Xiaolong Liu

Orcid: 0000-0001-7772-9607

Affiliations:
  • Fujian Agriculture and Forestry University, College of Computer and Information Sciences, Fuzhou, China
  • National Chiao Tung University, Department of Computer Science, Hsinchu, Taiwan (PhD 2016)
  • Providence University, Department of Computer Science and Information Management, Taichung, Taiwan (former)


According to our database1, Xiaolong Liu authored at least 27 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
BHI: Embedded invisible watermark as adversarial example based on Basin-Hopping improvement.
Inf. Sci., September, 2023

2022
Visual image encryption scheme based on vector quantization and content transform.
Multim. Tools Appl., 2022

Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm.
Frontiers Comput. Sci., 2022

Covert Communication and Image Authentication Algorithm Based on Adversarial Examples.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

2021
A Survey of Adversarial Examples and Deep Learning Based Data Hiding.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021

2020
Automatic cloud service testing and bottleneck detection system with scaling recommendation.
Concurr. Comput. Pract. Exp., 2020

2019
Elastic and cost-effective data carrier architecture for smart contract in blockchain.
Future Gener. Comput. Syst., 2019

Joint Data Hiding and Compression Scheme Based on Modified BTC and Image Inpainting.
IEEE Access, 2019

LSB-Based Visual Image Encryption Scheme in Cloud Environment.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Comprehensive Evaluation of Large-Scale Parallel Matrix Factorization Algorithms.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Blind Dual Watermarking for Color Images' Authentication and Copyright Protection.
IEEE Trans. Circuits Syst. Video Technol., 2018

Distributed Testing System for Web Service Based on Crowdsourcing.
Complex., 2018

A Complete System for Analysis of Video Lecture Based on Eye Tracking.
IEEE Access, 2018

Exploring Students' Behaviors in Editing Learning Environment.
Proceedings of the Intelligent Tutoring Systems - 14th International Conference, 2018

2017
Eye Tracking Based Control System for Natural Human-Computer Interaction.
Comput. Intell. Neurosci., 2017

Cloud Resource Management With Turnaround Time Driven Auto-Scaling.
IEEE Access, 2017

2016
A Survey of Fragile Watermarking-based Image Authentication Techniques.
J. Inf. Hiding Multim. Signal Process., 2016

A file-deduplicated private cloud storage service with CDMI standard.
Comput. Stand. Interfaces, 2016

A plug-and-work tool for cloud system reconfiguration with single command.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Knee Point-Driven Bottleneck Detection Algorithm for Cloud Service System.
Proceedings of the Web Technologies and Applications, 2016

2015
A novel reversible data hiding scheme based on AMBTC compression technique.
Multim. Tools Appl., 2015

Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping.
Inf. Sci., 2015

Fragile Watermarking-Based Authentication Scheme for Demosaicked Images.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Auto-Scaling Mechanism for Cloud Resource Management Based on Client-Side Turnaround Time.
Proceedings of the Genetic and Evolutionary Computing, 2015

An Architecture for Cloud Service Testing and Real Time Management.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
An Optimal Modification BTC Scheme Based on Binary Search Tree.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2012
A Reversible Data Hiding Scheme for Block Truncation Compressions Based on Histogram Modification.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012


  Loading...