default search action
Lintao Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Lintao Liu, Kaimin Teng, Jie Yang, Haibo Chen:
Minimizers of fractional NLS energy functionals in $\mathbb {R}^{2}$. Comput. Appl. Math. 43(1): 23 (2024) - [j38]Xinchun Wu, Xiangyu Chen, Xiao Wang, Xiaojun Zhang, Shuxuan Yuan, Biao Sun, Xiaobing Huang, Lintao Liu:
A real-time framework for HD video defogging using modified dark channel prior. J. Real Time Image Process. 21(2): 55 (2024) - [j37]Feng Gao, Huiwen Hu, Lintao Liu, Guocheng Wang, Haozhe Sun:
Utilizing Normal Time-Frequency Transform-Assisted GNSS-R to Retrieve Sea Surface Height. IEEE Trans. Geosci. Remote. Sens. 62: 1-14 (2024) - 2023
- [j36]Yanji Yao, Zhimin Shi, Huiwen Hu, Jing Li, Guocheng Wang, Lintao Liu:
GSDerainNet: A Deep Network Architecture Based on a Gaussian Shannon Filter for Single Image Deraining. Remote. Sens. 15(19): 4825 (2023) - 2022
- [j35]Jingwen Cheng, Xuehu Yan, Lintao Liu, Yue Jiang, Xuan Wang:
Meaningful Secret Image Sharing with Saliency Detection. Entropy 24(3): 340 (2022) - [j34]Jingwen Cheng, Xuehu Yan, Lintao Liu, Yuyuan Sun, Fengyue Xing:
Comprehensive reversible secret image sharing with palette cover images. J. Inf. Secur. Appl. 68: 103233 (2022) - [j33]Dong Ren, Yong Wang, Guocheng Wang, Lintao Liu:
Fusion of CMONOC and ERA5 PWV Products Based on Backpropagation Neural Network. Remote. Sens. 14(15): 3750 (2022) - [j32]Jiayu Wang, Xuehu Yan, Lintao Liu, Longlong Li, Yongqiang Yu:
CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN. Sensors 22(14): 5243 (2022) - [j31]Yanji Yao, Lintao Liu:
Automatic P-Wave Arrival Picking Based on Inaction Method. IEEE Trans. Geosci. Remote. Sens. 60: 1-11 (2022) - [j30]Zhibo Zhou, Xinghui Liang, Zhimin Shi, Guocheng Wang, Junjian Lang, Lintao Liu:
A New Method to Restrain Schuler Periodic Oscillation in Inertial Navigation System Based on Normal Time-Frequency Transform. IEEE Trans. Instrum. Meas. 71: 1-15 (2022) - 2021
- [j29]Yuyuan Sun, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li:
Robust Secret Image Sharing Scheme Against Noise in Shadow Images. IEEE Access 9: 23284-23300 (2021) - [j28]Lintao Liu, Haibo Chen:
The nontrivial solutions for fractional Schrödinger-Poisson equations with magnetic fields and critical or supercritical growth. Appl. Math. Lett. 121: 107358 (2021) - [j27]Lintao Liu, Yuliang Lu, Xuehu Yan:
A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets. J. Vis. Commun. Image Represent. 74: 102971 (2021) - [j26]Xuehu Yan, Lintao Liu, Longlong Li, Yuliang Lu:
Robust Secret Image Sharing Resistant to Noise in Shares. ACM Trans. Multim. Comput. Commun. Appl. 17(1): 24:1-24:22 (2021) - [c24]Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan:
Comparison and analysis of secret image sharing principles. CCCI 2021: 1-5 - 2020
- [j25]Xuehu Yan, Yuliang Lu, Lintao Liu, Xia Li, Jingju Liu, Guozheng Yang:
Application of random elements in ISS. IET Image Process. 14(3): 530-535 (2020) - [j24]Xuehu Yan, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. Int. J. Digit. Crime Forensics 12(3): 96-110 (2020) - [j23]Longdan Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Xuan Zhou:
XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multim. Tools Appl. 79(9-10): 5719-5741 (2020) - [j22]Xuehu Yan, Wei Qi Yan, Lintao Liu, Yuliang Lu:
Penrose tiling for visual secret sharing. Multim. Tools Appl. 79(43-44): 32693-32710 (2020) - [j21]Xuehu Yan, Yuliang Lu, Lintao Liu, Xianhua Song:
Reversible Image Secret Sharing. IEEE Trans. Inf. Forensics Secur. 15: 3848-3858 (2020) - [c23]Qi Liu, Yanjie Li, Lintao Liu:
A 3D Simulation Environment and Navigation Approach for Robot Navigation via Deep Reinforcement Learning in Dense Pedestrian Environment. CASE 2020: 1514-1519 - [i1]Zhen Sun, Guocheng Wang, Xiaoqing Su, Xinghui Liang, Lintao Liu:
Similarity and delay between two non-narrow-band time signals. CoRR abs/2005.02579 (2020)
2010 – 2019
- 2019
- [j20]Longdan Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li:
Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem. IEEE Access 7: 59278-59286 (2019) - [j19]Longlong Li, Yuliang Lu, Xuehu Yan, Lintao Liu, Longdan Tan:
Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption. IEEE Access 7: 75113-75121 (2019) - [j18]Qinghong Gong, Yongjie Wang, Xuehu Yan, Lintao Liu:
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images. IEEE Access 7: 113216-113222 (2019) - [j17]Hanlin Liu, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, Yue Jiang:
A Novel Behavior Steganography Model Based on Secret Sharing. Int. J. Digit. Crime Forensics 11(4): 97-117 (2019) - [j16]Xuehu Yan, Lintao Liu, Yuliang Lu, Qinghong Gong:
Security analysis and classification of image secret sharing. J. Inf. Secur. Appl. 47: 208-216 (2019) - [j15]Lintao Liu, Yuliang Lu, Xuehu Yan:
Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers. Multim. Tools Appl. 78(2): 1265-1287 (2019) - [j14]Xuehu Yan, Yuliang Lu, Lintao Liu:
A general progressive secret image sharing construction method. Signal Process. Image Commun. 71: 66-75 (2019) - [c22]Xin Chen, Yanjie Li, Lintao Liu:
A Coordinated Path Planning Algorithm for Multi-Robot in Intelligent Warehouse. ROBIO 2019: 2945-2950 - 2018
- [j13]Xuehu Yan, Yuliang Lu, Lintao Liu:
General Meaningful Shadow Construction in Secret Image Sharing. IEEE Access 6: 45246-45255 (2018) - [j12]Xuehu Yan, Yuliang Lu, Lintao Liu, Jingju Liu, Guozheng Yang:
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digit. Signal Process. 82: 80-90 (2018) - [j11]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Lintao Liu:
Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery. Int. J. Digit. Crime Forensics 10(2): 120-136 (2018) - [j10]Xuehu Yan, Yuliang Lu, Lintao Liu, Duohe Ma:
Image Secret Sharing Construction for General Access Structure with Meaningful Share. Int. J. Digit. Crime Forensics 10(3): 66-77 (2018) - [j9]Xuehu Yan, Yuliang Lu, Lintao Liu, Shen Wang:
Partial secret image sharing for (k, n) threshold based on image inpainting. J. Vis. Commun. Image Represent. 50: 135-144 (2018) - [j8]Lintao Liu, Yuliang Lu, Xuehu Yan, Huaixi Wang:
Greyscale-images-oriented progressive secret sharing based on the linear congruence equation. Multim. Tools Appl. 77(16): 20569-20596 (2018) - [j7]Longdan Tan, Kesheng Liu, Xuehu Yan, Lintao Liu, Tianqi Lu, Jinrui Chen, Feng Liu, Yuliang Lu:
Robust Visual Secret Sharing Scheme Applying to QR Code. Secur. Commun. Networks 2018: 4036815:1-4036815:12 (2018) - [j6]Xuan Zhou, Yuliang Lu, Xuehu Yan, Yongjie Wang, Lintao Liu:
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size. Symmetry 10(7): 249 (2018) - [j5]Jinrui Chen, Kesheng Liu, Xuehu Yan, Lintao Liu, Xuan Zhou, Longdan Tan:
Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images. Symmetry 10(8): 340 (2018) - [j4]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Huaixi Wang, Lintao Liu, Qinghong Gong:
An Image Secret Sharing Method Based on Matrix Theory. Symmetry 10(10): 530 (2018) - [c21]Lintao Liu, Xiaoli Zhu, Shuhua Wei, Jing Zhang, Changqing Xie:
