Xun Lin

Orcid: 0000-0001-8387-4245

According to our database1, Xun Lin authored at least 29 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024

Exposing image splicing traces in scientific publications via uncertainty-guided refinement.
Patterns, 2024

BFL-SA: Blockchain-based federated learning via enhanced secure aggregation.
J. Syst. Archit., 2024

SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain.
IEEE Internet Things J., 2024

EH-former: Regional easy-hard-aware transformer for breast lesion segmentation in ultrasound images.
Inf. Fusion, 2024

Transferable Adversarial Attacks on SAM and Its Downstream Models.
CoRR, 2024

DAAD: Dynamic Analysis and Adaptive Discriminator for Fake News Detection.
CoRR, 2024

Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations.
CoRR, 2024

HideMIA: Hidden Wavelet Mining for Privacy-Enhancing Medical Image Analysis.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

CPL-CLIP: Compound Prompt Learning for Flexible-Modal Face Anti-Spoofing.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

DDAP: Dual-Domain Anti-Personalization against Text-to-Image Diffusion Models.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Flexible-Modal Deception Detection with Audio-Visual Adapter.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
CDS-Net: Cooperative dual-stream network for image manipulation detection.
Pattern Recognit. Lett., December, 2023

Image manipulation detection by multiple tampering traces and edge artifact enhancement.
Pattern Recognit., 2023

Biomedical Image Splicing Detection using Uncertainty-Guided Refinement.
CoRR, 2023

2020
Social car: The research of interaction design on the driver's communication system.
Concurr. Comput. Pract. Exp., 2020

Impact of Environmental Education with VR Equipment on Learning Performance and Environmental Identity.
Proceedings of the Cyber Security Intelligence and Analytics, 2020

2019
A Distributed Approach towards Discriminative Distance Metric Learning.
CoRR, 2019

2018
When guanxi meets connectivity: The underlying mechanisms of young adults' participation in micro-charity.
J. Inf. Commun. Ethics Soc., 2018

Virtual Reality, Visual Cliffs, and Movement Disorders.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2015
A Distributed Approach Toward Discriminative Distance Metric Learning.
IEEE Trans. Neural Networks Learn. Syst., 2015

2011
A Novel Method for Origin-Destination Flow Computation Based on Distributed Network Monitoring.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2009
China's E-business Model Innovation Analysis.
J. Comput., 2009

2008
A New Algorithm for Finding Convex Hull with a Maximum Pitch of the Dynamical Base Line.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

An Improved Scheme for E-signature Techniques Based on Digital Encryption and Information Hiding.
Proceedings of the International Symposium on Information Processing, 2008

Discovering Focused Information and Mining Information Focus Based on Isomorphic Information Temperature.
Proceedings of the International Symposium on Information Processing, 2008

A Multiple Evolutionary Neural Network Classifier Based on Niche Genetic Algorithm.
Proceedings of the Fourth International Conference on Natural Computation, 2008

k-Anonymity via Clustering Domain Knowledge for Privacy Preservation.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008


  Loading...