default search action
Lingyun Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Hai Liao, Yan Liang, Song Chen, Lingyun Xiang, Zhimin Chang, Yun Xiao:
STSG: A Short Text Semantic Graph Model for Similarity Computing Based on Dependency Parsing and Pre-trained Language Models. Appl. Artif. Intell. 38(1) (2024) - [j30]Huiqing You, Lingyun Xiang, Chunfang Yang, Xiaobo Shen:
Linguistic steganalysis via multi-task with crossing generative-natural domain. Neurocomputing 603: 128260 (2024) - [j29]Lingyun Xiang, Yangfan Liu, Zhongliang Yang:
A reversible natural language watermarking for sensitive information protection. Inf. Process. Manag. 61(2): 103661 (2024) - [j28]Lingyun Xiang, Chengfu Ou, Daojian Zeng:
Linguistic Steganography: Hiding Information in Syntax Space. IEEE Signal Process. Lett. 31: 261-265 (2024) - 2023
- [j27]Lingyun Xiang, Rong Wang, Yuhang Liu, Yangfan Liu, Lina Tan:
A General Linguistic Steganalysis Framework Using Multi-Task Learning. Comput. Syst. Sci. Eng. 46(2): 2383-2399 (2023) - [j26]Rong Wang, Lingyun Xiang, Yangfan Liu, Chunfang Yang:
PNG-Stega: Progressive Non-Autoregressive Generative Linguistic Steganography. IEEE Signal Process. Lett. 30: 528-532 (2023) - [j25]Lingyun Xiang, Jiali Xia, Yangfan Liu, Yan Gui:
CPG-LS: Causal Perception Guided Linguistic Steganography. IEEE Signal Process. Lett. 30: 1762-1766 (2023) - [j24]Lingyun Xiang, Huiqing You, Guoqing Guo, Qian Li:
Deep feature fusion for cold-start spam review detection. J. Supercomput. 79(1): 419-434 (2023) - 2022
- [j23]Yan Gui, Bingqiang Zhou, Jianming Zhang, Cheng Sun, Lingyun Xiang, Jin Zhang:
Learning interactive multi-object segmentation through appearance embedding and spatial attention. IET Image Process. 16(10): 2722-2737 (2022) - [j22]Lingyun Xiang, Rong Wang, Zhongliang Yang, Yuling Liu:
Generative Linguistic Steganography: A Comprehensive Review. KSII Trans. Internet Inf. Syst. 16(3): 986-1005 (2022) - [j21]Lingyun Xiang, Yuhang Liu, Huiqing You, Chengfu Ou:
Aggregating Local and Global Text Features for Linguistic Steganalysis. IEEE Signal Process. Lett. 29: 1502-1506 (2022) - 2021
- [j20]Kejun Long, Junjun Wei, Nuo Xu, Lingyun Xiang, Xi Duan:
Efficiency and safety assessment of suburban highway access management. Int. J. Embed. Syst. 14(1): 65-71 (2021) - [j19]Zhongliang Yang, Lingyun Xiang, Si-yu Zhang, Xingming Sun, Yongfeng Huang:
Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility. IEEE Signal Process. Lett. 28: 409-413 (2021) - 2020
- [j18]Zhonghua Liu, Lingyun Xiang, Kaiming Shi, Kaibing Zhang, Qingtao Wu:
Robust Manifold Embedding for Face Recognition. IEEE Access 8: 101224-101234 (2020) - [j17]Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan, Qiang Liu, Lingyun Xiang:
Coverless real-time image information hiding based on image block matching and dense convolutional network. J. Real Time Image Process. 17(1): 125-135 (2020)
2010 – 2019
- 2019
- [j16]Daojian Zeng, Haoran Zhang, Lingyun Xiang, Jin Wang, Guoliang Ji:
User-Oriented Paraphrase Generation With Keywords Controlled Network. IEEE Access 7: 80542-80551 (2019) - [j15]Wenyan Pan, Jiaohua Qin, Xuyu Xiang, Yan Wu, Yun Tan, Lingyun Xiang:
A Smart Mobile Diagnosis System for Citrus Diseases Based on Densely Connected Convolutional Networks. IEEE Access 7: 87534-87542 (2019) - [j14]Lingyun Xiang, Xiao Yang, Jiahe Zhang, Weizheng Wang:
A word-frequency-preserving steganographic method based on synonym substitution. Int. J. Comput. Sci. Eng. 19(1): 132-139 (2019) - [j13]Yuhan Kang, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo, Ping Wang:
