.2017.2734860},
  doi          = {10.1109/LSP.2017.2734860},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/WangGGLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ShiLZPG17,
  author       = {Wenqi Shi and
                  Xiangyang Luo and
                  Fan Zhao and
                  Ziru Peng and
                  Yong Gan},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {A WeChat User Geolocating Algorithm Based on the Relation Between
                  Reported and Actual Distance},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {223--235},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_17},
  doi          = {10.1007/978-3-319-69471-9\_17},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/ShiLZPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZhaoLGZL17,
  author       = {Fan Zhao and
                  Xiangyang Luo and
                  Yong Gan and
                  Shuodi Zu and
                  Fenlin Liu},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {{IP} Geolocation Base on Local Delay Distribution Similarity},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {383--395},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_28},
  doi          = {10.1007/978-3-319-69471-9\_28},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/ZhaoLGZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/YangZWLLL17,
  author       = {Chunfang Yang and
                  Yi Zhang and
                  Ping Wang and
                  Xiangyang Luo and
                  Fenlin Liu and
                  Jicang Lu},
  title        = {Steganalysis Feature Subspace Selection Based on Fisher Criterion},
  booktitle    = {2017 {IEEE} International Conference on Data Science and Advanced
                  Analytics, {DSAA} 2017, Tokyo, Japan, October 19-21, 2017},
  pages        = {514--521},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSAA.2017.53},
  doi          = {10.1109/DSAA.2017.53},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dsaa/YangZWLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhaoCYL17,
  author       = {Fan Zhao and
                  Jingning Chen and
                  Dengpan Ye and
                  Xiangyang Luo},
  title        = {A Network Coordinate System Constructing Algorithm Based on Optimal
                  Neighbor Nodes},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {140--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.94},
  doi          = {10.1109/DSC.2017.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhaoCYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/LiLSC17,
  author       = {Mingyue Li and
                  Xiangyang Luo and
                  Wenqi Shi and
                  Lixiang Chai},
  title        = {City-level {IP} geolocation based on network topology community detection},
  booktitle    = {2017 International Conference on Information Networking, {ICOIN} 2017,
                  Da Nang, Vietnam, January 11-13, 2017},
  pages        = {578--583},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICOIN.2017.7899562},
  doi          = {10.1109/ICOIN.2017.7899562},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/LiLSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangLWSYL17,
  author       = {Zhiqian Zhang and
                  Chenliang Li and
                  Zhiyong Wu and
                  Aixin Sun and
                  Dengpan Ye and
                  Xiangyang Luo},
  title        = {{NEXT:} {A} Neural Network Framework for Next {POI} Recommendation},
  journal      = {CoRR},
  volume       = {abs/1704.04576},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.04576},
  eprinttype    = {arXiv},
  eprint       = {1704.04576},
  timestamp    = {Mon, 17 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangLWSYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-03656,
  author       = {Nan Xu and
                  Yanqing Guo and
                  Jiujun Wang and
                  Xiangyang Luo and
                  Ran He},
  title        = {Joint Adaptive Neighbours and Metric Learning for Multi-view Subspace
                  Clustering},
  journal      = {CoRR},
  volume       = {abs/1709.03656},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.03656},
  eprinttype    = {arXiv},
  eprint       = {1709.03656},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-03656.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuTHWL16,
  author       = {Jiu{-}fen Liu and
                  Yu{-}guo Tian and
                  Tao Han and
                  Junchao Wang and
                  Xiangyang Luo},
  title        = {Stego key searching for {LSB} steganography on {JPEG} decompressed
                  image},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {3},
  pages        = {32105:1--32105:15},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-015-5367-x},
  doi          = {10.1007/S11432-015-5367-X},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuTHWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenLLZZ16,
  author       = {Jingning Chen and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Fan Zhao and
                  Guang Zhu},
  title        = {A landmark calibration-based {IP} geolocation approach},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {4},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-015-0029-5},
  doi          = {10.1186/S13635-015-0029-5},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenLLZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/XieLGLL16,
  author       = {Xin Xie and
                  Bin Lu and
                  Daofu Gong and
                  Xiangyang Luo and
                  Fenlin Liu},
  title        = {Random table and hash coding-based binary code obfuscation against
                  stack trace analysis},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {18--27},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0137},
  doi          = {10.1049/IET-IFS.2013.0137},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/XieLGLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangLYL16,
  author       = {Ping Wang and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Improving Scanned Binary Image Watermarking Based On Additive Model
                  and Sampling},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {8},
  number       = {2},
  pages        = {36--47},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDCF.2016040104},
  doi          = {10.4018/IJDCF.2016040104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangLYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/QinYL16,
  author       = {Chuan Qin and
                  Dengpan Ye and
                  Xiangyang Luo},
  title        = {Guest Editorial: Information Hiding and Forensics for Multimedia Security},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13421--13429},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-016-3876-2},
  doi          = {10.1007/S11042-016-3876-2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/QinYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuoSLZLYL16,
  author       = {Xiangyang Luo and
                  Xiaofeng Song and
                  Xiaolong Li and
                  Weiming Zhang and
                  Jicang Lu and
                  Chunfang Yang and
                  Fenlin Liu},
  title        = {Steganalysis of {HUGO} steganography based on parameter recognition
                  of syndrome-trellis-codes},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13557--13583},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2759-2},
  doi          = {10.1007/S11042-015-2759-2},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LuoSLZLYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangLYYL16,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Dengpan Ye and
                  Fenlin Liu},
  title        = {A framework of adaptive steganography resisting {JPEG} compression
                  and detection},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2957--2971},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1502},
  doi          = {10.1002/SEC.1502},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangLYYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LuLL15,
  author       = {Jicang Lu and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {A study on {JPEG} steganalytic features: Co-occurrence matrix vs.
