Xiangyang Luo
Orcid: 0000-0001-6062-2950
According to our database1,
Xiangyang Luo
authored at least 97 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Games, September, 2025
ACM Trans. Inf. Syst., July, 2025
Defense Against Adversarial Faces at the Source: Strengthened Faces Based on Hidden Disturbances.
IEEE Trans. Artif. Intell., July, 2025
LB3AS: Lightweight Blockchain-Assisted Anonymous Authentication Scheme for Fog-Cloud-Based Internet of Medical Things.
IEEE Internet Things J., June, 2025
IEEE Trans. Cybern., February, 2025
Robust Image Watermarking With Synchronization Using Template Enhanced-Extracted Network.
IEEE Trans. Circuits Syst. Video Technol., February, 2025
IEEE Trans. Circuits Syst. Video Technol., February, 2025
An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones.
IEEE Trans. Netw. Sci. Eng., 2025
IPv6Landmarker: Enhancing IPv6 Street-Level Geolocation Through Network Landmark Mining and Targeted Updates.
IEEE Trans. Netw. Sci. Eng., 2025
CCIGeo: Cross-View and Cross-Day-Night Image Geo-Localization Using Daytime Image Supervision.
IEEE Trans. Multim., 2025
IEEE Trans. Multim., 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Signal Process. Lett., 2025
Localization Algorithm Based on the Relationship Between Trapezoidal Trajectory and Energy Consumption of Mobile Anchor Nodes.
IEEE Internet Things J., 2025
Hidden AS link prediction based on random forest feature selection and GWO-XGBoost model.
Comput. Networks, 2025
Towards Accurate Social User Geolocation: Mean Shift, Incremental Learning and Graph Convolutional Networks.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 2025
Proceedings of the 31st International Conference on Computational Linguistics, 2025
Proceedings of the Findings of the Association for Computational Linguistics, 2025
2024
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers.
IEEE/ACM Trans. Netw., December, 2024
IEEE Trans. Circuits Syst. Video Technol., December, 2024
A Covert Communication Method Based on Time Attributes Shifting of Online Video Bullet Comment.
IEEE Trans. Consumer Electron., November, 2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024
6Subpattern: Target Generation Based on Subpattern Analysis for Internet-Wide IPv6 Scanning.
IEEE Trans. Netw. Serv. Manag., August, 2024
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference.
IEEE Trans. Circuits Syst. Video Technol., June, 2024
Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation.
IEEE Trans. Circuits Syst. Video Technol., March, 2024
Inf. Process. Manag., March, 2024
CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images.
IEEE Trans. Cogn. Dev. Syst., February, 2024
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles.
IEEE Trans. Serv. Comput., 2024
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping.
IEEE Trans. Dependable Secur. Comput., 2024
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Pattern Anal. Mach. Intell., 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments.
IEEE Trans. Consumer Electron., August, 2023
Comput. Secur., April, 2023
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks.
IEEE Trans. Circuits Syst. Video Technol., February, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Multim., 2023
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023
2022
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design.
IEEE Trans. Circuits Syst. Video Technol., 2022
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks.
Symmetry, 2022
A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic.
Secur. Commun. Networks, 2022
Multim. Tools Appl., 2022
Single underwater image haze removal with a learning-based approach to blurriness estimation.
J. Vis. Commun. Image Represent., 2022
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
2020
IEEE/ACM Trans. Netw., 2020
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020
Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020
J. Vis. Commun. Image Represent., 2020
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes.
J. Real Time Image Process., 2020
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020
Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020
2019
ACM Trans. Inf. Syst., 2019
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019
IEEE Trans. Inf. Forensics Secur., 2019
<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019
A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem.
Inf. Sci., 2019
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019
Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2016
Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016
2015
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015
2013
Signal Process., 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
2008
IEEE Trans. Inf. Forensics Secur., 2008
2007
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007
2006
Proceedings of the Multimedia Content Representation, 2006
Proceedings of the Information Security Practice and Experience, 2006
2005
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005
Proceedings of the Computational Science and Its Applications, 2005