Jianyi Liu

Orcid: 0000-0003-0321-4955

According to our database1, Jianyi Liu authored at least 121 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Relationship detection for manipulation in object stacking scene with fully connected CRF.
Neurocomputing, 2025

2024
A Siamese Neural Network Framework With Sememe-Based Context Extraction for Interactive Argument Pair Identification.
IEEE Signal Process. Lett., 2024

A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.
IEEE Signal Process. Lett., 2024

Multiple correlation filters with gaussian constraint for fast online tracking.
J. Vis. Commun. Image Represent., 2024

State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.
CoRR, 2024

Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis.
CoRR, 2024

LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation.
CoRR, 2024

Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis.
CoRR, 2024

Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.
CoRR, 2024

An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
CoRR, 2024

LLsM: Generative Linguistic Steganography with Large Language Model.
CoRR, 2024

Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.
Proceedings of the International Joint Conference on Neural Networks, 2024

Incremental Conflict-Based Search for Multi-agent Path Finding in Dynamic Environment.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024

LFENav: LLM-Based Frontiers Exploration for Visual Semantic Navigation.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024

An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Controllable Semantic Linguistic Steganography via Summarization Generation.
Proceedings of the IEEE International Conference on Acoustics, 2024

An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

2023
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.
Sensors, December, 2023

Large capacity generative image steganography via image style transfer and feature-wise deep fusion.
Appl. Intell., December, 2023

MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.
Sensors, October, 2023

V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.
J. Inf. Secur. Appl., June, 2023

APRS: Automatic pruning ratio search using Siamese network with layer-level rewards.
Digit. Signal Process., March, 2023

P$^{2}$-GAN: Efficient Stroke Style Transfer Using Single Style Image.
IEEE Trans. Multim., 2023

Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.
IEEE Signal Process. Lett., 2023

RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.
IEEE Signal Process. Lett., 2023

UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.
CoRR, 2023

DVT-Tree: Dynamic Visible Topology Tree for Efficient Mapless Navigation in Maze Environments.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Multi-risk Aware Trajectory Planning for Car-like Robot in Highly Dynamic Environments.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Linguistic Steganalysis Merging Semantic and Statistical Features.
IEEE Signal Process. Lett., 2022

Learning invariant representation for unsupervised domain adaptive thorax disease classification.
Pattern Recognit. Lett., 2022

Two statistical traffic features for certain APT group identification.
J. Inf. Secur. Appl., 2022

LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.
CoRR, 2022

Curvature Continuous Path Planning with Reverse Searching for Efficient and Precise Autonomous Parking.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

Deep Features Based IDS Alarm False Positive Elimination Algorithm.
Proceedings of the 2022 11th International Conference on Computing and Pattern Recognition, 2022

Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec.
Proceedings of the 8th International Conference on Communication and Information Processing, 2022

A CNN Based Visual Audio Steganography Model.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.
Proceedings of the International Conference on Artificial Intelligence, 2022

2021
A video steganalysis method based on coding cost variation.
Int. J. Distributed Sens. Networks, 2021

Applying User-Centered Design Methods to Understand Users' Day-to-Day Experiences Can Inform a Mobile Intervention for Binge Eating and Weight Management.
Frontiers Digit. Health, 2021

Part-Aware Mask-Guided Attention for Thorax Disease Classification.
Entropy, 2021

A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement.
Proceedings of the Image and Graphics - 11th International Conference, 2021

A Controllable Image Steganography with Chaos and User Key.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Network Security Situation Prediction Model Based on Security Situation Factors.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Malicious Code Family Classification Method Based on Spatial Pyramid Pooling and Deep Residual Network.
Proceedings of the 7th IEEE International Conference on Cloud Computing and Intelligent Systems, 2021

2020
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2020

Individual retrieval based on oral cavity point cloud data and correntropy-based registration algorithm.
IET Image Process., 2020

Fast spatio-temporal decorrelation using FIR filter network with decoupled adaptive step sizes.
Digit. Signal Process., 2020

A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.
Circuits Syst. Signal Process., 2020

Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification.
CoRR, 2020

Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain.
CoRR, 2020

P$^2$-GAN: Efficient Style Transfer Using Single Style Image.
CoRR, 2020

A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.
IEEE Access, 2020

Computational Analysis of Emotions and Topics in Survivor Interviews about Nanking Massacre.
Proceedings of the 15th Annual International Conference of the Alliance of Digital Humanities Organizations, 2020

2019
Invisible steganography via generative adversarial networks.
Multim. Tools Appl., 2019

Witness detection in multi-instance regression and its application for age estimation.
Multim. Tools Appl., 2019

A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.
J. Inf. Secur. Appl., 2019

Crossing-Road Pedestrian Trajectory Prediction via Encoder-Decoder LSTM.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
An Edge Caching Scheme to Distribute Content in Vehicular Networks.
IEEE Trans. Veh. Technol., 2018

Underdetermined Wideband DOA Estimation for Off-Grid Sources with Coprime Array Using Sparse Bayesian Learning.
Sensors, 2018

Efficient feature learning and multi-size image steganalysis based on CNN.
CoRR, 2018

Invisible Steganography via Generative Adversarial Network.
CoRR, 2018

Analysis of Message Attacks in Aviation Data-Link Communication.
IEEE Access, 2018

An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.
Secur. Commun. Networks, 2017

Pose-and-illumination-invariant face representation via a triplet-loss trained deep reconstruction model.
Multim. Tools Appl., 2017

Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017

Attack pattern mining algorithm based on security log.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016

Privacy preservation based on rotation perturbation in weighted social networks.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Detecting False Information of Social Network in Big Data.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Phishing sites detection based on Url Correlation.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An attack pattern mining algorithm based on fuzzy logic and sequence pattern.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An Android malware detection method based on AndroidManifest file.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015

Double layer multiple task learning for age estimation with insufficient training samples.
Neurocomputing, 2015

2014
Hybrid constraint SVR for facial age estimation.
Signal Process., 2014

Facial age estimation from web photos using multiple-instance learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

A web page malicious script detection system.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

A model for website anomaly detection based on log analysis.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

A system for web page sensitive keywords detection.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Interactive Poisson Photometric Propagation for Facial Composite.
J. Multim., 2013

Automatic face image annotation based on a single template with constrained warping deformation.
IET Comput. Vis., 2013

Business Impact Analysis Model Based on the Analytic Hierarchy Process.
Proceedings of the Trustworthy Computing and Services, 2013

2012
Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012

2010
Affine iterative closest point algorithm for point set registration.
Pattern Recognit. Lett., 2010

Eye synthesis using the eye curve model.
Image Vis. Comput., 2010

Advertising Keywords Extraction from Web Pages.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

2009
Silhouette quality quantification for gait sequence analysis and recognition.
Signal Process., 2009

Facial Expression Synthesis Based on Facial Component Model.
Int. J. Pattern Recognit. Artif. Intell., 2009

2008
Solution for supervised graph embedding: A case study.
Signal Process., 2008

50 Years of Image Processing and Pattern Recognition in China.
IEEE Intell. Syst., 2008

Chinese Word Sense Disambiguation with PageRank and HowNet.
Proceedings of the Third International Joint Conference on Natural Language Processing, 2008

Illumination transition image: Parameter-based illumination estimation and re-rendering.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Self-revise Hierarchical Classifier Based on SMO Algorithm for Chinese Question Classification.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Keyword Indexing System with HowNet and PageRank.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Research on Text Network Representation.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Automatic Technical Term Extraction Based on Term Association.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A Text Network Representation Model.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Keyword Extraction Based on PageRank.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Research on the Project of Digital Comprehensive Capability Platform for Shipbuilding.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

A Research on the Application of Three-D Planning of EIS in Manufacturing Industry.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

Eye Synthesis Using the Eye Curve Model.
Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007), 2007

Gait History Image: A Novel Temporal Template for Gait Recognition.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Facial Expression Sequence Synthesis Based on Shape and Texture Fusion Model.
Proceedings of the International Conference on Image Processing, 2007

Estimating Aging Pattern by Aging Increment Distribution for Re-rendering of Facial Age Effects.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Partitioning Gait Cycles Adaptive to Fluctuating Periods and Bad Silhouettes.
Proceedings of the Advances in Biometrics, International Conference, 2007

Robotic Self-Replication in a Structured Environment without Computer Control.
Proceedings of the 7th IEEE International Symposium on Computational Intelligence in Robotics and Automation, 2007

2006
Spam Behavior Recognition Based on Session Layer Data Mining.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
IIPP and CIT based intelligent autonomous QA system.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005

Hotspot Components for Gesture-Based Interaction.
Proceedings of the Human-Computer Interaction, 2005

Affective Meeting Video Analysis.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Facetransfer: a system model of facial image rendering.
Proceedings of the IEEE International Conference on Systems, 2004


  Loading...