                  Markov transition probability matrix},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2014.12.001},
  doi          = {10.1016/J.DIIN.2014.12.001},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LuLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/SongLYLL15,
  author       = {Xiaofeng Song and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo and
                  Zhenyu Li},
  title        = {Steganalysis of Adaptive {JPEG} Steganography by Selecting {DCT} Coefficients
                  According to Embedding Distortion},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {9},
  number       = {12},
  pages        = {5209--5228},
  year         = {2015},
  url          = {https://doi.org/10.3837/tiis.2015.12.026},
  doi          = {10.3837/TIIS.2015.12.026},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/SongLYLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/ZhangLYLS15,
  author       = {Yi Zhang and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo and
                  Xiaofeng Song},
  title        = {Detection of perturbed quantization class stego images based on possible
                  change modes},
  journal      = {J. Electronic Imaging},
  volume       = {24},
  number       = {6},
  pages        = {063005},
  year         = {2015},
  url          = {https://doi.org/10.1117/1.JEI.24.6.063005},
  doi          = {10.1117/1.JEI.24.6.063005},
  timestamp    = {Thu, 18 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jei/ZhangLYLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SongLLLZ15,
  author       = {Xiaofeng Song and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Jicang Lu and
                  Yi Zhang},
  title        = {Steganalysis of perturbed quantization steganography based on the
                  enhanced histogram features},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {24},
  pages        = {11045--11071},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-2217-6},
  doi          = {10.1007/S11042-014-2217-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SongLLLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenLLZZ15,
  author       = {Jingning Chen and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Fan Zhao and
                  Guang Zhu},
  title        = {A Landmark Calibration Based {IP} Geolocation Approach},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {411--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.52},
  doi          = {10.1109/ARES.2015.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenLLZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhangLYYL15,
  author       = {Yi Zhang and
                  Xiangyang Luo and
                  Chunfang Yang and
                  Dengpan Ye and
                  Fenlin Liu},
  title        = {A JPEG-Compression Resistant Adaptive Steganography Based on Relative
                  Relationship between {DCT} Coefficients},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {461--466},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.53},
  doi          = {10.1109/ARES.2015.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhangLYYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZhaoSLKCL15,
  author       = {Fan Zhao and
                  Yuhan Song and
                  Fenlin Liu and
                  Ke Ke and
                  Jingning Chen and
                  Xiangyang Luo},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido and
                  Jong Hyuk Park},
  title        = {City-Level Geolocation Based on Routing Feature},
  booktitle    = {29th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27,
                  2015},
  pages        = {414--419},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AINA.2015.215},
  doi          = {10.1109/AINA.2015.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ZhaoSLKCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SongLYLZ15,
  author       = {Xiaofeng Song and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo and
                  Yi Zhang},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro Comesa{\~{n}}a Alfaro},
  title        = {Steganalysis of Adaptive {JPEG} Steganography Using 2D Gabor Filters},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {15--23},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756608},
  doi          = {10.1145/2756601.2756608},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/SongLYLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/ZhuLLC15,
  author       = {Guang Zhu and
                  Xiangyang Luo and
                  Fenlin Liu and
                  Jingning Chen},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Hui{-}Huang Hsu and
                  Tomoya Enokido and
                  Fatos Xhafa},
  title        = {An Algorithm of City-Level Landmark Mining Based on Internet Forum},
  booktitle    = {18th International Conference on Network-Based Information Systems,
                  NBis 2015, Taipei, Taiwan, September 2-4, 2015},
  pages        = {294--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/NBiS.2015.46},
  doi          = {10.1109/NBIS.2015.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/ZhuLLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LuLL14,
  author       = {Jicang Lu and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Selection of image features for steganalysis based on the Fisher criterion},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {57--66},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2013.12.001},
  doi          = {10.1016/J.DIIN.2013.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LuLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LuLL14,
  author       = {Jicang Lu and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Recognizing F5-like Stego images from Multi-class {JPEG} Stego Images},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {11},
  pages        = {4153--4169},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.11.028},
  doi          = {10.3837/TIIS.2014.11.028},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LuLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoYHLW14,
