Xin Liao

Orcid: 0000-0002-9131-0578

Affiliations:
  • Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
  • University of Maryland, College Park, MD, USA (2016-2017)
  • Beijing University of Posts and Telecommunications, China (PhD 2012)


According to our database1, Xin Liao authored at least 94 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Video Frame Interpolation via Fast Bidirectional 3D Correlation Volume.
ACM Trans. Multim. Comput. Commun. Appl., May, 2025

WaveRecovery: Screen-Shooting Watermarking Based on Wavelet and Recovery.
IEEE Trans. Circuits Syst. Video Technol., April, 2025

DGeC: Dynamically and Globally Enhanced Convolution.
IEEE Trans. Artif. Intell., April, 2025

Sim-to-Real: An Unsupervised Noise Layer for Screen-Camera Watermarking Robustness.
CoRR, April, 2025

PRest-Net: Multi-domain Probability Estimation Network for Robust Image Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., March, 2025

Deepfake Detection: A Comprehensive Survey from the Reliability Perspective.
ACM Comput. Surv., March, 2025

Spatiotemporal Inconsistency Learning and Interactive Fusion for Deepfake Video Detection.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025

Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency.
IEEE Trans. Artif. Intell., January, 2025

LDR-Net: A Novel Framework for AI-generated Image Detection via Localized Discrepancy Representation.
CoRR, January, 2025

Efficient Hierarchical Feature Collaboration Transformer for Image Inpainting.
IEEE Trans. Multim., 2025

ADA-FInfer: Inferring Face Representations From Adaptive Select Frames for High-Visual-Quality Deepfake Detection.
IEEE Trans. Dependable Secur. Comput., 2025

Color Image Steganography Using Generative Adversarial Networks with a Phased Training Strategy.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025

2024
Segmented Hash-Based Privacy-Preserving Image Retrieval Scheme in Cloud-Assisted IoT.
IEEE Internet Things J., November, 2024

Face Forgery Detection via Multi-Feature Fusion and Local Enhancement.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

Vocoder Detection of Spoofing Speech Based on GAN Fingerprints and Domain Generalization.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024

Amount-Based Covert Communication Over Blockchain.
IEEE Trans. Netw. Serv. Manag., June, 2024

Generative Steganography via Live Comments on Streaming Video Frames.
IEEE Trans. Comput. Soc. Syst., June, 2024

A visually secure image encryption algorithm based on block compressive sensing and deep neural networks.
Multim. Tools Appl., March, 2024

A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system.
Multim. Tools Appl., January, 2024

Screen-Shooting Resistant Watermarking With Grayscale Deviation Simulation.
IEEE Trans. Multim., 2024

Image Dehazing Assessment: A Real-World Dataset and a Haze Density-Aware Criteria.
IEEE Trans. Multim., 2024

Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping.
IEEE Trans. Inf. Forensics Secur., 2024

Multi-scale noise-guided progressive network for image splicing detection and localization.
Expert Syst. Appl., 2024

Adaptive Learning of Consistency and Inconsistency Information for Fake News Detection.
CoRR, 2024

SafePaint: Anti-forensic Image Inpainting with Domain Adaptation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

YOLO-DC: Enhancing object detection with deformable convolutions and contextual mechanism.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2024

Dual Motion Attention and Enhanced Knowledge Distillation for Video Frame Interpolation.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2024

Compressed Deepfake Video Detection Based on 3D Spatiotemporal Trajectories.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2024

SAMIF: Adapting Segment Anything Model for Image Inpainting Forensics.
Proceedings of the Computer Vision - ACCV 2024, 2024

2023
FAMM: Facial Muscle Motions for Detecting Compressed Deepfake Videos Over Social Networks.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Identification of image global processing operator chain based on feature decoupling.
Inf. Sci., August, 2023

ACGIS: Adversarial Cover Generator for Image Steganography with Noise Residuals Features-Preserving.
Signal Process. Image Commun., April, 2023

