


default search action
Xun Lin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j17]Yizhong Liu
, Boyu Zhao
, Xun Lin
, Zhenyu Guan
, Dawei Li
, Jianwei Liu
, Qianhong Wu
, Willy Susilo
, Robert H. Deng
:
Quantum-Resistant Sharding Blockchain and Its Application in Secure Data Transmission. IEEE J. Sel. Areas Commun. 43(8): 2732-2746 (2025)
[j16]Xun Lin
, Ajian Liu
, Zitong Yu
, Rizhao Cai
, Shuai Wang
, Yi Yu
, Jun Wan
, Zhen Lei
, Xiaochun Cao
, Alex C. Kot
:
Reliable and Balanced Transfer Learning for Generalized Multimodal Face Anti-Spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 47(9): 7608-7625 (2025)
[j15]Rizhao Cai, Yawen Cui, Zitong Yu, Xun Lin, Changsheng Chen, Alex C. Kot:
Rehearsal-Free and Efficient Continual Learning for Cross-Domain Face Anti-Spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 47(12): 11348-11365 (2025)
[j14]Yi Yu
, Song Xia, Xun Lin
, Chenqi Kong
, Wenhan Yang
, Shijian Lu
, Yap-Peng Tan, Alex C. Kot
:
Toward Model Resistant to Transferable Adversarial Examples via Trigger Activation. IEEE Trans. Inf. Forensics Secur. 20: 3745-3757 (2025)
[j13]Xin Guo
, Wenzhong Tang
, Haoran Wang
, Jiale Wang
, Shuai Wang
, Xiaolei Qu
, Xun Lin
:
MorFormer: Morphology-Aware Transformer for Generalized Pavement Crack Segmentation. IEEE Trans. Intell. Transp. Syst. 26(6): 8219-8232 (2025)
[c19]Yi Yu, Song Xia, Xun Lin, Wenhan Yang, Shijian Lu, Yap-Peng Tan, Alex C. Kot:
Backdoor Attacks Against No-Reference Image Quality Assessment Models via a Scalable Trigger. AAAI 2025: 9698-9706
[c18]Zhe Chen, Xun Lin, Yawen Cui, Zitong Yu:
EPE-P: Evidence-based Parameter-efficient Prompting for Multimodal Learning with Missing Modalities. ICASSP 2025: 1-5
[c17]Yingjie Ma, Zitong Yu, Xun Lin, Weicheng Xie, Linlin Shen:
Big-Moe: Bypassing Isolated Gating For Generalized Multimodal Face Anti-Spoofing. ICASSP 2025: 1-5
[c16]Shuaiyu Zhang, Xun Lin, Rongxiang Zhang, Yu Bai, Yong Xu, Tao Tan, Xubin Zheng, Zitong Yu:
AdaMHF: Adaptive Multimodal Hierarchical Fusion for Survival Prediction. ICME 2025: 1-6
[c15]Yizhong Liu
, Zedan Zhao
, Boyu Zhao
, Feiang Ran
, Xun Lin
, Dawei Li
, Zhenyu Guan
:
Fully Anonymous Decentralized Identity Supporting Threshold Traceability with Practical Blockchain. WWW 2025: 3628-3638
[i18]Jingyi Yang, Xun Lin, Zitong Yu, Liepiao Zhang, Xin Liu, Hui Li, Xiaochen Yuan, Xiaochun Cao:
DADM: Dual Alignment of Domain and Modality for Face Anti-spoofing. CoRR abs/2503.00429 (2025)
[i17]Shuaiyu Zhang, Xun Lin, Rongxiang Zhang, Yu Bai, Yong Xu, Tao Tan, Xunbin Zheng, Zitong Yu:
AdaMHF: Adaptive Multimodal Hierarchical Fusion for Survival Prediction. CoRR abs/2503.21124 (2025)
[i16]Yi Yu, Song Xia, Xun Lin, Chenqi Kong, Wenhan Yang, Shijian Lu, Yap-Peng Tan, Alex C. Kot:
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation. CoRR abs/2504.14541 (2025)
[i15]Hongyang Wang, Yichen Shi, Zhuofu Tao, Yuhao Gao, Liepiao Zhang, Xun Lin, Jun Feng, Xiaochen Yuan, Zitong Yu, Xiaochun Cao:
FaceShield: Explainable Face Anti-Spoofing with Multimodal Large Language Models. CoRR abs/2505.09415 (2025)
[i14]Yingjie Ma, Xun Lin, Zitong Yu, Xin Liu, Xiaochen Yuan, Weicheng Xie, Linlin Shen:
Denoising and Alignment: Rethinking Domain Generalization for Multimodal Face Anti-Spoofing. CoRR abs/2505.09484 (2025)
[i13]Jiale Zhou, Wenhan Wang, Shikun Li, Xiaolei Qu, Xin Guo, Yizhong Liu, Wenzhong Tang, Xun Lin, Yefeng Zheng:
TopoTTA: Topology-Enhanced Test-Time Adaptation for Tubular Structure Segmentation. CoRR abs/2508.00442 (2025)
[i12]Xun Lin, Xiaobao Guo, Taorui Wang, Yingjie Ma, Jiajian Huang, Jiayu Zhang, Junzhe Cao, Zitong Yu:
SVC 2025: the First Multimodal Deception Detection Challenge. CoRR abs/2508.04129 (2025)
[i11]Xinxin Xing, Yizhong Liu, Boyang Liao, Jianwei Liu, Bin Hu, Xun Lin, Yuan Lu, Tianwei Zhang:
GoSSamer: Lightweight and Linear-Communication Asynchronous (Dynamic Proactive) Secret Sharing and the Applications. IACR Cryptol. ePrint Arch. 2025: 1516 (2025)- 2024
[j12]Zeyu Cai
, Ru Hong
, Xun Lin, Jiming Yang, Youliang Ni, Zhen Liu, Chengqian Jin, Feipeng Da:
A MLP architecture fusing RGB and CASSI for computational spectral imaging. Comput. Vis. Image Underst. 249: 104214 (2024)
[j11]Xiaolei Qu, Jiale Zhou
, Jue Jiang, Wenhan Wang, Haoran Wang, Shuai Wang, Wenzhong Tang, Xun Lin
:
EH-former: Regional easy-hard-aware transformer for breast lesion segmentation in ultrasound images. Inf. Fusion 109: 102430 (2024)
[j10]Yizhong Liu
, Boyu Zhao
, Zedan Zhao, Jianwei Liu
, Xun Lin, Qianhong Wu
, Willy Susilo
:
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain. IEEE Internet Things J. 11(15): 25694-25705 (2024)
[j9]Yizhong Liu
, Zixiao Jia, Zixu Jiang, Xun Lin, Jianwei Liu, Qianhong Wu, Willy Susilo
:
BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. J. Syst. Archit. 152: 103163 (2024)
[j8]Xun Lin
, Wenzhong Tang
, Haoran Wang, Yizhong Liu, Yakun Ju, Shuai Wang, Zitong Yu:
Exposing image splicing traces in scientific publications via uncertainty-guided refinement. Patterns 5(9): 101038 (2024)
[j7]Yizhong Liu
, Xinxin Xing
, Ziheng Tong
, Xun Lin
, Jing Chen
, Zhenyu Guan
, Qianhong Wu
, Willy Susilo
:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 2603-2618 (2024)
[c14]Xun Lin, Shuai Wang, Rizhao Cai, Yizhong Liu, Ying Fu, Wenzhong Tang
, Zitong Yu, Alex C. Kot:
Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing. CVPR 2024: 211-221
[c13]Zhaoxu Li, Zitong Yu, Xun Lin, Nithish Muthuchamy Selvaraj, Xiaobao Guo, Bingquan Shen, Adams Wai-Kin Kong, Alex C. Kot:
Flexible-Modal Deception Detection with Audio-Visual Adapter. IJCB 2024: 1-10
[c12]Jing Yang, Runping Xi, Yingxin Lai, Xun Lin, Zitong Yu:
DDAP: Dual-Domain Anti-Personalization against Text-to-Image Diffusion Models. IJCB 2024: 1-10
[c11]Ying Zhang, Xiangyu Zhu
, Ajian Liu, Xun Lin, Jun Wan, Jing Zhang, Zhen Lei:
CPL-CLIP: Compound Prompt Learning for Flexible-Modal Face Anti-Spoofing. IJCB 2024: 1-10
[c10]Xun Lin
, Yi Yu
, Zitong Yu
, Ruohan Meng
, Jiale Zhou
, Ajian Liu
, Yizhong Liu
, Shuai Wang
, Wenzhong Tang
, Zhen Lei
, Alex C. Kot
:
HideMIA: Hidden Wavelet Mining for Privacy-Enhancing Medical Image Analysis. ACM Multimedia 2024: 8110-8119
[c9]Song Xia, Wenhan Yang, Yi Yu, Xun Lin, Henghui Ding, Lingyu Duan, Xudong Jiang:
Transferable Adversarial Attacks on SAM and Its Downstream Models. NeurIPS 2024
[i10]Xun Lin, Shuai Wang, Rizhao Cai, Yizhong Liu, Ying Fu, Zitong Yu, Wenzhong Tang, Alex C. Kot:
Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing. CoRR abs/2402.19298 (2024)
[i9]Xun Lin, Yi Yu, Song Xia, Jue Jiang, Haoran Wang, Zitong Yu, Yizhong Liu, Ying Fu, Shuai Wang, Wenzhong Tang, Alex C. Kot:
Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations. CoRR abs/2403.14250 (2024)
[i8]Jing Yang, Runping Xi, Yingxin Lai, Xun Lin, Zitong Yu:
DDAP: Dual-Domain Anti-Personalization against Text-to-Image Diffusion Models. CoRR abs/2407.20141 (2024)
[i7]Xinqi Su, Yawen Cui, Ajian Liu, Xun Lin, Yuhao Wang, Haochen Liang, Wenhui Li, Zitong Yu:
DAAD: Dynamic Analysis and Adaptive Discriminator for Fake News Detection. CoRR abs/2408.10883 (2024)
[i6]Song Xia, Wenhan Yang, Yi Yu, Xun Lin, Henghui Ding, Lingyu Duan, Xudong Jiang:
Transferable Adversarial Attacks on SAM and Its Downstream Models. CoRR abs/2410.20197 (2024)
[i5]Yi Yu, Song Xia, Xun Lin, Wenhan Yang, Shijian Lu, Yap-Peng Tan, Alex C. Kot:
Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger. CoRR abs/2412.07277 (2024)
[i4]Zhe Chen, Xun Lin, Yawen Cui, Zitong Yu:
EPE-P: Evidence-based Parameter-efficient Prompting for Multimodal Learning with Missing Modalities. CoRR abs/2412.17677 (2024)
[i3]Yingjie Ma, Zitong Yu, Xun Lin, Weicheng Xie, Linlin Shen:
BIG-MoE: Bypass Isolated Gating MoE for Generalized Multimodal Face Anti-Spoofing. CoRR abs/2412.18065 (2024)- 2023
[j6]Xun Lin
, Shuai Wang, Jiahao Deng, Ying Fu, Xiao Bai, Xinlei Chen, Xiaolei Qu, Wenzhong Tang:
Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recognit. 133: 109026 (2023)
[j5]Haoran Wang, Jiahao Deng, Xun Lin, Wenzhong Tang, Shuai Wang
:
CDS-Net: Cooperative dual-stream network for image manipulation detection. Pattern Recognit. Lett. 176: 167-173 (2023)
[i2]Xun Lin, Wenzhong Tang, Shuai Wang, Zitong Yu, Yizhong Liu, Haoran Wang, Ying Fu, Alex C. Kot:
Biomedical Image Splicing Detection using Uncertainty-Guided Refinement. CoRR abs/2309.16388 (2023)- 2020
[j4]Zhao Yu
, Xun Lin:
Social car: The research of interaction design on the driver's communication system. Concurr. Comput. Pract. Exp. 32(6) (2020)
[c8]Zhao Yu, Xun Lin:
Impact of Environmental Education with VR Equipment on Learning Performance and Environmental Identity. CSIA (2) 2020: 3-9
2010 – 2019
- 2019
[i1]Jun Li, Xun Lin, Xiaoguang Rui, Yong Rui, Dacheng Tao:
A Distributed Approach towards Discriminative Distance Metric Learning. CoRR abs/1905.05177 (2019)- 2018
[j3]Xun Lin, Hua Huang:
When guanxi meets connectivity: The underlying mechanisms of young adults' participation in micro-charity. J. Inf. Commun. Ethics Soc. 16(1): 32-44 (2018)
[c7]Rachneet Kaur
, Xun Lin, Alexander Layton, Manuel E. Hernandez, Richard B. Sowers
:
Virtual Reality, Visual Cliffs, and Movement Disorders. EMBC 2018: 81-84- 2015
[j2]Jun Li
, Xun Lin, Xiaoguang Rui, Yong Rui, Dacheng Tao
:
A Distributed Approach Toward Discriminative Distance Metric Learning. IEEE Trans. Neural Networks Learn. Syst. 26(9): 2111-2122 (2015)- 2011
[c6]Peng Ou, Zhishu Li, Xun Lin:
A Novel Method for Origin-Destination Flow Computation Based on Distributed Network Monitoring. ICFCE 2011: 529-536
2000 – 2009
- 2009
[j1]Qihai Zhou, Yujun Li, Zhuma Pudu, Xun Lin:
China's E-business Model Innovation Analysis. J. Comput. 4(6): 527-534 (2009)- 2008
[c5]Taiyong Li
, Changjie Tang, Jiang Wu, Qian Luo, Shengzhi Li, Xun Lin, Jie Zuo:
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation. FSKD (4) 2008: 697-701
[c4]Jiang Wu, Changjie Tang, Taiyong Li
, Yue Jiang, Shangyu Ye, Xun Lin, Jie Zuo:
A Multiple Evolutionary Neural Network Classifier Based on Niche Genetic Algorithm. ICNC (3) 2008: 405-409
[c3]Qihai Zhou, Tao Huang, Yuanxin Zhang, Hongyu Wu, Zhongjun Li, Xun Lin:
Discovering Focused Information and Mining Information Focus Based on Isomorphic Information Temperature. ISIP 2008: 139-143
[c2]Tao Huang, Qihai Zhou, Le Zhang, Zhongjun Li, Xun Lin:
An Improved Scheme for E-signature Techniques Based on Digital Encryption and Information Hiding. ISIP 2008: 593-597
[c1]Qihai Zhou, Tao Huang, Hongyu Wu, Zhongjun Li, Xun Lin:
A New Algorithm for Finding Convex Hull with a Maximum Pitch of the Dynamical Base Line. WKDD 2008: 630-634
Coauthor Index
aka: Alex C. Kot

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-13 22:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







