Xin Liao

Orcid: 0000-0002-9131-0578

According to our database1, Xin Liao authored at least 115 papers between 1999 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective.
ACM Comput. Surv., March, 2025

2024
Adaptive Synthesized Fault-Tolerant Autonomous Ground Vehicle Control With Guaranteed Performance and Saturated Input.
IEEE Trans. Veh. Technol., November, 2024

Segmented Hash-Based Privacy-Preserving Image Retrieval Scheme in Cloud-Assisted IoT.
IEEE Internet Things J., November, 2024

Face Forgery Detection via Multi-Feature Fusion and Local Enhancement.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

Vocoder Detection of Spoofing Speech Based on GAN Fingerprints and Domain Generalization.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024

Amount-Based Covert Communication Over Blockchain.
IEEE Trans. Netw. Serv. Manag., June, 2024

Generative Steganography via Live Comments on Streaming Video Frames.
IEEE Trans. Comput. Soc. Syst., June, 2024

Time-dependent reliability-based design optimization of main shaft bearings in wind turbines involving mixed-integer variables.
Reliab. Eng. Syst. Saf., March, 2024

A visually secure image encryption algorithm based on block compressive sensing and deep neural networks.
Multim. Tools Appl., March, 2024

A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system.
Multim. Tools Appl., January, 2024

Screen-Shooting Resistant Watermarking With Grayscale Deviation Simulation.
IEEE Trans. Multim., 2024

Image Dehazing Assessment: A Real-World Dataset and a Haze Density-Aware Criteria.
IEEE Trans. Multim., 2024

Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping.
IEEE Trans. Inf. Forensics Secur., 2024

Semi-supervised pathological image segmentation via cross distillation of multiple attentions and Seg-CAM consistency.
Pattern Recognit., 2024

Prognosis prediction of high grade serous adenocarcinoma based on multi-modal convolution neural network.
Neural Comput. Appl., 2024

Dynamic Mining of Consumer Demand via Online Hotel Reviews: A Hybrid Method.
J. Theor. Appl. Electron. Commer. Res., 2024

An Estimation of Distribution Based Algorithm for Continuous Distributed Constraint Optimization Problems.
Inf. Technol. Control., 2024

A DNN robust video watermarking method in dual-tree complex wavelet transform domain.
J. Inf. Secur. Appl., 2024

Multi-scale noise-guided progressive network for image splicing detection and localization.
Expert Syst. Appl., 2024

FDDM: Frequency-Decomposed Diffusion Model for Rectum Cancer Dose Prediction in Radiotherapy.
CoRR, 2024

An Adaptive Latent Factorization of Tensors Model for Embedding Dynamic Communication Network.
CoRR, 2024

Adaptive Learning of Consistency and Inconsistency Information for Fake News Detection.
CoRR, 2024

Compressed Deepfake Video Detection Based on 3D Spatiotemporal Trajectories.
CoRR, 2024

VLM-CPL: Consensus Pseudo Labels from Vision-Language Models for Human Annotation-Free Pathological Image Classification.
CoRR, 2024

Groundwater Level Prediction and Earthquake Precursor Anomaly Analysis Based on TCN-LSTM-Attention Network.
IEEE Access, 2024

OC-SAN: Unsupervised Deepfake Detection for Specific Individual Protection Based on Deep One-Class Classification.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

SafePaint: Anti-forensic Image Inpainting with Domain Adaptation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Multi-Strategy Adversarial Learning for Robust Face Forgery Detection Under Heterogeneous and Composite Attacks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
FAMM: Facial Muscle Motions for Detecting Compressed Deepfake Videos Over Social Networks.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

HAMIL: High-Resolution Activation Maps and Interleaved Learning for Weakly Supervised Segmentation of Histopathological Images.
IEEE Trans. Medical Imaging, October, 2023

Identification of image global processing operator chain based on feature decoupling.
Inf. Sci., August, 2023

DBGRU-SE: predicting drug-drug interactions based on double BiGRU and squeeze-and-excitation attention mechanism.
Briefings Bioinform., July, 2023

ACGIS: Adversarial Cover Generator for Image Steganography with Noise Residuals Features-Preserving.
Signal Process. Image Commun., April, 2023

Efficient color image encryption by color-grayscale conversion based on steganography.
Multim. Tools Appl., March, 2023

Superconvergence analysis of a linearized energy-conservative Galerkin method for the nonlinear Schrödinger equation with wave operator.
Comput. Math. Appl., March, 2023

SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Image Operation Chain Detection with Machine Translation Framework.
IEEE Trans. Multim., 2023

Multi-Dimensional Attention With Similarity Constraint for Weakly-Supervised Temporal Action Localization.
IEEE Trans. Multim., 2023

A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system.
Multim. Tools Appl., 2023

Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces.
CoRR, 2023

CTP-Net: Character Texture Perception Network for Document Image Forgery Localization.
CoRR, 2023

Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection.
CoRR, 2023

DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection.
CoRR, 2023

A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Semi-supervised Pathological Image Segmentation via Cross Distillation of Multiple Attentions.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

2022
Channel Attention Image Steganography With Generative Adversarial Networks.
IEEE Trans. Netw. Sci. Eng., 2022

PulseEdit: Editing Physiological Signals in Facial Videos for Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2022

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features.
IEEE Trans. Dependable Secur. Comput., 2022

Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Deformation Characteristics of Soil Layers and Diaphragm Walls during Deep Foundation Pit Excavation: Simulation Verification and Parameter Analysis.
Symmetry, 2022

A novel deep learning-based method for COVID-19 pneumonia detection from CT images.
BMC Medical Informatics Decis. Mak., 2022

Building a predictive model to identify clinical indicators for COVID-19 using machine learning method.
Medical Biol. Eng. Comput., 2022

A Particle Swarm with Local Decision Algorithm for Functional Distributed Constraint Optimization Problems.
Int. J. Pattern Recognit. Artif. Intell., 2022

Higher-Order Belief Propagation Correction Decoder for Polar Codes.
Entropy, 2022

A dual-population search differential evolution algorithm for functional distributed constraint optimization problems.
Ann. Math. Artif. Intell., 2022

Exploring Feature Coupling for Multiple Operations Type and Order Detection.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

River Turbidity Monitoring Based on Semi-supervised Transfer Learning.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Image source identification with known post-processed based on convolutional neural network.
Signal Process. Image Commun., 2021

Identifying tampering operations in image operator chains based on decision fusion.
Signal Process. Image Commun., 2021

Resampling parameter estimation via dual-filtering based convolutional neural network.
Multim. Syst., 2021

GIFMarking: The robust watermarking for animated GIF based deep learning.
J. Vis. Commun. Image Represent., 2021

Visually meaningful image encryption based on universal embedding model.
Inf. Sci., 2021

Using M-ary decomposition and virtual bits for visually meaningful image encryption.
Inf. Sci., 2021

First step towards parameters estimation of image operator chain.
Inf. Sci., 2021

An Efficient Paper Anti-Counterfeiting Method Based on Microstructure Orientation Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
A New Payload Partition Strategy in Color Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

An embedding strategy on fusing multiple image features for data hiding in multiple images.
J. Vis. Commun. Image Represent., 2020

Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network.
IEEE J. Sel. Top. Signal Process., 2020

Constructing 1-resilient rotation symmetric functions over 픽<sub>p</sub> with q variables through special orthogonal arrays.
Adv. Math. Commun., 2020

A Framework for Parameters Estimation of Image Operator Chain.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
High-fidelity reversible data hiding by Quadtree-based pixel value ordering.
Multim. Tools Appl., 2019

Real-time detecting one specific tampering operation in multiple operator chains.
J. Real Time Image Process., 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018

New cubic reference table based image steganography.
Multim. Tools Appl., 2018

分布式工作流环境下角色匹配的访问控制模型 (Role Matching Access Control Model for Distributed Workflow).
计算机科学, 2018

Medical JPEG image steganography based on preserving inter-block dependencies.
Comput. Electr. Eng., 2018

Two Embedding Strategies for Payload Distribution in Multiple Images Steganography.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Detectability of the Image Operation Order: Upsampling and Mean Filtering.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Data embedding in digital images using critical functions.
Signal Process. Image Commun., 2017

Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform.
Multim. Tools Appl., 2017

A game-theoretic method for designing distortion function in spatial steganography.
Multim. Tools Appl., 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Game-Theoretic Model for Content-Adaptive Image Steganography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Improved CMD Adaptive Image Steganography Method.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Content-adaptive steganalysis for color images.
Secur. Commun. Networks, 2016

A new nonconforming mixed finite element scheme for second order eigenvalue problem.
Appl. Math. Comput., 2016

Superconvergence analysis of conforming finite element method for nonlinear Schrödinger equation.
Appl. Math. Comput., 2016

2015
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels.
J. Vis. Commun. Image Represent., 2015

Nonconforming finite element analysis for Poisson eigenvalue problem.
Comput. Math. Appl., 2015

Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Improved WOW Adaptive Image Steganography Method.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
The lowest order characteristic mixed finite element scheme for convection-dominated diffusion problem.
Comput. Math. Appl., 2014

2013
Tail Properties and Asymptotic Expansions for the Maximum of the Logarithmic Skew-Normal Distribution.
J. Appl. Probab., 2013

Quantum Steganography with High Efficiency with Noisy Depolarizing Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Improving the Adaptive Steganographic Methods Based on Modulus Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

New Construction of Symmetric Orthogonal Arrays of Strength <i>t</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function.
Fundam. Informaticae, 2012

Reducing Scalability Collapse via Requester-Based Locking on Multicore Systems.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

2011
A steganographic method for digital images with four-pixel differencing and modified LSB substitution.
J. Vis. Commun. Image Represent., 2011

Distributed Steganography.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Multi-party covert communication with steganography and quantum secret sharing.
J. Syst. Softw., 2010

Research on collaborative design platform of Launch Vehicle based on desktop grid.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
Queuing Analysis on Adaptive Transmission in MIMO Systems with Imperfect CSI.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

2008
Embedding in Two Least Significant Bits with Wet Paper Coding.
IACR Cryptol. ePrint Arch., 2008

2007
An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

1999
Computer simulation of PEC network.
Simul. Pract. Theory, 1999


  Loading...