Effect of Pulse Current Density on Gold Nanograin Growth in Sulfite Electrolyte-Based Electrochemical Deposition. NEMS 2018: 312-315 - 2017
- [j3]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Exploiting the Homomorphic Property of Visual Cryptography. Int. J. Digit. Crime Forensics 9(2): 45-56 (2017) - [j2]Lintao Liu, Yuliang Lu, Xuehu Yan, Song Wan:
A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean. Int. J. Digit. Crime Forensics 9(3): 28-37 (2017) - [j1]Song Wan, Yuliang Lu, Xuehu Yan, Lintao Liu:
A Novel Visual Secret Sharing Scheme Based on QR Codes. Int. J. Digit. Crime Forensics 9(3): 38-48 (2017) - [c20]Lintao Liu, Yuhan Gao, Haoming Du:
A novel mixed reconfigurable system on chip based on field programmable analog array. ASICON 2017: 948-952 - [c19]Wanmeng Ding, Kesheng Liu, Lintao Liu, Xuehu Yan:
Participants Increasing for Shamir's Polynomial-Based Secret Image Sharing Scheme. BigDataSecurity/HPSC/IDS 2017: 32-36 - [c18]Lintao Liu, Jun Liu, Ziqiang Huang:
Human-Eye Tracking and Location Algorithm Based on AdaBoost-STC and RF. CRC 2017: 180-183 - [c17]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold. ICCCS (2) 2017: 433-440 - [c16]Xuehu Yan, Yuliang Lu, Lintao Liu, Shen Wang, Song Wan, Wanmeng Ding, Hanlin Liu:
Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting. ICIG (3) 2017: 527-538 - [c15]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Security Analysis of Secret Image Sharing. ICPCSEE (1) 2017: 305-316 - [c14]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Lintao Liu:
A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix Theory. ICPCSEE (1) 2017: 331-340 - [c13]Lintao Liu, Yuliang Lu, Xuehu Yan, Wanmeng Ding:
A Novel Progressive Secret Image Sharing Method with Better Robustness. ICPCSEE (2) 2017: 539-550 - [c12]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics. PSIVT 2017: 174-181 - 2016
- [c11]Xuehu Yan, Yuliang Lu, Hui Huang, Lintao Liu, Song Wan:
Clarity Corresponding to Contrast in Visual Cryptography. ICYCSEE (1) 2016: 249-257 - [c10]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Contrast-Improved Visual Cryptography for General Access Structure. iThings/GreenCom/CPSCom/SmartData 2016: 578-583 - [c9]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan:
Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality. IWDW 2016: 209-222 - [c8]Song Wan, Yuliang Lu, Xuehu Yan, Lintao Liu:
Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes. MSN 2016: 374-379 - [c7]Lintao Liu, Yuliang Lu, Xuehu Yan, Song Wan:
A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image. MSN 2016: 380-385 - [c6]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Perceptual Secret Sharing Scheme Based on Boolean Operations and Random Grids. WICON 2016: 80-90 - 2011
- [c5]Jun Deng, Bing Li, Lintao Liu, Rui Chen:
AProgrammable IP Core for LDPC Decoder Based onASIP. ASICON 2011: 764-767 - [c4]Yi Ding, Lintao Liu, Ruzhang Li, Xin Zhang, Lu Liu:
A 5-80MHz CMOS Gm-C Low-Pass Filter with On-Chip Automatic Tuning. ICDMA 2011: 1-4
2000 – 2009
- 2004
- [c3]Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta:
R-Chain: A Self-Maintained Reputation Management System in P2P Networks. PDCS 2004: 131-136 - [c2]Lintao Liu, Kyung Dong Ryu, Kang-Won Lee:
Keyword fusion to support efficient keyword-based search in peer-to-peer file sharing. CCGRID 2004: 269-276 - [c1]Lintao Liu, Kyung Dong Ryu, Kang-Won Lee:
Supporting efficient keyword-based file search in peer-to-peer file sharing systems. GLOBECOM 2004: 1259-1265
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint