Xin Liao

Orcid: 0000-0002-9131-0578

According to our database1, Xin Liao authored at least 90 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Time-dependent reliability-based design optimization of main shaft bearings in wind turbines involving mixed-integer variables.
Reliab. Eng. Syst. Saf., March, 2024

A visually secure image encryption algorithm based on block compressive sensing and deep neural networks.
Multim. Tools Appl., March, 2024

A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system.
Multim. Tools Appl., January, 2024

Image Dehazing Assessment: A Real-World Dataset and a Haze Density-Aware Criteria.
IEEE Trans. Multim., 2024

VLM-CPL: Consensus Pseudo Labels from Vision-Language Models for Human Annotation-Free Pathological Image Classification.
CoRR, 2024

Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces.
CoRR, 2024

2023
FAMM: Facial Muscle Motions for Detecting Compressed Deepfake Videos Over Social Networks.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

HAMIL: High-Resolution Activation Maps and Interleaved Learning for Weakly Supervised Segmentation of Histopathological Images.
IEEE Trans. Medical Imaging, October, 2023

Identification of image global processing operator chain based on feature decoupling.
Inf. Sci., August, 2023

DBGRU-SE: predicting drug-drug interactions based on double BiGRU and squeeze-and-excitation attention mechanism.
Briefings Bioinform., July, 2023

ACGIS: Adversarial Cover Generator for Image Steganography with Noise Residuals Features-Preserving.
Signal Process. Image Commun., April, 2023

Efficient color image encryption by color-grayscale conversion based on steganography.
Multim. Tools Appl., March, 2023

Superconvergence analysis of a linearized energy-conservative Galerkin method for the nonlinear Schrödinger equation with wave operator.
Comput. Math. Appl., March, 2023

SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Image Operation Chain Detection with Machine Translation Framework.
IEEE Trans. Multim., 2023

Multi-Dimensional Attention With Similarity Constraint for Weakly-Supervised Temporal Action Localization.
IEEE Trans. Multim., 2023

A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system.
Multim. Tools Appl., 2023

Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces.
CoRR, 2023

CTP-Net: Character Texture Perception Network for Document Image Forgery Localization.
CoRR, 2023

Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection.
CoRR, 2023

DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection.
CoRR, 2023

A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Semi-supervised Pathological Image Segmentation via Cross Distillation of Multiple Attentions.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

2022
Channel Attention Image Steganography With Generative Adversarial Networks.
IEEE Trans. Netw. Sci. Eng., 2022

PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2022

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features.
IEEE Trans. Dependable Secur. Comput., 2022

Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Deformation Characteristics of Soil Layers and Diaphragm Walls during Deep Foundation Pit Excavation: Simulation Verification and Parameter Analysis.
Symmetry, 2022

A novel deep learning-based method for COVID-19 pneumonia detection from CT images.
BMC Medical Informatics Decis. Mak., 2022

Building a predictive model to identify clinical indicators for COVID-19 using machine learning method.
Medical Biol. Eng. Comput., 2022

A Particle Swarm with Local Decision Algorithm for Functional Distributed Constraint Optimization Problems.
Int. J. Pattern Recognit. Artif. Intell., 2022

Higher-Order Belief Propagation Correction Decoder for Polar Codes.
Entropy, 2022

A dual-population search differential evolution algorithm for functional distributed constraint optimization problems.
Ann. Math. Artif. Intell., 2022

Exploring Feature Coupling for Multiple Operations Type and Order Detection.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

River Turbidity Monitoring Based on Semi-supervised Transfer Learning.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Image source identification with known post-processed based on convolutional neural network.
Signal Process. Image Commun., 2021

Identifying tampering operations in image operator chains based on decision fusion.
Signal Process. Image Commun., 2021

Resampling parameter estimation via dual-filtering based convolutional neural network.
Multim. Syst., 2021

GIFMarking: The robust watermarking for animated GIF based deep learning.
J. Vis. Commun. Image Represent., 2021

Visually meaningful image encryption based on universal embedding model.
Inf. Sci., 2021

Using M-ary decomposition and virtual bits for visually meaningful image encryption.
Inf. Sci., 2021

First step towards parameters estimation of image operator chain.
Inf. Sci., 2021

An Efficient Paper Anti-Counterfeiting Method Based on Microstructure Orientation Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
A New Payload Partition Strategy in Color Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

An embedding strategy on fusing multiple image features for data hiding in multiple images.
J. Vis. Commun. Image Represent., 2020

Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network.
IEEE J. Sel. Top. Signal Process., 2020

Constructing 1-resilient rotation symmetric functions over 픽<sub>p</sub> with q variables through special orthogonal arrays.
Adv. Math. Commun., 2020

A Framework for Parameters Estimation of Image Operator Chain.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
High-fidelity reversible data hiding by Quadtree-based pixel value ordering.
Multim. Tools Appl., 2019

Real-time detecting one specific tampering operation in multiple operator chains.
J. Real Time Image Process., 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018

New cubic reference table based image steganography.
Multim. Tools Appl., 2018

分布式工作流环境下角色匹配的访问控制模型 (Role Matching Access Control Model for Distributed Workflow).
计算机科学, 2018

Medical JPEG image steganography based on preserving inter-block dependencies.
Comput. Electr. Eng., 2018

Two Embedding Strategies for Payload Distribution in Multiple Images Steganography.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Detectability of the Image Operation Order: Upsampling and Mean Filtering.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Data embedding in digital images using critical functions.
Signal Process. Image Commun., 2017

Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform.
Multim. Tools Appl., 2017

A game-theoretic method for designing distortion function in spatial steganography.
Multim. Tools Appl., 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Game-Theoretic Model for Content-Adaptive Image Steganography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Improved CMD Adaptive Image Steganography Method.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Content-adaptive steganalysis for color images.
Secur. Commun. Networks, 2016

A new nonconforming mixed finite element scheme for second order eigenvalue problem.
Appl. Math. Comput., 2016

Superconvergence analysis of conforming finite element method for nonlinear Schrödinger equation.
Appl. Math. Comput., 2016

2015
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels.
J. Vis. Commun. Image Represent., 2015

Nonconforming finite element analysis for Poisson eigenvalue problem.
Comput. Math. Appl., 2015

Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Improved WOW Adaptive Image Steganography Method.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
The lowest order characteristic mixed finite element scheme for convection-dominated diffusion problem.
Comput. Math. Appl., 2014

2013
Tail Properties and Asymptotic Expansions for the Maximum of the Logarithmic Skew-Normal Distribution.
J. Appl. Probab., 2013

Quantum Steganography with High Efficiency with Noisy Depolarizing Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Improving the Adaptive Steganographic Methods Based on Modulus Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

New Construction of Symmetric Orthogonal Arrays of Strength <i>t</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function.
Fundam. Informaticae, 2012

Reducing Scalability Collapse via Requester-Based Locking on Multicore Systems.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

2011
A steganographic method for digital images with four-pixel differencing and modified LSB substitution.
J. Vis. Commun. Image Represent., 2011

Distributed Steganography.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Multi-party covert communication with steganography and quantum secret sharing.
J. Syst. Softw., 2010

Research on collaborative design platform of Launch Vehicle based on desktop grid.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
Queuing Analysis on Adaptive Transmission in MIMO Systems with Imperfect CSI.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

2008
Embedding in Two Least Significant Bits with Wet Paper Coding.
IACR Cryptol. ePrint Arch., 2008

2007
An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

1999
Computer simulation of PEC network.
Simul. Pract. Theory, 1999


  Loading...