  author       = {Xiangyang Luo and
                  Lin Yang and
                  Dai Hao and
                  Fenlin Liu and
                  Daoshun Wang},
  title        = {On Data and Virtualization Security Risks and Solutions of Cloud Computing},
  journal      = {J. Networks},
  volume       = {9},
  number       = {3},
  pages        = {571--581},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.3.571-581},
  doi          = {10.4304/JNW.9.3.571-581},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuoYHLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/YangYLMKZ13,
  author       = {Zan Yang and
                  Lin Yang and
                  Xiangyang Luo and
                  Linru Ma and
                  Bao{-}sheng Kou and
                  Kun Zhang},
  title        = {Model of Domain based {RBAC} and Supporting Technologies},
  journal      = {J. Comput.},
  volume       = {8},
  number       = {5},
  pages        = {1220--1229},
  year         = {2013},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=71\&\#38;id=960},
  doi          = {10.4304/JCP.8.5.1220-1229},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/YangYLMKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/YangLLZ13,
  author       = {Chunfang Yang and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Ying Zeng},
  title        = {Fusion of Two Typical Quantitative Steganalysis Based on {SVR}},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {3},
  pages        = {731--736},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.3.731-736},
  doi          = {10.4304/JSW.8.3.731-736},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/YangLLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/YinLLL13,
  author       = {Meijuan Yin and
                  Xiaonan Liu and
                  Junyong Luo and
                  Xiangyang Luo},
  title        = {A System for Extracting and Ranking Name Aliases in Emails},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {3},
  pages        = {737--745},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.3.737-745},
  doi          = {10.4304/JSW.8.3.737-745},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/YinLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiLLYZ13,
  author       = {Xiaolong Li and
                  Bin Li and
                  Xiangyang Luo and
                  Bin Yang and
                  Ruihui Zhu},
  title        = {Steganalysis of a PVD-based content adaptive image steganography},
  journal      = {Signal Process.},
  volume       = {93},
  number       = {9},
  pages        = {2529--2538},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.sigpro.2013.03.029},
  doi          = {10.1016/J.SIGPRO.2013.03.029},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiLLYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangLLL13,
  author       = {Daoshun Wang and
                  Song Liu and
                  Xiangyang Luo and
                  Shundong Li},
  title        = {A transcoding-resistant video watermarking algorithm based on corners
                  and singular value decomposition},
  journal      = {Telecommun. Syst.},
  volume       = {54},
  number       = {3},
  pages        = {359--371},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-013-9739-5},
  doi          = {10.1007/S11235-013-9739-5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/WangLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLLZ13,
  author       = {Chunfang Yang and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Ying Zeng},
  title        = {Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple
                  Least-Significant Bits Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {1},
  pages        = {216--228},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2012.2229987},
  doi          = {10.1109/TIFS.2012.2229987},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangLLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/YuYWZCML13,
  author       = {Bo Yu and
                  Lin Yang and
                  Yongjun Wang and
                  Bofeng Zhang and
                  Yuan Cao and
                  Linru Ma and
                  Xiangyang Luo},
  title        = {Rule-Based Security Capabilities Matching for Web Services},
  journal      = {Wirel. Pers. Commun.},
  volume       = {73},
  number       = {4},
  pages        = {1349--1367},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11277-013-1254-1},
  doi          = {10.1007/S11277-013-1254-1},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/YuYWZCML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icimcs/LiuLLG13,
  author       = {Yuan Liu and
                  Xiangyang Luo and
                  Jicang Lu and
                  Daofu Gong},
  editor       = {Ke Lu and
                  Tao Mei and
                  Xindong Wu},
  title        = {Steganalysis of F5-like steganography based on selection of joint
                  distribution features},
  booktitle    = {International Conference on Internet Multimedia Computing and Service,
                  {ICIMCS} '13, Huangshan, China - August 17 - 19, 2013},
  pages        = {71--75},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2499788.2499821},
  doi          = {10.1145/2499788.2499821},
  timestamp    = {Mon, 07 Jan 2019 17:17:42 +0100},
  biburl       = {https://dblp.org/rec/conf/icimcs/LiuLLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiHLL13,
  author       = {Zhenyu Li and
                  Zongyun Hu and
                  Xiangyang Luo and
                  Bin Lu},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Embedding change rate estimation based on ensemble learning},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482528},
  doi          = {10.1145/2482513.2482528},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiHLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LuoLYLW12,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Chunfang Yang and
                  Shiguo Lian and
                  Daoshun Wang},
