default search action
Xin Liao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Dengyong Zhang, Ningjing Jiang, Feng Li, Jiaxin Chen, Xin Liao, Gaobo Yang, Xiangling Ding:
Multi-scale noise-guided progressive network for image splicing detection and localization. Expert Syst. Appl. 257: 124975 (2024) - [j71]Xiehua Li, Wanting Lei, Wenjuan Tang, Yingzhu Wang, Xiaoju Yang, Xin Liao:
Segmented Hash-Based Privacy-Preserving Image Retrieval Scheme in Cloud-Assisted IoT. IEEE Internet Things J. 11(21): 35250-35265 (2024) - [j70]Xuanming Chang, Beijing Chen, Weiping Ding, Xin Liao:
A DNN robust video watermarking method in dual-tree complex wavelet transform domain. J. Inf. Secur. Appl. 85: 103868 (2024) - [j69]Meifeng Shi, Peng Zhang, Xin Liao, Zhijian Xue:
An Estimation of Distribution Based Algorithm for Continuous Distributed Constraint Optimization Problems. Inf. Technol. Control. 53(1): 80-97 (2024) - [j68]Yu-Guang Yang, Zi-Jia Wang, Bao-Pu Wang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system. Multim. Tools Appl. 83(2): 3621-3655 (2024) - [j67]Yu-Guang Yang, Ming-Xin Niu, Yihua Zhou, Wei-Min Shi, Dong-Hua Jiang, Xin Liao:
A visually secure image encryption algorithm based on block compressive sensing and deep neural networks. Multim. Tools Appl. 83(10): 29777-29803 (2024) - [j66]Xin Liao, Li Li, Zongyuan Gan, Kang Li, Xin Zheng:
Prognosis prediction of high grade serous adenocarcinoma based on multi-modal convolution neural network. Neural Comput. Appl. 36(17): 9805-9817 (2024) - [j65]Lanfeng Zhong, Xiangde Luo, Xin Liao, Shaoting Zhang, Guotai Wang:
Semi-supervised pathological image segmentation via cross distillation of multiple attentions and Seg-CAM consistency. Pattern Recognit. 152: 110492 (2024) - [j64]Zhiyuan Jiang, Xianzhen Huang, Bingxiang Wang, Xin Liao, Huizhen Liu, Pengfei Ding:
Time-dependent reliability-based design optimization of main shaft bearings in wind turbines involving mixed-integer variables. Reliab. Eng. Syst. Saf. 243: 109817 (2024) - [j63]Yuling Liu, Cuilin Wang, Jie Wang, Bo Ou, Xin Liao:
Generative Steganography via Live Comments on Streaming Video Frames. IEEE Trans. Comput. Soc. Syst. 11(3): 4412-4425 (2024) - [j62]Dengyong Zhang, Jiahao Chen, Xin Liao, Feng Li, Jiaxin Chen, Gaobo Yang:
Face Forgery Detection via Multi-Feature Fusion and Local Enhancement. IEEE Trans. Circuits Syst. Video Technol. 34(9): 8972-8977 (2024) - [j61]Yunming Zhang, Dengpan Ye, Caiyun Xie, Long Tang, Xin Liao, Ziyi Liu, Chuanxi Chen, Jiacheng Deng:
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping. IEEE Trans. Inf. Forensics Secur. 19: 4628-4641 (2024) - [j60]Jiyou Chen, Gaobo Yang, Shengchun Wang, Dewang Wang, Xin Liao:
Image Dehazing Assessment: A Real-World Dataset and a Haze Density-Aware Criteria. IEEE Trans. Multim. 26: 6037-6049 (2024) - [j59]Yang Tian, Xin Liao, Li Dong, Yang Xu, Hongbo Jiang:
Amount-Based Covert Communication Over Blockchain. IEEE Trans. Netw. Serv. Manag. 21(3): 3095-3111 (2024) - [j58]Fan Li, Yanxiang Chen, Haiyang Liu, Zuxing Zhao, Yuanzhi Yao, Xin Liao:
Vocoder Detection of Spoofing Speech Based on GAN Fingerprints and Domain Generalization. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 157:1-157:20 (2024) - [c28]Jiaxin Chen, Xin Liao, Zhenxing Qian, Zheng Qin:
Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images. ICME 2024: 1-6 - [c27]Xiyao Liu, Fengkai Dong, Xin Liao, Yuhan Guo, Jianbiao He, Jian Zhang, Gerald Schaefer, Hui Fang:
Multi-Strategy Adversarial Learning for Robust Face Forgery Detection Under Heterogeneous and Composite Attacks. ICME 2024: 1-6 - [c26]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces. IJCAI 2024: 5862-5871 - [c25]Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin:
Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics. IJCAI 2024: 6089-6097 - [c24]Dunyun Chen, Xin Liao, Xiaoshuai Wu, Shiwei Chen:
SafePaint: Anti-forensic Image Inpainting with Domain Adaptation. ACM Multimedia 2024: 7774-7782 - [i15]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces. CoRR abs/2401.13516 (2024) - [i14]Lanfeng Zhong, Xin Liao, Shaoting Zhang, Xiaofan Zhang, Guotai Wang:
VLM-CPL: Consensus Pseudo Labels from Vision-Language Models for Human Annotation-Free Pathological Image Classification. CoRR abs/2403.15836 (2024) - [i13]Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin:
Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics. CoRR abs/2404.17867 (2024) - [i12]Dunyun Chen, Xin Liao, Xiaoshuai Wu, Shiwei Chen:
SafePaint: Anti-forensic Image Inpainting with Domain Adaptation. CoRR abs/2404.18136 (2024) - [i11]Zongmei Chen, Xin Liao, Xiaoshuai Wu, Yanxiang Chen:
Compressed Deepfake Video Detection Based on 3D Spatiotemporal Trajectories. CoRR abs/2404.18149 (2024) - [i10]Aohan Li, Jiaxin Chen, Xin Liao, Dengyong Zhang:
Adaptive Learning of Consistency and Inconsistency Information for Fake News Detection. CoRR abs/2408.08013 (2024) - [i9]Xin Liao, Qicong Hu, Peng Tang:
An Adaptive Latent Factorization of Tensors Model for Embedding Dynamic Communication Network. CoRR abs/2408.16573 (2024) - 2023
- [j57]Mingxiang Zhang, Hongli Gao, Xin Liao, Baoxing Ning, Haiming Gu, Bin Yu:
DBGRU-SE: predicting drug-drug interactions based on double BiGRU and squeeze-and-excitation attention mechanism. Briefings Bioinform. 24(4) (2023) - [j56]Huaijun Yang, Lele Wang, Xin Liao:
Superconvergence analysis of a linearized energy-conservative Galerkin method for the nonlinear Schrödinger equation with wave operator. Comput. Math. Appl. 133: 142-154 (2023) - [j55]Jiaxin Chen, Xin Liao, Wei Wang, Zheng Qin:
Identification of image global processing operator chain based on feature decoupling. Inf. Sci. 637: 118961 (2023) - [j54]Yu-Guang Yang, Bao-Pu Wang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Efficient color image encryption by color-grayscale conversion based on steganography. Multim. Tools Appl. 82(7): 10835-10866 (2023) - [j53]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multim. Tools Appl. 82(14): 22033-22062 (2023) - [j52]Junxue Yang, Xin Liao:
ACGIS: Adversarial Cover Generator for Image Steganography with Noise Residuals Features-Preserving. Signal Process. Image Commun. 113: 116927 (2023) - [j51]Jiaxin Chen, Xin Liao, Wei Wang, Zhenxing Qian, Zheng Qin, Yaonan Wang:
SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection. IEEE Trans. Circuits Syst. Video Technol. 33(2): 935-951 (2023) - [j50]Xin Liao, Yumei Wang, Tianyi Wang, Juan Hu, Xiaoshuai Wu:
FAMM: Facial Muscle Motions for Detecting Compressed Deepfake Videos Over Social Networks. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7236-7251 (2023) - [j49]Yi Sun, Keping Yu, Ali Kashif Bashir, Xin Liao:
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(1): 1062-1074 (2023) - [j48]Lanfeng Zhong, Guotai Wang, Xin Liao, Shaoting Zhang:
HAMIL: High-Resolution Activation Maps and Interleaved Learning for Weakly Supervised Segmentation of Histopathological Images. IEEE Trans. Medical Imaging 42(10): 2912-2923 (2023) - [j47]Zhengyan Chen, Hong Liu, Linlin Zhang, Xin Liao:
Multi-Dimensional Attention With Similarity Constraint for Weakly-Supervised Temporal Action Localization. IEEE Trans. Multim. 25: 4349-4360 (2023) - [j46]Yuanman Li, Jiaxiang You, Jiantao Zhou, Wei Wang, Xin Liao, Xia Li:
Image Operation Chain Detection with Machine Translation Framework. IEEE Trans. Multim. 25: 6852-6867 (2023) - [c23]Lanfeng Zhong, Xin Liao, Shaoting Zhang, Guotai Wang:
Semi-supervised Pathological Image Segmentation via Cross Distillation of Multiple Attentions. MICCAI (6) 2023: 570-579 - [c22]Xiaoshuai Wu, Xin Liao, Bo Ou:
SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection. ACM Multimedia 2023: 1190-1201 - [c21]Junxue Yang, Xin Liao:
Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images. ACM Multimedia 2023: 7373-7382 - [c20]Yulin Zhang, Jiangqun Ni, Wenkang Su, Xin Liao:
A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression. ACM Multimedia 2023: 8095-8104 - [i8]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Zheng Qin, Mike Zheng Shou:
DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection. CoRR abs/2303.01740 (2023) - [i7]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection. CoRR abs/2305.05943 (2023) - [i6]Xiaoshuai Wu, Xin Liao, Bo Ou:
SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection. CoRR abs/2305.06321 (2023) - [i5]Junxue Yang, Xin Liao:
Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images. CoRR abs/2305.06582 (2023) - [i4]Lanfeng Zhong, Xin Liao, Shaoting Zhang, Guotai Wang:
Semi-supervised Pathological Image Segmentation via Cross Distillation of Multiple Attentions. CoRR abs/2305.18830 (2023) - [i3]Xin Liao, Siliang Chen, Jiaxin Chen, Tianyi Wang, Xiehua Li:
CTP-Net: Character Texture Perception Network for Document Image Forgery Localization. CoRR abs/2308.02158 (2023) - [i2]Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou:
Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces. CoRR abs/2308.09921 (2023) - 2022
- [j45]Meifeng Shi, Xin Liao, Yuan Chen:
A dual-population search differential evolution algorithm for functional distributed constraint optimization problems. Ann. Math. Artif. Intell. 90(10): 1055-1078 (2022) - [j44]Meng Zhang, Zhuo Li, Lijuan Xing, Xin Liao:
Higher-Order Belief Propagation Correction Decoder for Polar Codes. Entropy 24(4): 534 (2022) - [j43]Meifeng Shi, Xin Liao, Yuan Chen:
A Particle Swarm with Local Decision Algorithm for Functional Distributed Constraint Optimization Problems. Int. J. Pattern Recognit. Artif. Intell. 36(12): 2259025:1-2259025:29 (2022) - [j42]Xinlei Deng, Han Li, Xin Liao, Zhiqiang Qin, Fan Xu, Samantha Friedman, Gang Ma, Kun Ye, Shao Lin:
Building a predictive model to identify clinical indicators for COVID-19 using machine learning method. Medical Biol. Eng. Comput. 60(6): 1763-1774 (2022) - [j41]Ju Luo, Yuhao Sun, Jingshu Chi, Xin Liao, Canxia Xu:
A novel deep learning-based method for COVID-19 pneumonia detection from CT images. BMC Medical Informatics Decis. Mak. 22(1): 284 (2022) - [j40]Zheyuan Feng, Qi Xu, Xiangyang Xu, Qiang Tang, Xuedong Li, Xin Liao:
Deformation Characteristics of Soil Layers and Diaphragm Walls during Deep Foundation Pit Excavation: Simulation Verification and Parameter Analysis. Symmetry 14(2): 254 (2022) - [j39]Juan Hu, Xin Liao, Wei Wang, Zheng Qin:
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1089-1102 (2022) - [j38]Xin Liao, Jiaojiao Yin, Mingliang Chen, Zheng Qin:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. IEEE Trans. Dependable Secur. Comput. 19(2): 897-911 (2022) - [j37]Mingliang Chen, Xin Liao, Min Wu:
PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection. IEEE Trans. Inf. Forensics Secur. 17: 457-471 (2022) - [j36]Jingxuan Tan, Xin Liao, Jiate Liu, Yun Cao, Hongbo Jiang:
Channel Attention Image Steganography With Generative Adversarial Networks. IEEE Trans. Netw. Sci. Eng. 9(2): 888-903 (2022) - [c19]Juan Hu, Xin Liao, Jinwen Liang, Wenbo Zhou, Zheng Qin:
FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos. AAAI 2022: 951-959 - [c18]Shuangyi Xie, Xin Liao, Ruxue Bai, Chengxu Zhou, Ke Gu:
River Turbidity Monitoring Based on Semi-supervised Transfer Learning. IFTC 2022: 44-58 - [c17]Shangde Gao, Jiaxin Chen, Xin Liao:
Exploring Feature Coupling for Multiple Operations Type and Order Detection. MMSP 2022: 1-5 - 2021
- [j35]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Visually meaningful image encryption based on universal embedding model. Inf. Sci. 562: 304-324 (2021) - [j34]Xin Liao, Zihang Huang, Lin Peng, Tong Qiao:
First step towards parameters estimation of image operator chain. Inf. Sci. 575: 231-247 (2021) - [j33]Yu-Guang Yang, Bao-Pu Wang, Shuai-Kang Pei, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf. Sci. 580: 174-201 (2021) - [j32]Xin Liao, Jing Peng, Yun Cao:
GIFMarking: The robust watermarking for animated GIF based deep learning. J. Vis. Commun. Image Represent. 79: 103244 (2021) - [j31]Lin Peng, Xin Liao, Mingliang Chen:
Resampling parameter estimation via dual-filtering based convolutional neural network. Multim. Syst. 27(3): 363-370 (2021) - [j30]Jiaxin Chen, Xin Liao, Zheng Qin:
Identifying tampering operations in image operator chains based on decision fusion. Signal Process. Image Commun. 95: 116287 (2021) - [j29]Xin Liao, Jing Chen, Jiaxin Chen:
Image source identification with known post-processed based on convolutional neural network. Signal Process. Image Commun. 99: 116438 (2021) - [c16]Jiaxin Chen, Xin Liao, Wei Wang, Zheng Qin:
A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains. ICASSP 2021: 2505-2509 - [c15]Yuhao Sun, Xin Liao, Jianfeng Liu:
An Efficient Paper Anti-Counterfeiting Method Based on Microstructure Orientation Estimation. ICASSP 2021: 2525-2529 - 2020
- [j28]Jiao Du, Longjiang Qu, Chao Li, Xin Liao:
Constructing 1-resilient rotation symmetric functions over 픽p with q variables through special orthogonal arrays. Adv. Math. Commun. 14(2): 247-263 (2020) - [j27]Xin Liao, Kaide Li, Xinshan Zhu, K. J. Ray Liu:
Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network. IEEE J. Sel. Top. Signal Process. 14(5): 955-968 (2020) - [j26]Junxue Yang, Xin Liao:
An embedding strategy on fusing multiple image features for data hiding in multiple images. J. Vis. Commun. Image Represent. 71: 102822 (2020) - [j25]Xin Liao, Yingbo Yu, Bin Li, Zhongpeng Li, Zheng Qin:
A New Payload Partition Strategy in Color Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(3): 685-696 (2020) - [c14]Xin Liao, Zihang Huang:
A Framework for Parameters Estimation of Image Operator Chain. ICASSP 2020: 2787-2791
2010 – 2019
- 2019
- [j24]Shangde Gao, Xin Liao, Xuchong Liu:
Real-time detecting one specific tampering operation in multiple operator chains. J. Real Time Image Process. 16(3): 741-750 (2019) - [j23]Fuqiang Di, Minqing Zhang, Xin Liao, Jia Liu:
High-fidelity reversible data hiding by Quadtree-based pixel value ordering. Multim. Tools Appl. 78(6): 7125-7141 (2019) - 2018
- [j22]Xin Liao, Jiaojiao Yin, Sujin Guo, Xiong Li, Arun Kumar Sangaiah:
Medical JPEG image steganography based on preserving inter-block dependencies. Comput. Electr. Eng. 67: 320-329 (2018) - [j21]Siyuan He, Bo Ou, Xin Liao:
分布式工作流环境下角色匹配的访问控制模型 (Role Matching Access Control Model for Distributed Workflow). 计算机科学 45(7): 129-134 (2018) - [j20]Xin Liao, Sujin Guo, Jiaojiao Yin, Huan Wang, Xiong Li, Arun Kumar Sangaiah:
New cubic reference table based image steganography. Multim. Tools Appl. 77(8): 10033-10050 (2018) - [j19]Hongliang Zhu, Meiqi Chen, Maohua Sun, Xin Liao, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. Secur. Commun. Networks 2018: 5841967:1-5841967:12 (2018) - [c13]Jiana Li, Xin Liao, Rongbing Hu, Xuchong Liu:
Detectability of the Image Operation Order: Upsampling and Mean Filtering. APSIPA 2018: 1544-1549 - [c12]Xin Liao, Jiaojiao Yin:
Two Embedding Strategies for Payload Distribution in Multiple Images Steganography. ICASSP 2018: 1982-1986 - 2017
- [j18]Jun Li, Xiaoyuan Yang, Xin Liao, Feng Pan, Minqing Zhang:
A game-theoretic method for designing distortion function in spatial steganography. Multim. Tools Appl. 76(10): 12417-12431 (2017) - [j17]Xin Liao, Kaide Li, Jiaojiao Yin:
Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multim. Tools Appl. 76(20): 20739-20753 (2017) - [j16]Xin Liao, Zheng Qin, Liping Ding:
Data embedding in digital images using critical functions. Signal Process. Image Commun. 58: 146-156 (2017) - [c11]Yingbo Yu, Xin Liao:
Improved CMD Adaptive Image Steganography Method. ICCCS (1) 2017: 74-84 - [c10]Qi Li, Xin Liao, Guoyong Chen, Liping Ding:
A Novel Game-Theoretic Model for Content-Adaptive Image Steganography. ICDCS Workshops 2017: 232-237 - [c9]Shangde Gao, Xin Liao, Sujin Guo, Xiong Li, Pandi Vijayakumar:
Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement. SpaCCS Workshops 2017: 570-580 - 2016
- [j15]Dongyang Shi, Lele Wang, Xin Liao:
A new nonconforming mixed finite element scheme for second order eigenvalue problem. Appl. Math. Comput. 273: 842-855 (2016) - [j14]Dongyang Shi, Xin Liao, Lele Wang:
Superconvergence analysis of conforming finite element method for nonlinear Schrödinger equation. Appl. Math. Comput. 289: 298-310 (2016) - [j13]Xin Liao, Guoyong Chen, Jiaojiao Yin:
Content-adaptive steganalysis for color images. Secur. Commun. Networks 9(18): 5756-5763 (2016) - 2015
- [j12]Dongyang Shi, Lele Wang, Xin Liao:
Nonconforming finite element analysis for Poisson eigenvalue problem. Comput. Math. Appl. 70(5): 835-845 (2015) - [j11]Xin Liao, Changwen Shu:
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28: 21-27 (2015) - [c8]Xin Liao, Guoyong Chen, Qi Li, Jun Liu:
Improved WOW Adaptive Image Steganography Method. ICA3PP (3) 2015: 695-702 - [c7]Xin Liao, Liping Ding:
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational. IIH-MSP 2015: 76-80 - 2014
- [j10]Dongyang Shi, Xin Liao, Lele Wang:
The lowest order characteristic mixed finite element scheme for convection-dominated diffusion problem. Comput. Math. Appl. 68(7): 759-769 (2014) - 2013
- [j9]Jiao Du, Qiaoyan Wen, Jie Zhang, Xin Liao:
New Construction of Symmetric Orthogonal Arrays of Strength t. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(9): 1901-1904 (2013) - [j8]Xin Liao, Qiaoyan Wen, Ting-Ting Song, Jie Zhang:
Quantum Steganography with High Efficiency with Noisy Depolarizing Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2039-2044 (2013) - [j7]Xin Liao, Qiaoyan Wen, Jie Zhang:
Improving the Adaptive Steganographic Methods Based on Modulus Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2731-2734 (2013) - [j6]Xin Liao, Zuoxiang Peng, Saralees Nadarajah:
Tail Properties and Asymptotic Expansions for the Maximum of the Logarithmic Skew-Normal Distribution. J. Appl. Probab. 50(3): 900-907 (2013) - 2012
- [j5]Xin Liao, Qiao-Yan Wen, Ze-li Zhao, Jie Zhang:
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function. Fundam. Informaticae 118(3): 281-289 (2012) - [j4]Xin Liao, Qiaoyan Wen, Jie Zhang:
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1189-1192 (2012) - [c6]Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi, Wei Han, Xin Liao, Fei Wang:
Reducing Scalability Collapse via Requester-Based Locking on Multicore Systems. MASCOTS 2012: 298-307 - 2011
- [j3]Xin Liao, Qiao-Yan Wen, Jie Zhang:
A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1): 1-8 (2011) - [c5]Xin Liao, Qiao-Yan Wen, Sha Shi:
Distributed Steganography. IIH-MSP 2011: 153-156 - 2010
- [j2]Xin Liao, Qiao-Yan Wen, Ying Sun, Jie Zhang:
Multi-party covert communication with steganography and quantum secret sharing. J. Syst. Softw. 83(10): 1801-1804 (2010) - [c4]Hao-long Zhang, Hong-tao Zheng, Wen Zhao, Xin Liao, Zhi-ting Fei:
Research on collaborative design platform of Launch Vehicle based on desktop grid. CSCWD 2010: 356-360
2000 – 2009
- 2009
- [c3]Xin Liao, Luting Kong, Ping Zhang:
Queuing Analysis on Adaptive Transmission in MIMO Systems with Imperfect CSI. VTC Fall 2009 - 2008
- [c2]Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. CSSE (3) 2008: 555-558 - [i1]Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. IACR Cryptol. ePrint Arch. 2008: 255 (2008) - 2007
- [c1]Ali Al-Shaikhi, Jacek Ilow, Xin Liao:
An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes. CNSR 2007: 263-267
1990 – 1999
- 1999
- [j1]Xin Liao, Xian-He Sun:
Computer simulation of PEC network. Simul. Pract. Theory 7(3): 251-278 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint