default search action
Xuyu Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Yu Ren, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Reversible data hiding in encrypted images based on secret sharing and hierarchical embedding. Comput. Electr. Eng. 119: 109567 (2024) - [j38]Youyuan Xue, Yun Tan, Ling Tan, Jiaohua Qin, Xuyu Xiang:
Generating radiology reports via auxiliary signal guidance and a memory-driven network. Expert Syst. Appl. 237(Part B): 121260 (2024) - [j37]Yun Tan, Chunzhi Li, Jiaohua Qin, Youyuan Xue, Xuyu Xiang:
Medical Image Description Based on Multimodal Auxiliary Signals and Transformer. Int. J. Intell. Syst. 2024: 1-12 (2024) - [j36]Yang Tan, Xuyu Xiang, Jiaohua Qin, Yun Tan:
Robust coverless image steganography based on human pose estimation. Knowl. Based Syst. 296: 111873 (2024) - [j35]Bowen Zhang, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Learning continuation: Integrating past knowledge for contrastive distillation. Knowl. Based Syst. 304: 112573 (2024) - 2023
- [j34]Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Privacy-Preserving Image Retrieval Based on Disordered Local Histograms and Vision Transformer in Cloud Computing. Int. J. Intell. Syst. 2023: 1-16 (2023) - [j33]Wentao Ma, Tongqing Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, Zhiping Cai:
Adaptive multi-feature fusion via cross-entropy normalization for effective image retrieval. Inf. Process. Manag. 60(1): 103119 (2023) - [j32]Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan, Jia Peng:
A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J. Inf. Secur. Appl. 73: 103440 (2023) - [j31]Nan Li, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Robust coverless video steganography based on inter-frame keypoint matching. J. Inf. Secur. Appl. 79: 103653 (2023) - [j30]Tao Hu, Xuyu Xiang, Jiaohua Qin, Yun Tan:
Audio-text retrieval based on contrastive learning and collaborative attention mechanism. Multim. Syst. 29(6): 3625-3638 (2023) - 2022
- [j29]Wentao Ma, Tongqing Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, Zhiping Cai:
A privacy-preserving content-based image retrieval method based on deep learning in cloud computing. Expert Syst. Appl. 203: 117508 (2022) - [j28]Qingyang Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, Yu Ren:
MOLS-Net: Multi-organ and lesion segmentation network based on sequence feature pyramid and attention mechanism for aortic dissection diagnosis. Knowl. Based Syst. 239: 107853 (2022) - [j27]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
A Robust Coverless Steganography Scheme Using Camouflage Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4038-4051 (2022) - 2021
- [j26]Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang, Zhibin He:
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF. Int. J. Digit. Crime Forensics 13(4): 40-56 (2021) - [j25]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. KSII Trans. Internet Inf. Syst. 15(3): 1078-1099 (2021) - [j24]Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan:
A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. Multim. Syst. 27(3): 403-415 (2021) - [j23]Yun Tan, Jiaohua Qin, Xuyu Xiang, Chunhu Zhang, Zhangdong Wang:
Coverless Steganography Based on Motion Analysis of Video. Secur. Commun. Networks 2021: 5554058:1-5554058:16 (2021) - [j22]Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Coverless Image Steganography Based on Multi-Object Recognition. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2779-2791 (2021) - [c2]Jiaohua Qin, Jing Wang, Jun Sun, Xuyu Xiang, Lin Xiang:
Coverless Image Information Hiding Based on Deep Convolution Features. NCTCS 2021: 15-30 - 2020
- [j21]Jiaohua Qin, Wenyan Pan, Xuyu Xiang, Yun Tan, Guimin Hou:
A biological image classification method based on improved CNN. Ecol. Informatics 58: 101093 (2020) - [j20]Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang, Guimin Hou:
A video coverless information hiding algorithm based on semantic segmentation. EURASIP J. Image Video Process. 2020(1): 23 (2020) - [j19]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu:
Coverless image steganography based on DenseNet feature mapping. EURASIP J. Image Video Process. 2020(1): 39 (2020) - [j18]Jianhua Chen, Jiaohua Qin, Xuyu Xiang, Yun Tan:
A new encrypted image retrieval method based on feature fusion in cloud computing. Int. J. Comput. Sci. Eng. 22(1): 114-123 (2020) - [j17]Yun Tan, Jiaohua Qin, Xuyu Xiang, Wentao Ma:
A sparse system identification algorithm based on fractional order LMS. Int. J. Embed. Syst. 13(3): 255-263 (2020) - [j16]Jingwen Liu, Junshan Tan, Jiaohua Qin, Xuyu Xiang:
Smoke Image Recognition Method Based on the optimization of SVM parameters with Improved Fruit Fly Algorithm. KSII Trans. Internet Inf. Syst. 14(8): 3534-3549 (2020) - [j15]Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan, Qiang Liu, Lingyun Xiang:
Coverless real-time image information hiding based on image block matching and dense convolutional network. J. Real Time Image Process. 17(1): 125-135 (2020) - [j14]Jiaohua Qin, Jianhua Chen, Xuyu Xiang, Yun Tan, Wentao Ma, Jing Wang:
A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion. J. Real Time Image Process. 17(1): 161-173 (2020) - [j13]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Junshan Tan, Yuanjing Luo:
Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. Knowl. Based Syst. 192: 105375 (2020)
2010 – 2019
- 2019
- [j12]Jiaohua Qin, Hao Li, Xuyu Xiang, Yun Tan, Wenyan Pan, Wentao Ma, Neal N. Xiong:
An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing. IEEE Access 7: 24626-24633 (2019) - [j11]Yun Tan, Jiaohua Qin, Xuyu Xiang, Wentao Ma, Wenyan Pan, Neal N. Xiong:
A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding. IEEE Access 7: 25026-25036 (2019) - [j10]Wenyan Pan, Jiaohua Qin, Xuyu Xiang, Yan Wu, Yun Tan, Lingyun Xiang:
A Smart Mobile Diagnosis System for Citrus Diseases Based on Densely Connected Convolutional Networks. IEEE Access 7: 87534-87542 (2019) - [j9]Jiaohua Qin, Yuanjing Luo, Xuyu Xiang, Yun Tan, Huajun Huang:
Coverless Image Steganography: A Survey. IEEE Access 7: 171372-171394 (2019) - 2018
- [j8]Hao Li, Jiaohua Qin, Xuyu Xiang, Lili Pan, Wentao Ma, Neal N. Xiong:
An Efficient Image Matching Algorithm Based on Adaptive Threshold and RANSAC. IEEE Access 6: 66963-66971 (2018) - [j7]Lili Pan, Tiane Wang, Jiaohua Qin, Xuyu Xiang:
A dynamic test prioritisation based on DU-chain coverage for regression testing. Int. J. Embed. Syst. 10(2): 113-119 (2018) - [j6]Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan:
An Image Retrieval Algorithm Based on Gist and Sift Features. Int. J. Netw. Secur. 20(4): 609-616 (2018) - [c1]Yun Tan, Jiaohua Qin, Ling Tan, Hao Tang, Xuyu Xiang:
A Survey on the New Development of Medical Image Security Algorithms. ICCCS (3) 2018: 458-467 - 2017
- [j5]Lili Pan, Tiane Wang, Jiaohua Qin, Xuyu Xiang:
基于定值-引用链的测试用例优先级排序算法 (Test Case Prioritization Based on DU Chains). 计算机科学 44(4): 173-176 (2017) - 2016
- [j4]Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang:
Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT. Int. J. Netw. Secur. 18(6): 1102-1108 (2016)
2000 – 2009
- 2009
- [j3]Weiyang Chen, Bo Liao, Wen Zhu, Xuyu Xiang:
Multiple sequence alignment algorithm based on a dispersion graph and ant colony algorithm. J. Comput. Chem. 30(13): 2031-2038 (2009) - [j2]Jiaohua Qin, Xingming Sun, Xuyu Xiang, Changming Niu:
Principal feature selection and fusion method for image steganalysis. J. Electronic Imaging 18(3): 033009 (2009) - 2006
- [j1]Bo Liao, Xuyu Xiang, Wen Zhu:
Coronavirus phylogeny based on 2D graphical representation of DNA sequence. J. Comput. Chem. 27(11): 1196-1202 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint