Xiangyang Luo
Orcid: 0000-0003-3225-4649
According to our database1,
Xiangyang Luo
authored at least 97 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
ACM Trans. Web, May, 2025
ACM Trans. Multim. Comput. Commun. Appl., March, 2025
Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025
Proc. ACM Softw. Eng., 2025
MVC-Corr: An accurate and efficient flow correlation method based on multi-view fusion and contrast augmentation.
Comput. Networks, 2025
RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Int. J. Comput. Vis., November, 2024
Comput. Secur., 2024
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Comput. Secur., 2024
HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch.
Comput. Networks, 2024
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023
IEEE Trans. Big Data, August, 2023
CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment.
IEEE Trans. Circuits Syst. Video Technol., May, 2023
Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
DR-NET: a novel mobile anchor-assisted localization method based on the density of nodes distribution.
Wirel. Networks, 2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
A Group Covert Communication Method of Digital Currency Based on Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network.
IEEE Trans. Circuits Syst. Video Technol., 2022
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022
Steganographic key recovery for adaptive steganography under "known-message attacks".
Multim. Tools Appl., 2022
Comput. Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
ACM Trans. Internet Things, 2021
Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis.
IEEE Trans. Comput. Soc. Syst., 2021
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021
Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers.
Secur. Commun. Networks, 2021
Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021
Int. J. Intell. Syst., 2021
CoRR, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Multim. Tools Appl., 2020
Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients.
J. Ambient Intell. Humaniz. Comput., 2020
Frontiers Comput. Sci., 2020
Twitter User Location Inference Based on Representation Learning and Label Propagation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
2019
IEEE Trans. Circuits Syst. Video Technol., 2019
Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction.
IEEE Trans. Circuits Syst. Video Technol., 2019
Multim. Tools Appl., 2019
J. Univers. Comput. Sci., 2019
Int. J. Distributed Sens. Networks, 2019
IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019
A localization and tracking scheme for target gangs based on big data of Wi-Fi locations.
Clust. Comput., 2019
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019
IEEE Access, 2019
2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018
Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018
Signal Process., 2018
Secur. Commun. Networks, 2018
Multim. Tools Appl., 2018
Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018
J. Electronic Imaging, 2018
Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018
Sci. China Inf. Sci., 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017
Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation.
Int. J. Digit. Crime Forensics, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016
Int. J. Digit. Crime Forensics, 2016
2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features.
Multim. Tools Appl., 2015
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix.
Digit. Investig., 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
KSII Trans. Internet Inf. Syst., 2014
Digit. Investig., 2014
2013
Steganalysis of F5-like steganography based on selection of joint distribution features.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013
2012
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012
2011
Int. J. Multim. Intell. Secur., 2011
2008
2007
Proceedings of the Global Communications Conference, 2007
2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006