
Xin Liao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j28]Jiao Du, Longjiang Qu, Chao Li, Xin Liao:
Constructing 1-resilient rotation symmetric functions over 픽p with q variables through special orthogonal arrays. Adv. Math. Commun. 14(2): 247-263 (2020) - [j27]Xin Liao
, Kaide Li, Xinshan Zhu
, K. J. Ray Liu
:
Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network. IEEE J. Sel. Top. Signal Process. 14(5): 955-968 (2020) - [j26]Junxue Yang, Xin Liao:
An embedding strategy on fusing multiple image features for data hiding in multiple images. J. Vis. Commun. Image Represent. 71: 102822 (2020) - [j25]Xin Liao
, Yingbo Yu, Bin Li
, Zhongpeng Li, Zheng Qin
:
A New Payload Partition Strategy in Color Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(3): 685-696 (2020) - [c14]Xin Liao, Zihang Huang:
A Framework for Parameters Estimation of Image Operator Chain. ICASSP 2020: 2787-2791
2010 – 2019
- 2019
- [j24]Shangde Gao, Xin Liao, Xuchong Liu:
Real-time detecting one specific tampering operation in multiple operator chains. J. Real Time Image Process. 16(3): 741-750 (2019) - [j23]Fuqiang Di, Minqing Zhang, Xin Liao, Jia Liu:
High-fidelity reversible data hiding by Quadtree-based pixel value ordering. Multim. Tools Appl. 78(6): 7125-7141 (2019) - 2018
- [j22]Xin Liao, Jiaojiao Yin, Sujin Guo, Xiong Li
, Arun Kumar Sangaiah
:
Medical JPEG image steganography based on preserving inter-block dependencies. Comput. Electr. Eng. 67: 320-329 (2018) - [j21]Siyuan He, Bo Ou, Xin Liao:
分布式工作流环境下角色匹配的访问控制模型 (Role Matching Access Control Model for Distributed Workflow). 计算机科学 45(7): 129-134 (2018) - [j20]Xin Liao, Sujin Guo, Jiaojiao Yin, Huan Wang, Xiong Li
, Arun Kumar Sangaiah
:
New cubic reference table based image steganography. Multim. Tools Appl. 77(8): 10033-10050 (2018) - [j19]Hongliang Zhu
, Meiqi Chen, Maohua Sun
, Xin Liao, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. Secur. Commun. Networks 2018: 5841967:1-5841967:12 (2018) - [c13]Jiana Li, Xin Liao, Rongbing Hu, Xuchong Liu:
Detectability of the Image Operation Order: Upsampling and Mean Filtering. APSIPA 2018: 1544-1549 - [c12]Xin Liao, Jiaojiao Yin:
Two Embedding Strategies for Payload Distribution in Multiple Images Steganography. ICASSP 2018: 1982-1986 - 2017
- [j18]Jun Li, Xiaoyuan Yang, Xin Liao, Feng Pan, Minqing Zhang:
A game-theoretic method for designing distortion function in spatial steganography. Multim. Tools Appl. 76(10): 12417-12431 (2017) - [j17]Xin Liao, Kaide Li, Jiaojiao Yin:
Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multim. Tools Appl. 76(20): 20739-20753 (2017) - [j16]Xin Liao, Zheng Qin, Liping Ding:
Data embedding in digital images using critical functions. Signal Process. Image Commun. 58: 146-156 (2017) - [c11]Yingbo Yu, Xin Liao:
Improved CMD Adaptive Image Steganography Method. ICCCS (1) 2017: 74-84 - [c10]Qi Li, Xin Liao, Guoyong Chen, Liping Ding:
A Novel Game-Theoretic Model for Content-Adaptive Image Steganography. ICDCS Workshops 2017: 232-237 - [c9]Shangde Gao, Xin Liao, Sujin Guo, Xiong Li
, Pandi Vijayakumar
:
Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement. SpaCCS Workshops 2017: 570-580 - 2016
- [j15]Dongyang Shi, Lele Wang, Xin Liao
:
A new nonconforming mixed finite element scheme for second order eigenvalue problem. Appl. Math. Comput. 273: 842-855 (2016) - [j14]Dongyang Shi, Xin Liao
, Lele Wang:
