Xiangyang Luo
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Xiangyang Luo 001 (Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou, China)
- Xiangyang Luo 002 (Tsinghua University, Shenzhen, China)
Bibliography
2025
Fine-grained Multiple Supervisory Network for Multi-modal Manipulation Detecting and Grounding.
CoRR, August, 2025
CoRR, August, 2025
CanonSwap: High-Fidelity and Consistent Video Face Swapping via Canonical Space Modulation.
CoRR, July, 2025
HiHo: A Hierarchical and Homogenous Subgraph Learning Model for Knowledge Graph Relation Prediction.
Semantic Web, 2025
J. Inf. Secur. Appl., 2025
Int. J. Intell. Syst., 2025
From Crowds to Coordinates: A user density-distance dynamic transformation method for Telegram users geolocalization.
Comput. Networks, 2025
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025
Proceedings of the International Joint Conference on Neural Networks, 2025
STFTCodec: High-Fidelity Audio Compression through Time-Frequency Domain Representation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2025
2024
Cybersecur., December, 2024
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain.
Frontiers Comput. Sci., June, 2024
Neural Networks, 2024
TaReT: Temporal knowledge graph reasoning based on topology-aware dynamic relation graph and temporal fusion.
Inf. Process. Manag., 2024
A review of graph neural networks and pretrained language models for knowledge graph reasoning.
Neurocomputing, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
2023
Twitter user geolocation based on heterogeneous relationship modeling and representation learning.
Inf. Sci., November, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Int. J. Intell. Syst., December, 2022
IP-geolocater: a more reliable IP geolocation algorithm based on router error training.
Frontiers Comput. Sci., 2022
2021
Instant messaging user geolocating method based on multi-source information association.
Int. J. Sens. Networks, 2021
Research of Robust Video Object Tracking Algorithm Based on Jetson Nano Embedded Platform.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021
2020
Secur. Commun. Networks, 2020
A reversible database watermarking method non-redundancy shifting-based histogram gaps.
Int. J. Distributed Sens. Networks, 2020
2019
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Sensors, 2019
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
A Label-Specific Attention-Based Network with Regularized Loss for Multi-label Classification.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning, 2019
2018
J. Netw. Comput. Appl., 2018
2017
On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband.
J. Electronic Imaging, 2017
CoRR, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
2016
Sci. China Inf. Sci., 2016
2013
2005
Sci. China Ser. F Inf. Sci., 2005
2004
Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Information Hiding, 6th International Workshop, 2004