What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiangyang Luo
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
A novel blockchain-based anonymous roaming authentication scheme for VANET.
Xingxing Chen
Qingfeng Cheng
Weidong Yang
Xiangyang Luo
2025
journals/tifs
EIS-OBEA: Enhanced Image Steganalysis via Opposition-Based Evolutionary Algorithm.
Yuanyuan Ma
Lige Xu
Qianqian Zhang
Yi Zhang
Xianwei Xin
Xiangyang Luo
2025
journals/tifs
Generative Collision Attack on Deep Image Hashing.
Luyang Ying
Cheng Xiong
Chuan Qin
Xiangyang Luo
Zhenxing Qian
Xinpeng Zhang
2025
journals/tifs
CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones.
Jintian Zhang
Qingfeng Cheng
Xiaofeng Chen
Xiangyang Luo
2024
journals/compsec
WF3A: A N-shot website fingerprinting with effective fusion feature attention.
Zhiquan Wang
Tengyao Li
Meijuan Yin
Xiaoyun Yuan
Xiangyang Luo
Lingling Li
2024
journals/compsec
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Wangxin Feng
Xiangyang Luo
Tengyao Li
Chunfang Yang
2024
journals/istr
Trustworthy adaptive adversarial perturbations in social networks.
Jiawei Zhang
Jinwei Wang
Hao Wang
Xiangyang Luo
Bin Ma
2024
journals/istr
Adversarial watermark: A robust and reliable watermark against removal.
Jinwei Wang
Wanyun Huang
Jiawei Zhang
Xiangyang Luo
Bin Ma
2024
journals/tifs
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation.
Hao-Tian Wu
Yiu-Ming Cheung
Zhihong Tian
Dingcai Liu
Xiangyang Luo
Jiankun Hu
2024
journals/tifs
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
Zuomin Qu
Zuping Xi
Wei Lu
Xiangyang Luo
Qian Wang
Bin Li
2024
journals/tifs
Scalable Universal Adversarial Watermark Defending Against Facial Forgery.
Tong Qiao
Bin Zhao
Ran Shi
Meng Han
Mahmoud Hassaballah
Florent Retraint
Xiangyang Luo
2023
journals/compsec
A novel model watermarking for protecting generative adversarial network.
Tong Qiao
Yuyan Ma
Ning Zheng
Hanzhou Wu
Yanli Chen
Ming Xu
Xiangyang Luo
2023
journals/tifs
2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
Yuqian Ma
Qingfeng Cheng
Xiangyang Luo
2023
conf/ih
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning.
Gejian Zhao
Chuan Qin
Xiangyang Luo
Xinpeng Zhang
Chin-Chen Chang
2022
conf/ccs
Watch Out for Race Condition Attacks When Using Android External Storage.
Shaoyong Du
Xin Liu
Guoqing Lai
Xiangyang Luo
2021
conf/icics
Microblog User Location Inference Based on POI and Query Likelihood Model.
Yimin Liu
Xiangyang Luo
Han Li
2020
journals/istr
Image splicing detection based on convolutional neural network with weight combination strategy.
Jinwei Wang
Qiye Ni
Guangjie Liu
Xiangyang Luo
Sunil Kr. Jha
2019
journals/istr
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
Jinwei Wang
Yangyang Li
Jian Li
Xiangyang Luo
Yun-Qing Shi
Sunil Kr. Jha
2019
journals/istr
Attributes revocation through ciphertext puncturation.
Hongyong Jia
Yue Chen
Yan Li
Xincheng Yan
Fenlin Liu
Xiangyang Luo
Bo Wang
2019
journals/tifs
CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
Shuangke Wu
Yanjiao Chen
Qian Wang
Minghui Li
Cong Wang
Xiangyang Luo
2019
journals/tifs
: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
Qian Wang
Jing Huang
Yanjiao Chen
Cong Wang
Fu Xiao
Xiangyang Luo
2015
conf/ih
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.
Xiaofeng Song
Fenlin Liu
Chunfang Yang
Xiangyang Luo
Yi Zhang
2013
journals/tifs
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
Chunfang Yang
Fenlin Liu
Xiangyang Luo
Ying Zeng
2013
conf/ih
Embedding change rate estimation based on ensemble learning.
Zhenyu Li
Zongyun Hu
Xiangyang Luo
Bin Lu
2012
journals/compsec
Abstract interpretation-based semantic framework for software birthmark.
Ying Zeng
Fenlin Liu
Xiangyang Luo
Shiguo Lian
2009
conf/ih
Embedding Ratio Estimating for Each Bit Plane of Image.
Chunfang Yang
Xiangyang Luo
Fenlin Liu
2008
journals/tifs
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits.
Chunfang Yang
Fenlin Liu
Xiangyang Luo
Bin Liu
2004
conf/ih
An Improved Sample Pairs Method for Detection of LSB Embedding.
Peizhong Lu
Xiangyang Luo
Qingyang Tang
Shen Li
Coauthors
Bin Li
(1)
Bin Liu
(1)
Bin Lu
(1)
Bin Ma
(2)
Bin Zhao
(1)
Bo Wang
(1)
Cheng Xiong
(1)
Chin-Chen Chang
(1)
Chuan Qin
(2)
Chunfang Yang
(5)
Cong Wang
(2)
Dingcai Liu
(1)
Fenlin Liu
(6)
Florent Retraint
(1)
Fu Xiao
(1)
Gejian Zhao
(1)
Guangjie Liu
(1)
Guoqing Lai
(1)
Han Li
(1)
Hanzhou Wu
(1)
Hao Wang
(1)
Hao-Tian Wu
(1)
Hongyong Jia
(1)
Jian Li
(1)
Jiankun Hu
(1)
Jiawei Zhang
(2)
Jing Huang
(1)
Jintian Zhang
(1)
Jinwei Wang
(4)
Lige Xu
(1)
Lingling Li
(1)
Luyang Ying
(1)
Mahmoud Hassaballah
(1)
Meijuan Yin
(1)
Meng Han
(1)
Ming Xu
(1)
Minghui Li
(1)
Ning Zheng
(1)
Peizhong Lu
(1)
Qian Wang
(3)
Qianqian Zhang
(1)
Qingfeng Cheng
(3)
Qingyang Tang
(1)
Qiye Ni
(1)
Ran Shi
(1)
Shaoyong Du
(1)
Shen Li
(1)
Shiguo Lian
(1)
Shuangke Wu
(1)
Sunil Kr. Jha
(2)
Tengyao Li
(2)
Tong Qiao
(2)
Wangxin Feng
(1)
Wanyun Huang
(1)
Wei Lu
(1)
Weidong Yang
(1)
Xiangyang Luo
(28)
Xianwei Xin
(1)
Xiaofeng Chen
(1)
Xiaofeng Song
(1)
Xiaoyun Yuan
(1)
Xin Liu
(1)
Xincheng Yan
(1)
Xingxing Chen
(1)
Xinpeng Zhang
(2)
Yan Li
(1)
Yangyang Li
(1)
Yanjiao Chen
(2)
Yanli Chen
(1)
Yi Zhang
(2)
Yimin Liu
(1)
Ying Zeng
(2)
Yiu-Ming Cheung
(1)
Yuanyuan Ma
(1)
Yue Chen
(1)
Yun-Qing Shi
(1)
Yuqian Ma
(1)
Yuyan Ma
(1)
Zhenxing Qian
(1)
Zhenyu Li
(1)
Zhihong Tian
(1)
Zhiquan Wang
(1)
Zongyun Hu
(1)
Zuomin Qu
(1)
Zuping Xi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to