Superconvergence analysis of conforming finite element method for nonlinear Schrödinger equation. Appl. Math. Comput. 289: 298-310 (2016) - [j13]Xin Liao, Guoyong Chen, Jiaojiao Yin:
Content-adaptive steganalysis for color images. Secur. Commun. Networks 9(18): 5756-5763 (2016) - 2015
- [j12]Dongyang Shi, Lele Wang, Xin Liao
:
Nonconforming finite element analysis for Poisson eigenvalue problem. Comput. Math. Appl. 70(5): 835-845 (2015) - [j11]Xin Liao, Changwen Shu:
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28: 21-27 (2015) - [c8]Xin Liao, Guoyong Chen, Qi Li, Jun Liu:
Improved WOW Adaptive Image Steganography Method. ICA3PP (3) 2015: 695-702 - [c7]Xin Liao, Liping Ding:
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational. IIH-MSP 2015: 76-80 - 2014
- [j10]Dongyang Shi, Xin Liao
, Lele Wang
:
The lowest order characteristic mixed finite element scheme for convection-dominated diffusion problem. Comput. Math. Appl. 68(7): 759-769 (2014) - 2013
- [j9]Jiao Du, Qiaoyan Wen, Jie Zhang, Xin Liao:
New Construction of Symmetric Orthogonal Arrays of Strength t. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(9): 1901-1904 (2013) - [j8]Xin Liao, Qiaoyan Wen, Ting-Ting Song, Jie Zhang:
Quantum Steganography with High Efficiency with Noisy Depolarizing Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2039-2044 (2013) - [j7]Xin Liao, Qiaoyan Wen, Jie Zhang:
Improving the Adaptive Steganographic Methods Based on Modulus Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2731-2734 (2013) - [j6]Xin Liao, Zuoxiang Peng, Saralees Nadarajah:
Tail Properties and Asymptotic Expansions for the Maximum of the Logarithmic Skew-Normal Distribution. J. Appl. Probab. 50(3): 900-907 (2013) - 2012
- [j5]Xin Liao, Qiao-Yan Wen, Ze-li Zhao, Jie Zhang:
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function. Fundam. Informaticae 118(3): 281-289 (2012) - [j4]Xin Liao, Qiaoyan Wen, Jie Zhang:
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1189-1192 (2012) - [c6]Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi, Wei Han, Xin Liao, Fei Wang:
Reducing Scalability Collapse via Requester-Based Locking on Multicore Systems. MASCOTS 2012: 298-307 - 2011
- [j3]Xin Liao, Qiao-Yan Wen, Jie Zhang:
A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Vis. Commun. Image Represent. 22(1): 1-8 (2011) - [c5]Xin Liao, Qiao-Yan Wen, Sha Shi:
Distributed Steganography. IIH-MSP 2011: 153-156 - 2010
- [j2]Xin Liao, Qiao-Yan Wen, Ying Sun, Jie Zhang:
Multi-party covert communication with steganography and quantum secret sharing. J. Syst. Softw. 83(10): 1801-1804 (2010) - [c4]Hao-long Zhang, Hong-tao Zheng, Wen Zhao, Xin Liao, Zhi-ting Fei:
Research on collaborative design platform of Launch Vehicle based on desktop grid. CSCWD 2010: 356-360
2000 – 2009
- 2009
- [c3]Xin Liao, Luting Kong, Ping Zhang:
Queuing Analysis on Adaptive Transmission in MIMO Systems with Imperfect CSI. VTC Fall 2009 - 2008
- [c2]Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. CSSE (3) 2008: 555-558 - [i1]Xin Liao, Qiao-Yan Wen:
Embedding in Two Least Significant Bits with Wet Paper Coding. IACR Cryptol. ePrint Arch. 2008: 255 (2008) - 2007
- [c1]Ali Al-Shaikhi
, Jacek Ilow, Xin Liao:
An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes. CNSR 2007: 263-267
1990 – 1999
- 1999
- [j1]Xin Liao, Xian-He Sun:
Computer simulation of PEC network. Simul. Pract. Theory 7(3): 251-278 (1999)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-31 01:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint