Yan-Xiao Liu

Orcid: 0000-0002-2507-5143

Affiliations:
  • Xi'an University of Technology, Department of Computer Science and Engineering, China
  • Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China (PhD)


According to our database1, Yan-Xiao Liu authored at least 29 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Special Issue on Artificial Intelligence and Technology: Trend, Challenges, and Opportunities.
Mob. Networks Appl., 2022

ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
Entropy, 2022

2021
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021

A (<i>k, n</i>) secret document sharing with meaningful shares.
J. Inf. Secur. Appl., 2021

2020
(<i>k</i>, <i>n</i>) scalable secret image sharing with multiple decoding options.
J. Intell. Fuzzy Syst., 2020

Applying cheating identifiable secret sharing scheme in multimedia security.
EURASIP J. Image Video Process., 2020

2019
Enhanced embedding capacity for the SMSD-based data-hiding method.
Signal Process. Image Commun., 2019

Threshold changeable secret image sharing scheme based on interpolation polynomial.
Multim. Tools Appl., 2019

Exploiting error control in matrix coding-based data hiding over lossy channel.
J. Real Time Image Process., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

2018
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology.
Wirel. Commun. Mob. Comput., 2018

Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes.
Signal Process. Image Commun., 2018

Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.
J. Vis. Commun. Image Represent., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

A novel energy-aware trustworthy multi-hop routing model for Internet of things.
Int. J. Distributed Sens. Networks, 2018

(t, n) multi-secret sharing scheme extended from Harn-Hsu's scheme.
EURASIP J. Wirel. Commun. Netw., 2018

(k, n) secret image sharing scheme capable of cheating detection.
EURASIP J. Wirel. Commun. Netw., 2018

Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding.
IEEE Access, 2018

2017
Scalable secret image sharing scheme with essential shadows.
Signal Process. Image Commun., 2017

Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Linear (<i>k</i>, <i>n</i>) secret sharing scheme with cheating detection.
Secur. Commun. Networks, 2016

(k, n) Secret Sharing Scheme against Two Types of Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2016

A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
Linear (k, n) Secret Sharing Scheme with Cheating Detection.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Reducing shadow size in smooth scalable secret image sharing.
Secur. Commun. Networks, 2014

Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)].
IET Inf. Secur., 2014

Cheating detection and cheater identification in (t, n) secret sharing scheme.
Comput. Syst. Sci. Eng., 2014

2013
Verifiable symmetric polynomial-based key distribution schemes.
Secur. Commun. Networks, 2013

2012
Efficient (n, t, n) secret sharing schemes.
J. Syst. Softw., 2012


  Loading...