


default search action
Xiangyang Luo 0001
Person information
Other persons with the same name
- Xiangyang Luo — disambiguation page
- Xiangyang Luo 0002
![0009-0001-2828-387X [0009-0001-2828-387X]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png)
- Xiangyang Luo 0003
![0000-0003-3225-4649 [0000-0003-3225-4649]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j81]Zekang Wang
, Fuxiang Yuan
, Ruixiang Li
, Meng Zhang
, Xiangyang Luo
:
Hidden AS link prediction based on random forest feature selection and GWO-XGBoost model. Comput. Networks 262: 111164 (2025)
[j80]Xingxing Chen
, Yuqian Ma
, Qingfeng Cheng
, Xiaofeng Chen
, Xiangyang Luo
:
LB3AS: Lightweight Blockchain-Assisted Anonymous Authentication Scheme for Fog-Cloud-Based Internet of Medical Things. IEEE Internet Things J. 12(11): 18098-18114 (2025)
[j79]Wenyan Liu
, Xiangyang Luo
, Shichang Ding
, Shaoyong Du
:
Localization Algorithm Based on the Relationship Between Trapezoidal Trajectory and Energy Consumption of Mobile Anchor Nodes. IEEE Internet Things J. 12(15): 30366-30378 (2025)
[j78]Jianhong Ma, Yifan Du, Minglin Liu
, Xiangyang Luo
, Jie Li
:
AIBW: Average Interval-Based Watermarking for Tracking Down Network Attacks. IEEE Signal Process. Lett. 32: 2977-2981 (2025)
[j77]Shuangliang Li
, Jinwei Wang
, Hao Wu
, Jiawei Zhang
, Xin Cheng
, Xiangyang Luo
, Bin Ma
:
Defense Against Adversarial Faces at the Source: Strengthened Faces Based on Hidden Disturbances. IEEE Trans. Artif. Intell. 6(7): 1761-1775 (2025)
[j76]Chun Mao
, Zhenyu Li
, Xiangyang Luo
:
CovLBCG: A Covert Communication Framework Using Live Broadcast Bullet Comment Game. IEEE Trans. Games 17(3): 729-742 (2025)
[j75]Ke Wang, Shaowu Wu, Xiaolin Yin, Wei Lu
, Xiangyang Luo
, Rui Yang:
Robust Image Watermarking With Synchronization Using Template Enhanced-Extracted Network. IEEE Trans. Circuits Syst. Video Technol. 35(2): 1602-1614 (2025)
[j74]Yanhao Huo
, Shijun Xiang
, Xiangyang Luo
, Xinpeng Zhang
:
Image Semantic Steganography: A Way to Hide Information in Semantic Communication. IEEE Trans. Circuits Syst. Video Technol. 35(2): 1951-1960 (2025)
[j73]Zuping Xi
, Zuomin Qu
, Wei Lu
, Xiangyang Luo
, Xiaochun Cao
:
Invisible DNN Watermarking Against Model Extraction Attack. IEEE Trans. Cybern. 55(2): 800-811 (2025)
[j72]Bolin Zhang
, Qilin Yin, Wei Lu
, Xiangyang Luo
:
Deepfake Detection and Localization Using Multi-View Inconsistency Measurement. IEEE Trans. Dependable Secur. Comput. 22(2): 1796-1809 (2025)
[j71]Chenkai Guo
, Tianhong Wang
, Qianlu Wang
, Naipeng Dong
, Xiangyang Luo
, Zheli Liu
:
Fratricide! Hijacking in Android Multi-Window. IEEE Trans. Dependable Secur. Comput. 22(3): 3075-3092 (2025)
[j70]Luyang Ying
, Cheng Xiong, Chuan Qin
, Xiangyang Luo
, Zhenxing Qian
, Xinpeng Zhang
:
Generative Collision Attack on Deep Image Hashing. IEEE Trans. Inf. Forensics Secur. 20: 2748-2762 (2025)
[j69]Yuanyuan Ma
, Lige Xu, Qianqian Zhang, Yi Zhang
, Xianwei Xin, Xiangyang Luo
:
EIS-OBEA: Enhanced Image Steganalysis via Opposition-Based Evolutionary Algorithm. IEEE Trans. Inf. Forensics Secur. 20: 3616-3631 (2025)
[j68]Jintian Zhang
, Qingfeng Cheng
, Xiaofeng Chen
, Xiangyang Luo
:
CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones. IEEE Trans. Inf. Forensics Secur. 20: 8848-8862 (2025)
[j67]Yi Zhang, Yuanyuan Ma, Qianqian Zhang, Yang Pei, Xiangyang Luo:
An Image Robust Batch Steganography Framework With Minimum Embedding Signs. IEEE Trans. Inf. Forensics Secur. 20: 10745-10760 (2025)
[j66]Shaowu Wu
, Wei Lu
, Xiangyang Luo
:
Robust Watermarking Based on Multi-Layer Watermark Feature Fusion. IEEE Trans. Multim. 27: 5156-5169 (2025)
[j65]Nan Wu
, Chunfang Yang
, Baojun Qi
, Ma Zhu
, Jiangshan Li
, Xiangyang Luo
:
CCIGeo: Cross-View and Cross-Day-Night Image Geo-Localization Using Daytime Image Supervision. IEEE Trans. Multim. 27: 6475-6488 (2025)
[j64]Ruosi Cheng
, Shichang Ding
, Liancheng Zhang
, Ruixiang Li
, Shaoyong Du
, Xiangyang Luo
:
IPv6Landmarker: Enhancing IPv6 Street-Level Geolocation Through Network Landmark Mining and Targeted Updates. IEEE Trans. Netw. Sci. Eng. 12(2): 1280-1296 (2025)
[j63]Jintian Zhang
, Xingxing Chen
, Qingfeng Cheng
, Xiaofeng Chen
, Xiangyang Luo
:
An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones. IEEE Trans. Netw. Sci. Eng. 12(4): 3065-3081 (2025)
[j62]Qing Yu
, Lixin Zou
, Xiangyang Luo
, Xiangyu Zhao
, Chenliang Li
:
Uniform Graph Pre-training and Prompting for Transferable Recommendation. ACM Trans. Inf. Syst. 43(4): 101:1-101:26 (2025)
[j61]Xingxing Chen, Qingfeng Cheng, Xiaofeng Chen, Xiangyang Luo:
A Blockchain-Based Cross-Domain Data Transmission Scheme for Industrial Internet of Things With Edge-Cloud Computing. IEEE Trans. Serv. Comput. 18(5): 2489-2502 (2025)
[c16]Wenhua Zhang, Weicheng Li, Xuanrong Rao, Lixin Zou, Xiangyang Luo, Chubin Zhuang, Yongjie Hong, Zhen Qin, Hengyun Chang, Chenliang Li, Bo Zheng:
AIGuard: A Benchmark and Lightweight Detection for E-commerce AIGC Risks. ACL (Findings) 2025: 12437-12450
[c15]Yunfan Xie, Lixin Zou, Dan Luo, Min Tang, Chenliang Li, Liming Dong, Xiangyang Luo:
Mitigating Language Confusion through Inference-time Intervention. COLING 2025: 8418-8431
[c14]Feng Liu, Lixin Zou, Xiangyu Zhao, Min Tang, Liming Dong, Dan Luo, Xiangyang Luo, Chenliang Li:
Flow Matching Based Sequential Recommender Model. IJCAI 2025: 3108-3116
[c13]Yaqiong Qiao
, Aobo Jiao
, Xiangyang Luo
, Chenliang Li
, Jiangtao Ma
, Chenkai Guo
:
Towards Accurate Social User Geolocation: Mean Shift, Incremental Learning and Graph Convolutional Networks. SIGIR 2025: 276-285
[i4]Feng Liu, Lixin Zou, Xiangyu Zhao, Min Tang, Liming Dong, Dan Luo, Xiangyang Luo, Chenliang Li:
Flow Matching based Sequential Recommender Model. CoRR abs/2505.16298 (2025)- 2024
[j60]Zihao Li, Yunfan Xie
, Wei Emma Zhang
, Pengfei Wang
, Lixin Zou
, Fei Li, Xiangyang Luo, Chenliang Li
:
Disentangle interest trend and diversity for sequential recommendation. Inf. Process. Manag. 61(2): 103619 (2024)
[j59]Tong Qiao
, Shichuang Xie
, Yanli Chen
, Florent Retraint
, Xiangyang Luo
:
Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning. IEEE Trans. Pattern Anal. Mach. Intell. 46(7): 4654-4668 (2024)
[j58]Tong Qiao
, Yuxing Chen, Xiaofei Zhou
, Ran Shi
, Hang Shao
, Kunye Shen
, Xiangyang Luo
:
CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images. IEEE Trans. Cogn. Dev. Syst. 16(1): 369-379 (2024)
[j57]Chun Mao
, Zhenyu Li
, Xiangyang Luo
:
