Xiangyang Luo

Orcid: 0000-0003-3225-4649

According to our database1, Xiangyang Luo authored at least 97 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Twitter User Geolocation Based on Location Feature Enhancement.
ACM Trans. Web, May, 2025

New Framework of Robust Image Encryption.
ACM Trans. Multim. Comput. Commun. Appl., March, 2025

Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025

Uncovering API-Scope Misalignment in the App-in-App Ecosystem.
Proc. ACM Softw. Eng., 2025

MVC-Corr: An accurate and efficient flow correlation method based on multi-view fusion and contrast augmentation.
Comput. Networks, 2025

RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs.
Int. J. Comput. Vis., November, 2024

WF3A: A N-shot website fingerprinting with effective fusion feature attention.
Comput. Secur., 2024

HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Comput. Secur., 2024

HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch.
Comput. Networks, 2024

Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023

UGCC: Social Media User Geolocation via Cyclic Coupling.
IEEE Trans. Big Data, August, 2023

CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment.
IEEE Trans. Circuits Syst. Video Technol., May, 2023

Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023

Improving CoatNet for Spatial and JPEG Domain Steganalysis.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
DR-NET: a novel mobile anchor-assisted localization method based on the density of nodes distribution.
Wirel. Networks, 2022

Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes.
ACM Trans. Multim. Comput. Commun. Appl., 2022

A Group Covert Communication Method of Digital Currency Based on Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2022

A Novel Covert Communication Method Based on Bitcoin Transaction.
IEEE Trans. Ind. Informatics, 2022

Inverse Interpolation and Its Application in Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

Steganographic key recovery for adaptive steganography under "known-message attacks".
Multim. Tools Appl., 2022

A Robust Image Steganographic Scheme against General Scaling Attacks.
CoRR, 2022

HeteroTiC: A robust network flow watermarking based on heterogeneous time channels.
Comput. Networks, 2022

Watch Out for Race Condition Attacks When Using Android External Storage.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
LandmarkMiner: Street-level Network Landmarks Mining Method for IP Geolocation.
ACM Trans. Internet Things, 2021

Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis.
IEEE Trans. Comput. Soc. Syst., 2021

PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021

Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models.
Secur. Commun. Networks, 2021

Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes.
Secur. Commun. Networks, 2021

A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers.
Secur. Commun. Networks, 2021

Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021

A lightweight 3D convolutional neural network for deepfake detection.
Int. J. Intell. Syst., 2021

GCN-Geo: A Graph Convolution Network-based Fine-grained IP Geolocation System.
CoRR, 2021

Imperceptible and Reliable Adversarial Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels.
IEEE Trans. Circuits Syst. Video Technol., 2020

Anti-steganalysis for image on convolutional neural networks.
Multim. Tools Appl., 2020

Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients.
J. Ambient Intell. Humaniz. Comput., 2020

An overview of microblog user geolocation methods.
Inf. Process. Manag., 2020

NEXT: a neural network framework for next POI recommendation.
Frontiers Comput. Sci., 2020

Twitter User Location Inference Based on Representation Learning and Label Propagation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction.
IEEE Trans. Circuits Syst. Video Technol., 2019

Steganalysis aided by fragile detection of image manipulations.
Multim. Tools Appl., 2019

Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes.
J. Univers. Comput. Sci., 2019

Color image steganalysis based on channel gradient correlation.
Int. J. Distributed Sens. Networks, 2019

Delay-Distance Correlation Study for IP Geolocation.
CoRR, 2019

IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019

A localization and tracking scheme for target gangs based on big data of Wi-Fi locations.
Clust. Comput., 2019

Street-Level Geolocation Based on Router Multilevel Partitioning.
IEEE Access, 2019

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019

A High Completeness PoP Partition Algorithm for IP Geolocation.
IEEE Access, 2019

Selective Learning Confusion Class for Text-Based CAPTCHA Recognition.
IEEE Access, 2019

2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018

Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018

On the fault-tolerant performance for a class of robust image steganography.
Signal Process., 2018

Big Data Analytics for Information Security.
Secur. Commun. Networks, 2018

Street-Level Landmark Evaluation Based on Nearest Routers.
Secur. Commun. Networks, 2018

Reliable steganalysis of HUGO steganography based on partially known plaintext.
Multim. Tools Appl., 2018

Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018

Quantitative steganalysis of JPEG additive steganography based on boundary effect.
J. Electronic Imaging, 2018

Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018

Extracting hidden messages of MLSB steganography based on optimal stego subset.
Sci. China Inf. Sci., 2018

City-Level IP Geolocation Algorithm Based on PoP Network Topology.
IEEE Access, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A Survey on Breaking Technique of Text-Based CAPTCHA.
Secur. Commun. Networks, 2017

Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017

Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017

Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017

Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation.
Int. J. Digit. Crime Forensics, 2017

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Steganalysis Feature Subspace Selection Based on Fisher Criterion.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

IP Geolocation Base on Local Delay Distribution Similarity.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Secur. Commun. Networks, 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multim. Tools Appl., 2016

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016

Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling.
Int. J. Digit. Crime Forensics, 2016

A landmark calibration-based IP geolocation approach.
EURASIP J. Inf. Secur., 2016

2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features.
Multim. Tools Appl., 2015

A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix.
Digit. Investig., 2015

City-Level Geolocation Based on Routing Feature.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Recognizing F5-like Stego images from Multi-class JPEG Stego Images.
KSII Trans. Internet Inf. Syst., 2014

Selection of image features for steganalysis based on the Fisher criterion.
Digit. Investig., 2014

2013
Steganalysis of F5-like steganography based on selection of joint distribution features.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

2012
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012

2011
Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP.
Int. J. Multim. Intell. Secur., 2011

2008
A review on blind detection for image steganography.
Signal Process., 2008

2007
Secret Key Estimation for Image Sequential Steganograph in Transform Domain.
Proceedings of the Global Communications Conference, 2007

2006
Fast and Blind Restoration Scheme for the Initial States of LFSRs.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Improved Secret Key Estimation Method for Sequential Steganography.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006


  Loading...