  title        = {On {F5} Steganography in Images},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {4},
  pages        = {447--456},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr092},
  doi          = {10.1093/COMJNL/BXR092},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LuoLYLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangLLLW12,
  author       = {Chunfang Yang and
                  Fenlin Liu and
                  Shiguo Lian and
                  Xiangyang Luo and
                  Daoshun Wang},
  title        = {Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit
                  Plane},
  journal      = {Comput. J.},
  volume       = {55},
  number       = {6},
  pages        = {717--727},
  year         = {2012},
  url          = {https://doi.org/10.1093/comjnl/bxr112},
  doi          = {10.1093/COMJNL/BXR112},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangLLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZengLLL12,
  author       = {Ying Zeng and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Shiguo Lian},
  title        = {Abstract interpretation-based semantic framework for software birthmark},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {377--390},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2012.03.004},
  doi          = {10.1016/J.COSE.2012.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZengLLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZongLL12,
  author       = {Han Zong and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Blind image steganalysis based on wavelet coefficient correlation},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {58--68},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.02.003},
  doi          = {10.1016/J.DIIN.2012.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZongLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuLLY12,
  author       = {Jicang Lu and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Chunfang Yang},
  title        = {Parameter-estimation and algorithm-selection based United-Judgment
                  for image steganalysis},
  journal      = {Multim. Tools Appl.},
  volume       = {57},
  number       = {1},
  pages        = {91--107},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11042-010-0588-x},
  doi          = {10.1007/S11042-010-0588-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LuLLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuoLYLZ12,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Chunfang Yang and
                  Shiguo Lian and
                  Ying Zeng},
  title        = {Steganalysis of adaptive image steganography in multiple gray code
                  bit-planes},
  journal      = {Multim. Tools Appl.},
  volume       = {57},
  number       = {3},
  pages        = {651--667},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11042-010-0663-3},
  doi          = {10.1007/S11042-010-0663-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LuoLYLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhaoLLXY12,
  author       = {Zheng Zhao and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Xin Xie and
                  Lu Yu},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {{LSB} Replacement Steganography Software Detection Based on Model
                  Checking},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_6},
  doi          = {10.1007/978-3-642-40099-5\_6},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhaoLLXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/LuHLL11,
  author       = {Jicang Lu and
                  Yongfeng Huang and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Pulse position checking-based steganalysis of {G.723.1} compressed
                  speech in VoIP},
  journal      = {Int. J. Multim. Intell. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {225--237},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJMIS.2011.044762},
  doi          = {10.1504/IJMIS.2011.044762},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmis/LuHLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmis/ZhengLYZL11,
  author       = {Dongning Zheng and
                  Fenlin Liu and
                  Chunfang Yang and
                  Qian Zhang and
                  Xiangyang Luo},
  title        = {Identification of steganography software based on register dependence},
  journal      = {Int. J. Multim. Intell. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {339--350},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJMIS.2011.044764},
  doi          = {10.1504/IJMIS.2011.044764},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmis/ZhengLYZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm2/ZengLLY11,
  author       = {Ying Zeng and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Chunfang Yang},
  title        = {Software Watermarking Through Obfuscated Interpretation: Implementation
                  and Analysis},
  journal      = {J. Multim.},
  volume       = {6},
  number       = {4},
  pages        = {329--340},
  year         = {2011},
  url          = {https://doi.org/10.4304/jmm.6.4.329-340},
  doi          = {10.4304/JMM.6.4.329-340},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmm2/ZengLLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LuoLLYG11,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Shiguo Lian and
                  Chunfang Yang and
                  Stefanos Gritzalis},
  title        = {On the Typical Statistic Features for Image Blind Steganalysis},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {29},
  number       = {7},
  pages        = {1404--1422},
  year         = {2011},
  url          = {https://doi.org/10.1109/JSAC.2011.110807},
  doi          = {10.1109/JSAC.2011.110807},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LuoLLYG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoLYW10,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Chunfang Yang and
                  Daoshun Wang},
  title        = {Image universal steganalysis based on best wavelet packet decomposition},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {634--647},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0044-6},
  doi          = {10.1007/S11432-010-0044-6},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuoLYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoLYL10,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Chunfang Yang and
                  Shiguo Lian},
  title        = {Modification ratio estimation for a category of adaptive steganography},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {12},
  pages        = {2472--2484},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-4105-7},
  doi          = {10.1007/S11432-010-4105-7},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuoLYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangLL09,
  author       = {Chunfang Yang and
                  Xiangyang Luo and
                  Fenlin Liu},
  editor       = {Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Embedding Ratio Estimating for Each Bit Plane of Image},
  booktitle    = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt,
                  Germany, June 8-10, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5806},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04431-1\_5},
  doi          = {10.1007/978-3-642-04431-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YangLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/HeLLY09,
  author       = {Xiongfei He and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Chunfang Yang},
  title        = {Classification between {PS} and Stego Images Based on Noise Model},
  booktitle    = {2009 Third International Conference on Multimedia and Ubiquitous Engineering,
                  {MUE} 2009, Qingdao, China, June 4-6, 2009},
  pages        = {31--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MUE.2009.16},
  doi          = {10.1109/MUE.2009.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/HeLLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LuoWWL08,
  author       = {Xiangyang Luo and
                  Daoshun Wang and
                  Ping Wang and
                  Fenlin Liu},
  title        = {A review on blind detection for image steganography},
  journal      = {Signal Process.},
  volume       = {88},
  number       = {9},
  pages        = {2138--2157},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.sigpro.2008.03.016},
  doi          = {10.1016/J.SIGPRO.2008.03.016},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LuoWWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangLLL08,
  author       = {Chunfang Yang and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Bin Liu},
  title        = {Steganalysis Frameworks of Embedding in Multiple Least-Significant
                  Bits},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {662--672},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2007240},
  doi          = {10.1109/TIFS.2008.2007240},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangLLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/LuoLCZ08,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Jianming Chen and
                  Yining Zhang},
  title        = {Image universal steganalysis based on wavelet packet transform},
  booktitle    = {International Workshop on Multimedia Signal Processing, {MMSP} 2008,
                  October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia},
  pages        = {780--784},
  publisher    = {{IEEE} Signal Processing Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MMSP.2008.4665180},
  doi          = {10.1109/MMSP.2008.4665180},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsp/LuoLCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LuoYWL07,
  author       = {Xiangyang Luo and
                  Chunfang Yang and
                  Daoshun Wang and
                  Fenlin Liu},
  title        = {{LTSB} Steganalysis Based on Quartic Equation},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {68--90},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_4},
  doi          = {10.1007/978-3-540-73092-7\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LuoYWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuoWWL07,
  author       = {Xiangyang Luo and
                  Daoshun Wang and
                  Ping Wang and
                  Fenlin Liu},
  title        = {Secret Key Estimation for Image Sequential Steganograph in Transform
                  Domain},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {538--542},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.106},
  doi          = {10.1109/GLOCOM.2007.106},
  timestamp    = {Fri, 26 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LuoWWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semco/LuLGLL07,
  author       = {Bin Lu and
                  Fenlin Liu and
                  Xin Ge and
                  Bin Liu and
                  Xiangyang Luo},
  title        = {A Software Birthmark Based on Dynamic Opcode n-gram},
  booktitle    = {Proceedings of the First {IEEE} International Conference on Semantic
                  Computing {(ICSC} 2007), September 17-19, 2007, Irvine, California,
                  {USA}},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSC.2007.15},
  doi          = {10.1109/ICSC.2007.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/semco/LuLGLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/LuoYL06,
  author       = {Xiangyang Luo and
                  Chunfang Yang and
                  Fenlin Liu},
  editor       = {Herbert Leitold and
                  Evangelos P. Markatos},
  title        = {Equivalence Analysis Among DIH, SPA, and {RS} Steganalysis Methods},
  booktitle    = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
                  19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4237},
  pages        = {161--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11909033\_15},
  doi          = {10.1007/11909033\_15},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/LuoYL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WangLL06,
  author       = {Ping Wang and
                  Xiangyang Luo and
                  Fenlin Liu},
  title        = {An Improved Secret Key Estimation Method for Sequential Steganography},
  booktitle    = {Second International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California,
                  USA, December 18-20, 2006, Proceedings},
  pages        = {396--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IIH-MSP.2006.265026},
  doi          = {10.1109/IIH-MSP.2006.265026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/WangLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/LuoWLL06,
  author       = {Xiangyang Luo and
                  Ping Wang and
                  Peizhong Lu and
                  Fenlin Liu},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {Fast and Blind Restoration Scheme for the Initial States of LFSRs},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 1},
  pages        = {192--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.62},
  doi          = {10.1109/IMSCCS.2006.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/LuoWLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuLL06,
  author       = {Fenlin Liu and
                  Bin Lu and
                  Xiangyang Luo},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {A Chaos-Based Robust Software Watermarking},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {355--366},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_33},
  doi          = {10.1007/11689522\_33},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mrcs/LiuLLL06,
  author       = {Bin Liu and
                  Fenlin Liu and
                  Bin Lu and
                  Xiangyang Luo},
  editor       = {Bilge G{\"{u}}nsel and
                  Anil K. Jain and
                  A. Murat Tekalp and
                  B{\"{u}}lent Sankur},
  title        = {Real-Time Steganography in Compressed Video},
  booktitle    = {Multimedia Content Representation, Classification and Security, International
                  Workshop, {MRCS} 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4105},
  pages        = {43--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11848035\_8},
  doi          = {10.1007/11848035\_8},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mrcs/LiuLLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcn/LuoLL06,
  author       = {Xiangyang Luo and
                  Junyong Luo and
                  Fenlin Liu},
  editor       = {Thomas Fahringer},
  title        = {Searching and Detecting Spatial {LSB} Steganographic Images on the
                  Internet},
  booktitle    = {Proceedings of the {IASTED} International Conference on Parallel and
                  Distributed Computing and Networks, as part of the 24th {IASTED} International
                  Multi-Conference on Applied Informatics, February 14-16 2006, Innsbruck,
                  Austria},
  pages        = {273--278},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Mon, 19 Jun 2006 11:10:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcn/LuoLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuLZL05,
  author       = {Peizhong Lu and
                  Shen Li and
                  Yan Zou and
                  Xiangyang Luo},
  title        = {Blind recognition of punctured convolutional codes},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {48},
  number       = {4},
  pages        = {484--498},
  year         = {2005},
  url          = {https://doi.org/10.1360/03yf0480},
  doi          = {10.1360/03YF0480},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuLZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LuoLL05,
  author       = {Xiangyang Luo and
                  Bin Liu and
                  Fenlin Liu},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Improved {RS} Method for Detection of {LSB} Steganography},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {508--516},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_54},
  doi          = {10.1007/11424826\_54},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LuoLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/LuoLL05,
  author       = {Xiangyang Luo and
                  Bin Liu and
                  Fenlin Liu},
  title        = {Detecting {LSB} Steganography Based on Dynamic Masks},
  booktitle    = {Proceedings of the Fifth International Conference on Intelligent Systems
                  Design and Applications {(ISDA} 2005), 8-10 September 2005, Wroclaw,
                  Poland},
  pages        = {251--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISDA.2005.37},
  doi          = {10.1109/ISDA.2005.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isda/LuoLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LuLTS04,
  author       = {Peizhong Lu and
                  Xiangyang Luo and
                  Qingyang Tang and
                  Shen Li},
  editor       = {Jessica J. Fridrich},
  title        = {An Improved Sample Pairs Method for Detection of {LSB} Embedding},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {116--127},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_9},
  doi          = {10.1007/978-3-540-30114-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LuLTS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LuSLZ04,
  author       = {Peizhong Lu and
                  Li Shen and
                  Xiangyang Luo and
                  Yan Zou},
  title        = {Blind recognition of punctured convolutional codes},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {459},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365494},
  doi          = {10.1109/ISIT.2004.1365494},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LuSLZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/ShenLLZ04,
  author       = {Shen Li and
                  Peizhong Lu and
                  Xiangyang Luo and
                  Yan Zou},
  title        = {Equivalence of Punctured Convolutional Codes from Shift Equivalent
                  Puncturing Patterns},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {786},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286564},
  doi          = {10.1109/ITCC.2004.1286564},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/ShenLLZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics