Lingyun Xiang

Orcid: 0000-0001-7396-0908

According to our database1, Lingyun Xiang authored at least 35 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Linguistic Steganography: Hiding Information in Syntax Space.
IEEE Signal Process. Lett., 2024

2023
Deep feature fusion for cold-start spam review detection.
J. Supercomput., 2023

CPG-LS: Causal Perception Guided Linguistic Steganography.
IEEE Signal Process. Lett., 2023

PNG-Stega: Progressive Non-Autoregressive Generative Linguistic Steganography.
IEEE Signal Process. Lett., 2023

A General Linguistic Steganalysis Framework Using Multi-Task Learning.
Comput. Syst. Sci. Eng., 2023

2022
Aggregating Local and Global Text Features for Linguistic Steganalysis.
IEEE Signal Process. Lett., 2022

Generative Linguistic Steganography: A Comprehensive Review.
KSII Trans. Internet Inf. Syst., 2022

Learning interactive multi-object segmentation through appearance embedding and spatial attention.
IET Image Process., 2022

2021
Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility.
IEEE Signal Process. Lett., 2021

Efficiency and safety assessment of suburban highway access management.
Int. J. Embed. Syst., 2021

2020
Coverless real-time image information hiding based on image block matching and dense convolutional network.
J. Real Time Image Process., 2020

Robust Manifold Embedding for Face Recognition.
IEEE Access, 2020

2019
An improved linear kernel for complementary maximal strip recovery: Simpler and smaller.
Theor. Comput. Sci., 2019

Discrete Multi-graph Hashing for Large-Scale Visual Search.
Neural Process. Lett., 2019

Color image steganalysis based on channel gradient correlation.
Int. J. Distributed Sens. Networks, 2019

A word-frequency-preserving steganographic method based on synonym substitution.
Int. J. Comput. Sci. Eng., 2019

User-Oriented Paraphrase Generation With Keywords Controlled Network.
IEEE Access, 2019

A Smart Mobile Diagnosis System for Citrus Diseases Based on Densely Connected Convolutional Networks.
IEEE Access, 2019

2018
A linguistic steganography based on word indexing compression and candidate selection.
Multim. Tools Appl., 2018

TUMK-ELM: A Fast Unsupervised Heterogeneous Data Learning Approach.
IEEE Access, 2018

A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution.
IEEE Access, 2018

Two-stage Unsupervised Multiple Kernel Extreme Learning Machine.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Unsupervised Absent Multiple Kernel Extreme Learning Machine.
Proceedings of ELM 2018, 2018

2017
A Novel Linguistic Steganography Based on Synonym Run-Length Encoding.
IEICE Trans. Inf. Syst., 2017

A 42k Kernel for the Complementary Maximal Strip Recovery Problem.
Proceedings of the Frontiers in Algorithmics - 11th International Workshop, 2017

2016
An Adaptive Steganographic Method Using Additive Noise.
J. Comput., 2016

2015
Histogram shifting based reversible data hiding method using directed-prediction scheme.
Multim. Tools Appl., 2015

2014
Linguistic steganalysis using the features derived from synonym frequency.
Multim. Tools Appl., 2014

2013
Attribute-based knowledge transfer learning for human pose estimation.
Neurocomputing, 2013

A Self-Adaptive Regression-Based Multivariate Data Compression Scheme with Error Bound in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Low power logic BIST with high test effectiveness.
IEICE Electron. Express, 2013

2008
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Research on Steganalysis for Text Steganography Based on Font Format.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...