Xun Lin

Orcid: 0000-0001-8387-4245

According to our database1, Xun Lin authored at least 45 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Reliable and Balanced Transfer Learning for Generalized Multimodal Face Anti-Spoofing.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2025

SVC 2025: the First Multimodal Deception Detection Challenge.
CoRR, August, 2025

TopoTTA: Topology-Enhanced Test-Time Adaptation for Tubular Structure Segmentation.
CoRR, August, 2025

MorFormer: Morphology-Aware Transformer for Generalized Pavement Crack Segmentation.
IEEE Trans. Intell. Transp. Syst., June, 2025

Denoising and Alignment: Rethinking Domain Generalization for Multimodal Face Anti-Spoofing.
CoRR, May, 2025

FaceShield: Explainable Face Anti-Spoofing with Multimodal Large Language Models.
CoRR, May, 2025

Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation.
CoRR, April, 2025

AdaMHF: Adaptive Multimodal Hierarchical Fusion for Survival Prediction.
CoRR, March, 2025

DADM: Dual Alignment of Domain and Modality for Face Anti-spoofing.
CoRR, March, 2025

Toward Model Resistant to Transferable Adversarial Examples via Trigger Activation.
IEEE Trans. Inf. Forensics Secur., 2025

Fully Anonymous Decentralized Identity Supporting Threshold Traceability with Practical Blockchain.
Proceedings of the ACM on Web Conference 2025, 2025

Big-Moe: Bypassing Isolated Gating For Generalized Multimodal Face Anti-Spoofing.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

EPE-P: Evidence-based Parameter-efficient Prompting for Multimodal Learning with Missing Modalities.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Backdoor Attacks Against No-Reference Image Quality Assessment Models via a Scalable Trigger.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024

Exposing image splicing traces in scientific publications via uncertainty-guided refinement.
Patterns, 2024

BFL-SA: Blockchain-based federated learning via enhanced secure aggregation.
J. Syst. Archit., 2024

SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain.
IEEE Internet Things J., 2024

EH-former: Regional easy-hard-aware transformer for breast lesion segmentation in ultrasound images.
Inf. Fusion, 2024

A MLP architecture fusing RGB and CASSI for computational spectral imaging.
Comput. Vis. Image Underst., 2024

BIG-MoE: Bypass Isolated Gating MoE for Generalized Multimodal Face Anti-Spoofing.
CoRR, 2024

DAAD: Dynamic Analysis and Adaptive Discriminator for Fake News Detection.
CoRR, 2024

Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations.
CoRR, 2024

Transferable Adversarial Attacks on SAM and Its Downstream Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

HideMIA: Hidden Wavelet Mining for Privacy-Enhancing Medical Image Analysis.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

CPL-CLIP: Compound Prompt Learning for Flexible-Modal Face Anti-Spoofing.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

DDAP: Dual-Domain Anti-Personalization against Text-to-Image Diffusion Models.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Flexible-Modal Deception Detection with Audio-Visual Adapter.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
CDS-Net: Cooperative dual-stream network for image manipulation detection.
Pattern Recognit. Lett., December, 2023

Image manipulation detection by multiple tampering traces and edge artifact enhancement.
Pattern Recognit., 2023

Biomedical Image Splicing Detection using Uncertainty-Guided Refinement.
CoRR, 2023

2020
Social car: The research of interaction design on the driver's communication system.
Concurr. Comput. Pract. Exp., 2020

Impact of Environmental Education with VR Equipment on Learning Performance and Environmental Identity.
Proceedings of the Cyber Security Intelligence and Analytics, 2020

2019
A Distributed Approach towards Discriminative Distance Metric Learning.
CoRR, 2019

2018
When guanxi meets connectivity: The underlying mechanisms of young adults' participation in micro-charity.
J. Inf. Commun. Ethics Soc., 2018

Virtual Reality, Visual Cliffs, and Movement Disorders.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2015
A Distributed Approach Toward Discriminative Distance Metric Learning.
IEEE Trans. Neural Networks Learn. Syst., 2015

2011
A Novel Method for Origin-Destination Flow Computation Based on Distributed Network Monitoring.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2009
China's E-business Model Innovation Analysis.
J. Comput., 2009

2008
A New Algorithm for Finding Convex Hull with a Maximum Pitch of the Dynamical Base Line.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

An Improved Scheme for E-signature Techniques Based on Digital Encryption and Information Hiding.
Proceedings of the International Symposium on Information Processing, 2008

Discovering Focused Information and Mining Information Focus Based on Isomorphic Information Temperature.
Proceedings of the International Symposium on Information Processing, 2008

A Multiple Evolutionary Neural Network Classifier Based on Niche Genetic Algorithm.
Proceedings of the Fourth International Conference on Natural Computation, 2008

k-Anonymity via Clustering Domain Knowledge for Privacy Preservation.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008


  Loading...