Xiaotian Wu

Orcid: 0009-0006-1835-5725

According to our database1, Xiaotian Wu authored at least 99 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MMGAT: a graph attention network framework for ATAC-seq motifs finding.
BMC Bioinform., December, 2024

Multitrend Conditional Value at Risk for Portfolio Optimization.
IEEE Trans. Neural Networks Learn. Syst., February, 2024

Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

Size Invariant Visual Cryptography Schemes With Evolving Threshold Access Structures.
IEEE Trans. Multim., 2024

Waste Remolding - Lime Remolding.
Proceedings of the 17th International Symposium on Visual Information Communication and Interaction, 2024

A De-singularity Subgradient Approach for the Extended Weber Location Problem.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

MMF-ATAC: A User-friendly Web Server for Multiple Motifs Finding on ATAC-seq Data.
Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, 2024

2023
Sharing Visual Secrets Among Multiple Groups With Enhanced Performance.
IEEE Trans. Circuits Syst. Video Technol., November, 2023

A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding.
J. Inf. Secur. Appl., June, 2023

Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping.
ACM Trans. Multim. Comput. Commun. Appl., January, 2023

Revisiting Path Planning Problem Towards Participant Executing Time Optimization in Mobile Crowd Sensing.
IEEE Trans. Netw. Sci. Eng., 2023

Contrast Optimization for Size Invariant Visual Cryptography Scheme.
IEEE Trans. Image Process., 2023

Sharing Multiple Secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property.
IEEE Trans. Circuits Syst. Video Technol., 2023

Secret image sharing by using multi-prime modular arithmetic.
Signal Process., 2023

Impact of Lake on The Hydrological Variables Based on The Global Land Data Assimilation System (GLDAS) Products.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Drought-Induced Variations in the Phenology of the Alpine Grasslands in the Qinghai Lake Basin.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

2022
Correction to: An improvement of spectral clustering algorithm based on fast diffusion search for natural neighbor and affinity propagation.
J. Supercomput., 2022

An improvement of spectral clustering algorithm based on fast diffusion search for natural neighbor and affinity propagation.
J. Supercomput., 2022

Two-stage aware attentional Siamese network for visual tracking.
Pattern Recognit., 2022

AMBTC-based secret image sharing by simple modular arithmetic.
J. Vis. Commun. Image Represent., 2022

Block-based progressive visual cryptography scheme with uniform progressive recovery and consistent background.
J. Vis. Commun. Image Represent., 2022

Interval TOPSIS with a novel interval number comprehensive weight for threat evaluation on uncertain information.
J. Intell. Fuzzy Syst., 2022

Towards cheat-preventing in block-based progressive visual cryptography for general access structures.
Inf. Sci., 2022

MMGraph: a multiple motif predictor based on graph neural network and coexisting probability for ATAC-seq data.
Bioinform., 2022

Surgical navigation system for image-guided transoral robotic surgery: a proof of concept.
Proceedings of the Medical Imaging 2022: Image-Guided Procedures, 2022

2021
Secure image secret sharing over distributed cloud network.
Signal Process., 2021

Extended XOR-based visual cryptography schemes by integer linear program.
Signal Process., 2021

RRG-GAN Restoring Network for Simple Lens Imaging System.
Sensors, 2021

Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.
J. Inf. Secur. Appl., 2021

LF<sup>3</sup>Net: Leader-follower feature fusing network for fast saliency detection.
Neurocomputing, 2021

Cascaded hourglass feature fusing network for saliency detection.
Neurocomputing, 2021

Imaging-compatible oral retractor system for use in image-guided transoral robotic surgery.
Proceedings of the Medical Imaging 2021: Image-Guided Procedures, 2021

2020
Reweighted Price Relative Tracking System for Automatic Portfolio Optimization.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Phantom Studies of Fused-Data TREIT Using Only Biopsy-Probe Electrodes.
IEEE Trans. Medical Imaging, 2020

A System for Characterizing Intraoperative Force Distribution During Operative Laryngoscopy.
IEEE Trans. Biomed. Eng., 2020

A general framework for partial reversible data hiding using hamming code.
Signal Process., 2020

Sharing and hiding a secret image in color palette images with authentication.
Multim. Tools Appl., 2020

High capacity partial reversible data hiding by hamming code.
Multim. Tools Appl., 2020

Probabilistic color visual cryptography schemes for black and white secret images.
J. Vis. Commun. Image Represent., 2020

Loss Control with Rank-one Covariance Estimate for Short-term Portfolio Optimization.
J. Mach. Learn. Res., 2020

A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy.
J. Inf. Secur. Appl., 2020

Bifurcation Analysis for a Food Chain Model with Nonmonotonic Nutrition Conversion Rate of Predator to Top Predator.
Int. J. Bifurc. Chaos, 2020

Select Good Regions for Deblurring based on Convolutional Neural Networks.
CoRR, 2020

Computational Performance of a Germline Variant Calling Pipeline for Next Generation Sequencing.
CoRR, 2020

Estimating tongue deformation during laryngoscopy using hybrid FEM-multibody model and intraoperative tracking: a cadaver pilot study.
Proceedings of the Medical Imaging 2020: Image-Guided Procedures, 2020

Development of a novel tumor phantom model for head and neck squamous cell carcinoma and its applications.
Proceedings of the Medical Imaging 2020: Image-Guided Procedures, 2020

2019
Invertible secret image sharing with steganography and authentication for AMBTC compressed images.
Signal Process. Image Commun., 2019

Random grid based color visual cryptography scheme for black and white secret images with general access structures.
Signal Process. Image Commun., 2019

Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism.
Signal Process., 2019

Research of a Radar Imaging Algorithm Based on High Pulse Repetition Random Frequency Hopping Synthetic Wideband Waveform.
Sensors, 2019

A combination of color-black-and-white visual cryptography and polynomial based secret image sharing.
J. Vis. Commun. Image Represent., 2019

A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image.
J. Vis. Commun. Image Represent., 2019

Progress and Challenges for Live-cell Imaging of Genomic Loci Using CRISPR-based Platforms.
Genom. Proteom. Bioinform., 2019

Partial reversible AMBTC-based secret image sharing with steganography.
Digit. Signal Process., 2019

Improving target localization during trans-oral surgery with use of intraoperative imaging.
Int. J. Comput. Assist. Radiol. Surg., 2019

Integrating Social Circles and Network Representation Learning for Item Recommendation.
Proceedings of the International Joint Conference on Neural Networks, 2019

Multi-modal Framework for Image-guided Trans-oral Surgery with Intraoperative Imaging and Deformation Modeling.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Margin Constraint for Low-Shot Learning.
Proceedings of the Pattern Recognition - 5th Asian Conference, 2019

2018
Improving recovered image quality in secret image sharing by simple modular arithmetic.
Signal Process. Image Commun., 2018

Adopting secret sharing for reversible data hiding in encrypted images.
Signal Process., 2018

Trend representation based log-density regularization system for portfolio optimization.
Pattern Recognit., 2018

Reversible data hiding in encrypted images with private-key homomorphism and public-key homomorphism.
J. Vis. Commun. Image Represent., 2018

Short-term Sparse Portfolio Optimization Based on Alternating Direction Method of Multipliers.
J. Mach. Learn. Res., 2018

Progressive Scrambling for Social Media.
Int. J. Digit. Crime Forensics, 2018

Geometrically Invariant Image Watermarking Using Histogram Adjustment.
Int. J. Digit. Crime Forensics, 2018

Clustering of Directions Improves Goodness of Fit in Kinematic Data Collected in the Transverse Plane During Robot-Assisted Rehabilitation of Stroke Patients.
Frontiers Robotics AI, 2018

A kernel-based trend pattern tracking system for portfolio optimization.
Data Min. Knowl. Discov., 2018

Intraoperative deformation during laryngoscopy of irradiated and non-irradiated patients.
Proceedings of the Medical Imaging 2018: Image-Guided Procedures, 2018

2017
Analyzing the Potential Risk of Climate Change on Lyme Disease in Eastern Ontario, Canada Using Time Series Remotely Sensed Temperature Data and Tick Population Modelling.
Remote. Sens., 2017

Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options.
J. Vis. Commun. Image Represent., 2017

The State-of-the-Art Technology of Currency Identification: A Comparative Study.
Int. J. Digit. Crime Forensics, 2017

Engineering Novel Molecular Beacon Constructs to Study Intracellular RNA Dynamics and Localization.
Genom. Proteom. Bioinform., 2017

Control of parallel-connected grid-side converters of a wind turbine with real-time ethernet.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

2016
Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer.
J. Vis. Commun. Image Represent., 2016

On Improving Homomorphic Encryption-Based Reversible Data Hiding.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Non-expansible XOR-based visual cryptography scheme with meaningful shares.
Signal Process., 2015

Low-rank approach for image nonblind deconvolution with variance estimation.
J. Electronic Imaging, 2015

Fast Human Detection Using Deformable Part Model at the Selected Candidate Detection Positions.
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015

A multimodal imaging framework for enhanced robot-assisted partial nephrectomy guidance.
Proceedings of the Medical Imaging 2015: Image-Guided Procedures, 2015

2014
Extended Capabilities for XOR-Based Visual Cryptography.
IEEE Trans. Inf. Forensics Secur., 2014

High-capacity reversible data hiding in encrypted images by prediction error.
Signal Process., 2014

Improved tagged visual cryptography by random grids.
Signal Process., 2014

2013
Generalized Random Grid and Its Applications in Visual Cryptography.
IEEE Trans. Inf. Forensics Secur., 2013

Improving the visual quality of random grid-based visual secret sharing.
Signal Process., 2013

Random grid-based visual secret sharing with abilities of OR and XOR decryptions.
J. Vis. Commun. Image Represent., 2013

Improving the visual quality of random grid-based visual secret sharing via error diffusion.
J. Vis. Commun. Image Represent., 2013

Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform.
J. Syst. Softw., 2013

Robust copyright protection scheme for digital images using overlapping DCT and SVD.
Appl. Soft Comput., 2013

Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Improved Tagged Visual Cryptograms by Using Random Grids.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

XOR-based meaningful visual secret sharing by generalized random grids.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Random grid-based visual secret sharing for general access structures with cheat-preventing ability.
J. Syst. Softw., 2012

A user-friendly secret image sharing scheme with reversible steganography based on cellular automata.
J. Syst. Softw., 2012

Visual secret sharing for general access structures by random grids.
IET Inf. Secur., 2012

2010
A basis-background subtraction method using non-negative matrix factorization.
Proceedings of the Second International Conference on Digital Image Processing, 2010

Data Hiding in Block Truncation Coding.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Edge Clique Partition of K 4-Free and Planar Graphs.
Proceedings of the Computational Geometry, Graphs and Applications, 2010

2005
The Research of a Teaching Assistant System Based on Artificial Psychology.
Proceedings of the Affective Computing and Intelligent Interaction, 2005

2004
Remote sensing monitoring on dynamic status of grassland productivity and animal loading balance in Northern China.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004


  Loading...