A Covert Communication Method Based on Time Attributes Shifting of Online Video Bullet Comment. IEEE Trans. Consumer Electron. 70(4): 6472-6483 (2024)
[j56]Xin Cheng
, Jinwei Wang
, Hao Wang
, Xiangyang Luo
, Bin Ma
:
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge. IEEE Trans. Circuits Syst. Video Technol. 34(1): 632-646 (2024)
[j55]Yuanyuan Ma
, Lige Xu, Yi Zhang
, Tao Zhang, Xiangyang Luo
:
Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1954-1969 (2024)
[j54]Hao Wang
, Jinwei Wang
, Jiawei Zhang
, Xiangyang Luo
, Bin Ma
, Bin Li
, Jinsheng Sun
:
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference. IEEE Trans. Circuits Syst. Video Technol. 34(6): 5191-5206 (2024)
[j53]Xingxing Jia
, Ting Yu
, Xiangyang Luo
, Daoshun Wang, Huiyu Zhou
:
Maximizing Contrast in XOR-Based Visual Cryptography Schemes. IEEE Trans. Circuits Syst. Video Technol. 34(12): 12849-12861 (2024)
[j52]Yuanfei Li
, Xiong Li
, Xiangyang Luo
, Zhetao Li
, Hongwei Li
, Xiaosong Zhang
:
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation. IEEE Trans. Dependable Secur. Comput. 21(4): 2552-2567 (2024)
[j51]Pei Zhang, Qingfeng Cheng
, Mingliang Zhang
, Xiangyang Luo
:
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping. IEEE Trans. Dependable Secur. Comput. 21(5): 4469-4480 (2024)
[j50]Hao-Tian Wu
, Yiu-Ming Cheung
, Zhihong Tian
, Dingcai Liu, Xiangyang Luo
, Jiankun Hu
:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. IEEE Trans. Inf. Forensics Secur. 19: 3719-3732 (2024)
[j49]Zuomin Qu
, Zuping Xi
, Wei Lu
, Xiangyang Luo, Qian Wang
, Bin Li
:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. IEEE Trans. Inf. Forensics Secur. 19: 3943-3957 (2024)
[j48]Tong Qiao
, Bin Zhao
, Ran Shi
, Meng Han
, Mahmoud Hassaballah
, Florent Retraint
, Xiangyang Luo
:
Scalable Universal Adversarial Watermark Defending Against Facial Forgery. IEEE Trans. Inf. Forensics Secur. 19: 8998-9011 (2024)
[j47]Guangyong Gao
, Hui Zhang
, Zhihua Xia
, Xiangyang Luo
, Yun-Qing Shi:
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image. IEEE Trans. Multim. 26: 3909-3923 (2024)
[j46]Tong Qiao
, Shichuang Xie
, Yanli Chen
, Florent Retraint
, Ran Shi
, Xiangyang Luo
:
Deepfake Detection Fighting Against Noisy Label Attack. IEEE Trans. Multim. 26: 9047-9059 (2024)
[j45]Chong Liu
, Ruixiang Li
, Fuxiang Yuan
, Shichang Ding
, Yan Liu
, Xiangyang Luo
:
6Subpattern: Target Generation Based on Subpattern Analysis for Internet-Wide IPv6 Scanning. IEEE Trans. Netw. Serv. Manag. 21(4): 3692-3710 (2024)
[j44]Ziming Zhao
, Zhaoxuan Li
, Xiaofei Xie
, Jiongchi Yu
, Fan Zhang
, Rui Zhang
, Binbin Chen
, Xiangyang Luo
, Ming Hu
, Wenrui Ma
:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024)
[j43]Ruixiang Li
, Xiaoyun Yuan
, Meijuan Yin, Xiangyang Luo
:
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers. IEEE/ACM Trans. Netw. 32(6): 5507-5523 (2024)
[j42]Yonghua Zhan
, Yang Yang
, Hongju Cheng
, Xiangyang Luo
, Zhangshuang Guan
, Robert H. Deng
:
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles. IEEE Trans. Serv. Comput. 17(5): 2762-2775 (2024)
[c12]Chaoran Zhang, Lixin Zou, Dan Luo, Xiangyang Luo, Zihao Li, Min Tang, Chenliang Li:
Efficient Sparse Attention needs Adaptive Token Release. ACL (Findings) 2024: 14081-14094
[i3]Chaoran Zhang, Lixin Zou, Dan Luo, Min Tang, Xiangyang Luo, Zihao Li, Chenliang Li:
Efficient Sparse Attention needs Adaptive Token Release. CoRR abs/2407.02328 (2024)
[i2]Cong Wang, Xiangyang Luo, Zijian Cai, Yiren Song, Yunlong Zhao, Yifan Bai, Yuhang He, Yihong Gong:
GridShow: Omni Visual Generation. CoRR abs/2412.10718 (2024)- 2023
[j41]Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu
, Yanli Chen
, Ming Xu
, Xiangyang Luo:
A novel model watermarking for protecting generative adversarial network. Comput. Secur. 127: 103102 (2023)
[j40]Yang Yang
, Robert H. Deng
, Wenzhong Guo
, Hongju Cheng
, Xiangyang Luo
, Xianghan Zheng, Chunming Rong
:
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer. IEEE Trans. Cloud Comput. 11(1): 247-262 (2023)
[j39]Chun Mao
, Zhenyu Li
, Mingliang Zhang
, Yi Zhang
, Xiangyang Luo
:
A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments. IEEE Trans. Consumer Electron. 69(3): 568-580 (2023)
[j38]Jiawei Zhang
, Jinwei Wang
, Hao Wang
, Xiangyang Luo
:
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks. IEEE Trans. Circuits Syst. Video Technol. 33(2): 562-574 (2023)
[j37]Hansong Du
, Jiu-fen Liu
, Xiangyang Luo
, Yi Zhang
:
Extraction Method of Secret Message Based on Optimal Hypothesis Test. IEEE Trans. Dependable Secur. Comput. 20(6): 5265-5277 (2023)
[j36]Yuqian Ma
, Qingfeng Cheng
, Xiangyang Luo
:
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning. IEEE Trans. Inf. Forensics Secur. 18: 5876-5889 (2023)
[j35]Tong Qiao
, Jiasheng Wu, Ning Zheng
, Ming Xu
, Xiangyang Luo
:
FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing. IEEE Trans. Multim. 25: 7350-7363 (2023)
[j34]Shichang Ding
, Xiangyang Luo
, Jinwei Wang
, Xiaoming Fu
:
GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework. IEEE Trans. Netw. Sci. Eng. 10(6): 3543-3560 (2023)
[j33]Yang Yang
, Chunming Rong
, Xianghan Zheng, Hongju Cheng
, Victor Chang
, Xiangyang Luo
, Zuoyong Li
:
Time Controlled Expressive Predicate Query With Accountable Anonymity. IEEE Trans. Serv. Comput. 16(2): 1444-1457 (2023)- 2022
[j32]Fan Wu
, Xiong Li
, Xiangyang Luo, Ke Gu
:
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. J. Syst. Archit. 132: 102737 (2022)
[j31]Jian Chen, Hao-Tian Wu
, Lu Lu, Xiangyang Luo, Jiankun Hu:
Single underwater image haze removal with a learning-based approach to blurriness estimation. J. Vis. Commun. Image Represent. 89: 103656 (2022)
[j30]Jinwei Wang, Kehui Zeng, Bin Ma, Xiangyang Luo, Qilin Yin, Guangjie Liu, Sunil Kr. Jha
:
GAN-generated fake face detection via two-stream CNN with PRNU in the wild. Multim. Tools Appl. 81(29): 42527-42545 (2022)
[j29]Yuchen Sun
, Xiangyang Luo
, Han Wang, Zhaorui Ma:
A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic. Secur. Commun. Networks 2022: 3306098:1-3306098:12 (2022)
[j28]Xiaoshuai Wu
, Tong Qiao
, Yanli Chen
, Ming Xu
, Ning Zheng, Xiangyang Luo:
Sign steganography revisited with robust domain selection. Signal Process. 196: 108522 (2022)
[j27]Mingliang Zhang
, Zhenyu Li, Pei Zhang
, Yi Zhang, Xiangyang Luo:
A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks. Symmetry 14(1): 111 (2022)
[j26]Hao Wang
, Jinwei Wang
, Xiangyang Luo
, Yuhui Zheng
, Bin Ma
, Jinsheng Sun
, Sunil Kr. Jha
:
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4065-4080 (2022)
[j25]Haorui Wu, Xiaolong Li
, Xiangyang Luo
, Xinpeng Zhang
, Yao Zhao
:
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5989-6001 (2022)
[j24]Jinwei Wang
, Junjie Zhao
, Qilin Yin
, Xiangyang Luo
, Yuhui Zheng
, Yun-Qing Shi, Sunil Kr. Jha
:
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection. IEEE Trans. Multim. 24: 230-244 (2022)
[c11]Xiuting Wang, Xiangyang Luo, Shaoyong Du, Lingling Li, Yang Yang, Fenlin Liu:
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment. ICAIS (3) 2022: 663-677- 2021
[j23]Lingchen Zhao
, Shengshan Hu
, Qian Wang
, Jianlin Jiang
, Chao Shen, Xiangyang Luo
, Pengfei Hu
:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021)
[j22]Tong Qiao
, Xiangyang Luo
, Ting Wu, Ming Xu
, Zhenxing Qian
:
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images. IEEE Trans. Dependable Secur. Comput. 18(6): 2736-2751 (2021)
[j21]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun Qing Shi, Sunil Kr. Jha
:
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature. ACM Trans. Multim. Comput. Commun. Appl. 17(4): 138:1-138:18 (2021)
[c10]Zhenyu Li
, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors
:
Self-embedding watermarking method for G-code used in 3D printing. WIFS 2021: 1-6- 2020
[j20]Jinwei Wang, Qiye Ni, Guangjie Liu, Xiangyang Luo, Sunil Kr. Jha
:
Image splicing detection based on convolutional neural network with weight combination strategy. J. Inf. Secur. Appl. 54: 102523 (2020)
[j19]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha
:
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J. Real Time Image Process. 17(1): 7-16 (2020)
[j18]Yi Zhang, Xiangyang Luo, Xiaodong Zhu, Zhenyu Li, Adrian G. Bors
:
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes. J. Real Time Image Process. 17(1): 115-123 (2020)
[j17]Baojun Qi
, Chunfang Yang, Lei Tan, Xiangyang Luo
, Fenlin Liu:
A novel haze image steganography method via cover-source switching. J. Vis. Commun. Image Represent. 70: 102814 (2020)
[j16]Lei Tan, Chunfang Yang
, Fenlin Liu, Xiangyang Luo, Baojun Qi
, Zhenyu Li:
Steganalysis of homogeneous-representation based steganography for high dynamic range images. Multim. Tools Appl. 79(27-28): 20079-20105 (2020)
[j15]Jinwei Wang
, Hao Wang
, Jian Li
, Xiangyang Luo
, Yun-Qing Shi, Sunil Kr. Jha
:
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2736-2749 (2020)
[j14]Shuangke Wu, Yanjiao Chen
, Minghui Li, Xiangyang Luo
, Zhe Liu, Lan Liu:
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools. IEEE/ACM Trans. Netw. 28(2): 874-887 (2020)
2010 – 2019
- 2019
[j13]Qilin Yin
, Jinwei Wang, Xiangyang Luo, Jiangtao Zhai, Sunil Kr. Jha
, Yun-Qing Shi:
Quaternion Convolutional Neural Network for Color Image Classification and Forensics. IEEE Access 7: 20293-20301 (2019)
[j12]Hao Wang
, Jinwei Wang, Jiangtao Zhai, Xiangyang Luo:
Detection of Triple JPEG Compressed Color Images. IEEE Access 7: 113094-113102 (2019)
[j11]Xingxing Jia
, Daoshun Wang, Daxin Nie, Xiangyang Luo
, Jonathan Zheng Sun:
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Inf. Sci. 473: 13-30 (2019)
[j10]Jinwei Wang, Yangyang Li, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha
:
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness. J. Inf. Secur. Appl. 47: 353-362 (2019)
[j9]Jinwei Wang
, Ting Li, Xiangyang Luo
, Yun-Qing Shi, Sunil Kr. Jha
:
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain. IEEE Trans. Circuits Syst. Video Technol. 29(9): 2775-2785 (2019)
[j8]Qian Wang
, Jing Huang, Yanjiao Chen
, Cong Wang
, Fu Xiao
, Xiangyang Luo:
PROST: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation. IEEE Trans. Inf. Forensics Secur. 14(2): 374-386 (2019)
[j7]Shuangke Wu, Yanjiao Chen
, Qian Wang
, Minghui Li
, Cong Wang
, Xiangyang Luo
:
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction. IEEE Trans. Inf. Forensics Secur. 14(7): 1687-1701 (2019)
[j6]Tong Qiao
, Ran Shi
, Xiangyang Luo
, Ming Xu, Ning Zheng, Yiming Wu
:
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication. IEEE Trans. Multim. 21(5): 1077-1092 (2019)
[j5]Libing Wu
, Cong Quan, Chenliang Li
, Qian Wang
, Bolong Zheng, Xiangyang Luo:
A Context-Aware User-Item Representation Learning for Item Recommendation. ACM Trans. Inf. Syst. 37(2): 22:1-22:29 (2019)
[c9]Yuanyuan Ma, Xiangyang Luo, Zhenyu Li, Yi Zhang, Adrian G. Bors
:
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion. ACM TUR-C 2019: 66:1-66:5
[c8]Qian Wang
, Xiu Lin, Man Zhou
, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070
[i1]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo:
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection. CoRR abs/1910.13111 (2019)- 2018
[c7]Shengshan Hu
, Chengjun Cai
, Qian Wang
, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. INFOCOM 2018: 792-800- 2016
[j4]Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu:
Random table and hash coding-based binary code obfuscation against stack trace analysis. IET Inf. Secur. 10(1): 18-27 (2016)- 2015
[j3]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. KSII Trans. Internet Inf. Syst. 9(12): 5209-5228 (2015)- 2013
[j2]Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, Ruihui Zhu:
Steganalysis of a PVD-based content adaptive image steganography. Signal Process. 93(9): 2529-2538 (2013)
[c6]Zhenyu Li, Zongyun Hu, Xiangyang Luo, Bin Lu:
Embedding change rate estimation based on ensemble learning. IH&MMSec 2013: 77-84
2000 – 2009
- 2008
[j1]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu:
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. IEEE Trans. Inf. Forensics Secur. 3(4): 662-672 (2008)- 2007
[c5]Bin Lu, Fenlin Liu, Xin Ge, Bin Liu, Xiangyang Luo:
A Software Birthmark Based on Dynamic Opcode n-gram. ICSC 2007: 37-44- 2006
[c4]Fenlin Liu, Bin Lu, Xiangyang Luo:
A Chaos-Based Robust Software Watermarking. ISPEC 2006: 355-366
[c3]Bin Liu, Fenlin Liu, Bin Lu, Xiangyang Luo:
Real-Time Steganography in Compressed Video. MRCS 2006: 43-48- 2005
[c2]Xiangyang Luo, Bin Liu, Fenlin Liu:
Improved RS Method for Detection of LSB Steganography. ICCSA (2) 2005: 508-516
[c1]Xiangyang Luo, Bin Liu, Fenlin Liu:
Detecting LSB Steganography Based on Dynamic Masks. ISDA 2005: 251-255
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-04 01:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







