Xiangyang Luo

Orcid: 0000-0001-6062-2950

According to our database1, Xiangyang Luo authored at least 97 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CovLBCG: A Covert Communication Framework Using Live Broadcast Bullet Comment Game.
IEEE Trans. Games, September, 2025

Uniform Graph Pre-training and Prompting for Transferable Recommendation.
ACM Trans. Inf. Syst., July, 2025

Defense Against Adversarial Faces at the Source: Strengthened Faces Based on Hidden Disturbances.
IEEE Trans. Artif. Intell., July, 2025

LB3AS: Lightweight Blockchain-Assisted Anonymous Authentication Scheme for Fog-Cloud-Based Internet of Medical Things.
IEEE Internet Things J., June, 2025

Invisible DNN Watermarking Against Model Extraction Attack.
IEEE Trans. Cybern., February, 2025

Robust Image Watermarking With Synchronization Using Template Enhanced-Extracted Network.
IEEE Trans. Circuits Syst. Video Technol., February, 2025

Image Semantic Steganography: A Way to Hide Information in Semantic Communication.
IEEE Trans. Circuits Syst. Video Technol., February, 2025

An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones.
IEEE Trans. Netw. Sci. Eng., 2025

IPv6Landmarker: Enhancing IPv6 Street-Level Geolocation Through Network Landmark Mining and Targeted Updates.
IEEE Trans. Netw. Sci. Eng., 2025

CCIGeo: Cross-View and Cross-Day-Night Image Geo-Localization Using Daytime Image Supervision.
IEEE Trans. Multim., 2025

Robust Watermarking Based on Multi-Layer Watermark Feature Fusion.
IEEE Trans. Multim., 2025

CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones.
IEEE Trans. Inf. Forensics Secur., 2025

Generative Collision Attack on Deep Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2025

EIS-OBEA: Enhanced Image Steganalysis via Opposition-Based Evolutionary Algorithm.
IEEE Trans. Inf. Forensics Secur., 2025

Deepfake Detection and Localization Using Multi-View Inconsistency Measurement.
IEEE Trans. Dependable Secur. Comput., 2025

Fratricide! Hijacking in Android Multi-Window.
IEEE Trans. Dependable Secur. Comput., 2025

AIBW: Average Interval-Based Watermarking for Tracking Down Network Attacks.
IEEE Signal Process. Lett., 2025

Localization Algorithm Based on the Relationship Between Trapezoidal Trajectory and Energy Consumption of Mobile Anchor Nodes.
IEEE Internet Things J., 2025

Hidden AS link prediction based on random forest feature selection and GWO-XGBoost model.
Comput. Networks, 2025

Towards Accurate Social User Geolocation: Mean Shift, Incremental Learning and Graph Convolutional Networks.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025

Flow Matching Based Sequential Recommender Model.
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 2025

Mitigating Language Confusion through Inference-time Intervention.
Proceedings of the 31st International Conference on Computational Linguistics, 2025

AIGuard: A Benchmark and Lightweight Detection for E-commerce AIGC Risks.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

2024
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers.
IEEE/ACM Trans. Netw., December, 2024

Maximizing Contrast in XOR-Based Visual Cryptography Schemes.
IEEE Trans. Circuits Syst. Video Technol., December, 2024

A Covert Communication Method Based on Time Attributes Shifting of Online Video Bullet Comment.
IEEE Trans. Consumer Electron., November, 2024

FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024

6Subpattern: Target Generation Based on Subpattern Analysis for Internet-Wide IPv6 Scanning.
IEEE Trans. Netw. Serv. Manag., August, 2024

General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference.
IEEE Trans. Circuits Syst. Video Technol., June, 2024

Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Disentangle interest trend and diversity for sequential recommendation.
Inf. Process. Manag., March, 2024

CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images.
IEEE Trans. Cogn. Dev. Syst., February, 2024

Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles.
IEEE Trans. Serv. Comput., 2024

Deepfake Detection Fighting Against Noisy Label Attack.
IEEE Trans. Multim., 2024

Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024

Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
IEEE Trans. Inf. Forensics Secur., 2024

DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
IEEE Trans. Inf. Forensics Secur., 2024

Scalable Universal Adversarial Watermark Defending Against Facial Forgery.
IEEE Trans. Inf. Forensics Secur., 2024

A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping.
IEEE Trans. Dependable Secur. Comput., 2024

AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024

Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning.
IEEE Trans. Pattern Anal. Mach. Intell., 2024

GridShow: Omni Visual Generation.
CoRR, 2024

Efficient Sparse Attention needs Adaptive Token Release.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments.
IEEE Trans. Consumer Electron., August, 2023

A novel model watermarking for protecting generative adversarial network.
Comput. Secur., April, 2023

Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Time Controlled Expressive Predicate Query With Accountable Anonymity.
IEEE Trans. Serv. Comput., 2023

GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework.
IEEE Trans. Netw. Sci. Eng., 2023

FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing.
IEEE Trans. Multim., 2023

2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Extraction Method of Secret Message Based on Optimal Hypothesis Test.
IEEE Trans. Dependable Secur. Comput., 2023

Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

2022
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022

General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design.
IEEE Trans. Circuits Syst. Video Technol., 2022

Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks.
Symmetry, 2022

Sign steganography revisited with robust domain selection.
Signal Process., 2022

A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic.
Secur. Commun. Networks, 2022

GAN-generated fake face detection via two-stream CNN with PRNU in the wild.
Multim. Tools Appl., 2022

Single underwater image haze removal with a learning-based approach to blurriness estimation.
J. Vis. Commun. Image Represent., 2022

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022

A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021

Self-embedding watermarking method for G-code used in 3D printing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

2020
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools.
IEEE/ACM Trans. Netw., 2020

Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020

Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020

A novel haze image steganography method via cover-source switching.
J. Vis. Commun. Image Represent., 2020

Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes.
J. Real Time Image Process., 2020

Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020

Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020

2019
A Context-Aware User-Item Representation Learning for Item Recommendation.
ACM Trans. Inf. Syst., 2019

Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019

Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem.
Inf. Sci., 2019

Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

Detection of Triple JPEG Compressed Color Images.
IEEE Access, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2016
Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016

2015
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015

2013
Steganalysis of a PVD-based content adaptive image steganography.
Signal Process., 2013

Embedding change rate estimation based on ensemble learning.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2008
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits.
IEEE Trans. Inf. Forensics Secur., 2008

2007
A Software Birthmark Based on Dynamic Opcode n-gram.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

2006
Real-Time Steganography in Compressed Video.
Proceedings of the Multimedia Content Representation, 2006

A Chaos-Based Robust Software Watermarking.
Proceedings of the Information Security Practice and Experience, 2006

2005
Detecting LSB Steganography Based on Dynamic Masks.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Improved RS Method for Detection of LSB Steganography.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...