Efficient color image encryption by color-grayscale conversion based on steganography.
Multim. Tools Appl., March, 2023

SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Image Operation Chain Detection with Machine Translation Framework.
IEEE Trans. Multim., 2023

Multi-Dimensional Attention With Similarity Constraint for Weakly-Supervised Temporal Action Localization.
IEEE Trans. Multim., 2023

A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system.
Multim. Tools Appl., 2023

Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces.
CoRR, 2023

CTP-Net: Character Texture Perception Network for Document Image Forgery Localization.
CoRR, 2023

Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection.
CoRR, 2023

DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection.
CoRR, 2023

A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

2022
Channel Attention Image Steganography With Generative Adversarial Networks.
IEEE Trans. Netw. Sci. Eng., 2022

PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2022

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features.
IEEE Trans. Dependable Secur. Comput., 2022

Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Exploring Feature Coupling for Multiple Operations Type and Order Detection.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Image source identification with known post-processed based on convolutional neural network.
Signal Process. Image Commun., 2021

Identifying tampering operations in image operator chains based on decision fusion.
Signal Process. Image Commun., 2021

Resampling parameter estimation via dual-filtering based convolutional neural network.
Multim. Syst., 2021

GIFMarking: The robust watermarking for animated GIF based deep learning.
J. Vis. Commun. Image Represent., 2021

Visually meaningful image encryption based on universal embedding model.
Inf. Sci., 2021

Using M-ary decomposition and virtual bits for visually meaningful image encryption.
Inf. Sci., 2021

First step towards parameters estimation of image operator chain.
Inf. Sci., 2021

An Efficient Paper Anti-Counterfeiting Method Based on Microstructure Orientation Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
A New Payload Partition Strategy in Color Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

An embedding strategy on fusing multiple image features for data hiding in multiple images.
J. Vis. Commun. Image Represent., 2020

Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network.
IEEE J. Sel. Top. Signal Process., 2020

Constructing 1-resilient rotation symmetric functions over 픽<sub>p</sub> with q variables through special orthogonal arrays.
Adv. Math. Commun., 2020

A Framework for Parameters Estimation of Image Operator Chain.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
High-fidelity reversible data hiding by Quadtree-based pixel value ordering.
Multim. Tools Appl., 2019

Real-time detecting one specific tampering operation in multiple operator chains.
J. Real Time Image Process., 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018

New cubic reference table based image steganography.
Multim. Tools Appl., 2018

Medical JPEG image steganography based on preserving inter-block dependencies.
Comput. Electr. Eng., 2018

Two Embedding Strategies for Payload Distribution in Multiple Images Steganography.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Detectability of the Image Operation Order: Upsampling and Mean Filtering.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Data embedding in digital images using critical functions.
Signal Process. Image Commun., 2017

Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform.
Multim. Tools Appl., 2017

A game-theoretic method for designing distortion function in spatial steganography.
Multim. Tools Appl., 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Game-Theoretic Model for Content-Adaptive Image Steganography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Improved CMD Adaptive Image Steganography Method.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Content-adaptive steganalysis for color images.
Secur. Commun. Networks, 2016

2015
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels.
J. Vis. Commun. Image Represent., 2015

Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Improved WOW Adaptive Image Steganography Method.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
Quantum Steganography with High Efficiency with Noisy Depolarizing Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Improving the Adaptive Steganographic Methods Based on Modulus Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

New Construction of Symmetric Orthogonal Arrays of Strength <i>t</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function.
Fundam. Informaticae, 2012

2011
A steganographic method for digital images with four-pixel differencing and modified LSB substitution.
J. Vis. Commun. Image Represent., 2011

Distributed Steganography.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Multi-party covert communication with steganography and quantum secret sharing.
J. Syst. Softw., 2010

2008
Embedding in Two Least Significant Bits with Wet Paper Coding.
IACR Cryptol. ePrint Arch., 2008


  Loading...