Color image steganalysis based on channel gradient correlation. Int. J. Distributed Sens. Networks 15(5) (2019) - [j12]Lingyun Xiang, Xiaobo Shen, Jiaohua Qin, Wei Hao:
Discrete Multi-graph Hashing for Large-Scale Visual Search. Neural Process. Lett. 49(3): 1055-1069 (2019) - [j11]Wenjun Li, Haiyan Liu, Jianxin Wang, Lingyun Xiang, Yongjie Yang:
An improved linear kernel for complementary maximal strip recovery: Simpler and smaller. Theor. Comput. Sci. 786: 55-66 (2019) - 2018
- [j10]Lingyun Xiang, Guohan Zhao, Qian Li, Wei Hao, Feng Li:
TUMK-ELM: A Fast Unsupervised Heterogeneous Data Learning Approach. IEEE Access 6: 35305-35315 (2018) - [j9]Lingyun Xiang, Jingmin Yu, Chunfang Yang, Daojian Zeng, Xiaobo Shen:
A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution. IEEE Access 6: 64131-64141 (2018) - [j8]Lingyun Xiang, Wenshuai Wu, Xu Li, Chunfang Yang:
A linguistic steganography based on word indexing compression and candidate selection. Multim. Tools Appl. 77(21): 28969-28989 (2018) - [c7]Lingyun Xiang, Guohan Zhao, Qian Li, Zijie Zhu:
Unsupervised Absent Multiple Kernel Extreme Learning Machine. ELM 2018: 236-246 - [c6]Niandong Liao, Caixia Sun, Lingyun Xiang, Feng Li:
A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents. ICCCS (4) 2018: 147-159 - [c5]Guohan Zhao, Lingyun Xiang, Chengzhang Zhu, Feng Li:
Two-stage Unsupervised Multiple Kernel Extreme Learning Machine. IJCNN 2018: 1-6 - 2017
- [j7]Lingyun Xiang, Xinhui Wang, Chunfang Yang, Peng Liu:
A Novel Linguistic Steganography Based on Synonym Run-Length Encoding. IEICE Trans. Inf. Syst. 100-D(2): 313-322 (2017) - [c4]Wenjun Li, Haiyan Liu, Jianxin Wang, Lingyun Xiang, Yongjie Yang:
A 42k Kernel for the Complementary Maximal Strip Recovery Problem. FAW 2017: 175-186 - 2016
- [j6]Lingyun Xiang, Jiaohua Qin, Xiao Yang, Qichao Tang:
An Adaptive Steganographic Method Using Additive Noise. J. Comput. 11(3): 207-215 (2016) - 2015
- [j5]Xianyi Chen, Xingming Sun, Huiyu Sun, Lingyun Xiang, Bin Yang:
Histogram shifting based reversible data hiding method using directed-prediction scheme. Multim. Tools Appl. 74(15): 5747-5765 (2015) - 2014
- [j4]Lingyun Xiang, Xingming Sun, Gang Luo, Bin Xia:
Linguistic steganalysis using the features derived from synonym frequency. Multim. Tools Appl. 71(3): 1893-1911 (2014) - 2013
- [j3]Weizheng Wang, Peng Liu, Shuo Cai, Lingyun Xiang:
Low power logic BIST with high test effectiveness. IEICE Electron. Express 10(23): 20130853 (2013) - [j2]Jianming Zhang, Kun Yang, Lingyun Xiang, Yuansheng Luo, Bing Xiong, Qiang Tang:
A Self-Adaptive Regression-Based Multivariate Data Compression Scheme with Error Bound in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Feng Li, Shuren Zhou, Jian-Ming Zhang, Dengyong Zhang, Lingyun Xiang:
Attribute-based knowledge transfer learning for human pose estimation. Neurocomputing 116: 301-310 (2013)
2000 – 2009
- 2008
- [c3]Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo:
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. IIH-MSP 2008: 294-297 - 2007
- [c2]Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan:
Research on Steganalysis for Text Steganography Based on Font Format. IAS 2007: 490-495 - [c1]Gang Luo, Xingming Sun, Lingyun Xiang, Junwei Huang:
An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms. IIH-MSP 2007: 126-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint