default search action
Xianyi Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Lei Zhang, Yazhou Ma, Xiaojie Fan, Xiaochen Fan, Yonggang Zhang, Zhenxiang Chen, Xianyi Chen, Daqing Zhang:
Wi-Diag: Robust Multisubject Abnormal Gait Diagnosis With Commodity Wi-Fi. IEEE Internet Things J. 11(3): 4362-4376 (2024) - [j35]Xueyan Cao, Tao Lin, Liping Zhao, Yufen Yang, Kailun Zhou, Hu Wei, Xianyi Chen:
Fast intra coding in AVS3 based on direct non-first pre-coding skip. J. Vis. Commun. Image Represent. 98: 104027 (2024) - [j34]Leiming Yan, Siqi Wu, Shaopeng Li, Xianyi Chen:
SEAformer: frequency domain decomposition transformer with signal enhanced for long-term wind power forecasting. Neural Comput. Appl. 36(33): 20883-20906 (2024) - [j33]Changhao Ding, Zhangjie Fu, Qi Yu, Fan Wang, Xianyi Chen:
Joint Linguistic Steganography With BERT Masked Language Model and Graph Attention Network. IEEE Trans. Cogn. Dev. Syst. 16(2): 772-781 (2024) - [c12]Xianyi Chen:
Exploring the Intersection of Artificial Intelligence and Fine Arts: A Data-Driven Approach. ICCBD 2024: 212-216 - [c11]Chengsheng Yuan, Wenqian Qiu, Zhili Zhou, Xinting Li, Xianyi Chen:
FIL-FLD: Few-Shot Incremental Learning with EMD Metric for High Generalization Fingerprint Liveness Detection. PRCV (15) 2024: 363-376 - 2023
- [j32]Wentao Hao, Tianshuo Zhang, Xianyi Chen, Xiaoyi Zhou:
A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding. Signal Process. 205: 108890 (2023) - [j31]Wentao Hao, Tianshuo Zhang, Xianyi Chen, Xiaoyi Zhou:
Corrigendum to A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding Signal Processing, 205, 108890]. Signal Process. 209: 109012 (2023) - [j30]Dahao Fu, Xiaoyi Zhou, Liaoran Xu, Kaiyue Hou, Xianyi Chen:
Robust Reversible Watermarking by Fractional Order Zernike Moments and Pseudo-Zernike Moments. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7310-7326 (2023) - [j29]Lei Zhang, Xu Li, Kaichen Tang, Yunzhe Jiang, Liu Yang, Yonggang Zhang, Xianyi Chen:
FS-Net: LiDAR-Camera Fusion With Matched Scale for 3D Object Detection in Autonomous Driving. IEEE Trans. Intell. Transp. Syst. 24(11): 12154-12165 (2023) - [c10]Nengyu Xia, Yixin Zhang, Wei Ren, Xianyi Chen:
CFGCon: A Scheme for Accurately Generating Control Flow Graphs of Smart Contracts. APWeb/WAIM (3) 2023: 265-279 - [c9]Xianyi Chen, Hongyun Kong, Huiting Zha, EnLai Zhang:
Micro Speaker Quality Inspection Based on Time-Frequency Domain Feature Learning. ICIRA (5) 2023: 15-25 - [i4]Xianyi Chen, Fazhan Liu, Dong Jiang, Kai Yan:
Natural Adversarial Patch Generation Method Based on Latent Diffusion Model. CoRR abs/2312.16401 (2023) - 2022
- [j28]Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia, Neal N. Xiong:
Novel Coverless Steganography Method Based on Image Selection and StarGAN. IEEE Trans. Netw. Sci. Eng. 9(1): 219-230 (2022) - [c8]Wenkai Li, Jiuyang Bu, Xiaoqi Li, Xianyi Chen:
Security Analysis of DeFi: Vulnerabilities, Attacks and Advances. Blockchain 2022: 488-493 - [i3]Wenkai Li, Jiuyang Bu, Xiaoqi Li, Xianyi Chen:
Security Analysis of DeFi: Vulnerabilities, Attacks and Advances. CoRR abs/2205.09524 (2022) - [i2]Wenkai Li, Jiuyang Bu, Xiaoqi Li, Hongli Peng, Yuanzheng Niu, Xianyi Chen:
A Survey of DeFi Security: Challenges and Opportunities. CoRR abs/2206.11821 (2022) - 2021
- [j27]Yuling Liu, Jiao Wu, Xianyi Chen:
An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS. KSII Trans. Internet Inf. Syst. 15(4): 1553-1567 (2021) - [j26]Yewen Wu, Shi Zeng, Bin Wu, Bin Yang, Xianyi Chen:
Quantitative Weighted Visual Cryptographic (k, m, n) Method. Secur. Commun. Networks 2021: 9968652:1-9968652:13 (2021) - [j25]Xianyi Chen, Xiafu Peng, Sun'an Wang:
Superpixel Segmentation Based on Grid Point Density Peak Clustering. Sensors 21(19): 6374 (2021) - [j24]Shuai Wang, Yang Cong, Hancan Zhu, Xianyi Chen, Liangqiong Qu, Huijie Fan, Qiang Zhang, Mingxia Liu:
Multi-Scale Context-Guided Deep Network for Automated Lesion Segmentation With Endoscopy Images of Gastrointestinal Tract. IEEE J. Biomed. Health Informatics 25(2): 514-525 (2021) - [j23]Bin Wu, Xianyi Chen, Zongda Wu, Zhiqiang Zhao, Zhuolin Mei, Caicai Zhang:
Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario. Wirel. Commun. Mob. Comput. 2021: 6617959:1-6617959:12 (2021) - 2020
- [j22]Bin Wu, Xianyi Chen, Caicai Zhang, Zhuolin Mei, Zhiqiang Zhao, Zongda Wu, Tao Yan:
Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment. IEEE Access 8: 214596-214604 (2020) - [j21]Xiang Zhou, Xianyi Chen, Fasheng Zhang, Ningning Zheng:
A novel coverless text information hiding method based on double-tags and twice-send. Int. J. Comput. Sci. Eng. 21(1): 116-124 (2020) - [j20]Haidong Zhong, Xianyi Chen:
A separable reversible data hiding scheme in encrypted image for two cloud servers. Int. J. Embed. Syst. 12(1): 62-71 (2020) - [j19]Xiucai Ding, Xianyi Chen, Mengling Zou, Guangxing Zhang:
ASSVD: Adaptive Sparse Singular Value Decomposition for High Dimensional Matrices. KSII Trans. Internet Inf. Syst. 14(6): 2634-2648 (2020) - [j18]Chengsheng Yuan, Xianyi Chen, Peipeng Yu, Ruohan Meng, Weijin Cheng, Q. M. Jonathan Wu, Xingming Sun:
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection. J. Real Time Image Process. 17(1): 55-71 (2020)
2010 – 2019
- 2019
- [j17]Haidong Zhong, Xianyi Chen, Qinglong Tian:
An Improved Reversible Image Transformation Using K-Means Clustering and Block Patching. Inf. 10(1): 17 (2019) - [j16]Xianyi Chen, Haidong Zhong, Anqi Qiu:
Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multim. Tools Appl. 78(6): 7499-7516 (2019) - [j15]Lizhi Xiong, Zhihua Xia, Xianyi Chen, Hiuk Jae Shim:
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multim. Tools Appl. 78(21): 30297-30313 (2019) - [j14]Xianyi Chen, Sheng Chen:
Text coverless information hiding based on compound and selection of words. Soft Comput. 23(15): 6323-6330 (2019) - [c7]Xianyi Chen, Xiafu Peng, Sun'an Wang:
The Marked-line Recognition Based on Network Topology Diagram Points Clustering. SSCI 2019: 503-507 - 2018
- [j13]Lizhi Xiong, Danping Dong, Zhihua Xia, Xianyi Chen:
High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption. IEEE Access 6: 60635-60644 (2018) - [j12]Xianyi Chen, Sun'an Wang, Binquan Zhang, Liang Luo:
Multi-feature fusion tree trunk detection and orchard mobile robot localization using camera/ultrasonic sensors. Comput. Electron. Agric. 147: 91-108 (2018) - [j11]Bin Yang, Xingming Sun, Enguo Cao, Weifeng Hu, Xianyi Chen:
Convolutional neural network for smooth filtering detection. IET Image Process. 12(8): 1432-1438 (2018) - [j10]Bin Yang, Xingming Sun, Honglei Guo, Zhihua Xia, Xianyi Chen:
A copy-move forgery detection method based on CMFD-SIFT. Multim. Tools Appl. 77(1): 837-855 (2018) - [j9]Xianyi Chen, Haidong Zhong, Lizhi Xiong, Zhihua Xia:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. Secur. Commun. Networks 2018: 1326235:1-1326235:9 (2018) - [c6]Bin Yang, Xianyi Chen, Tao Zhang:
A Multichannel Convolutional Neural Network Based Forensics-Aware Scheme for Cyber-Physical-Social Systems. ICCCS (6) 2018: 243-254 - 2017
- [j8]Sheng Chen, Xianyi Chen, Huijuan Fu:
General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error. Adv. Multim. 2017: 6359248:1-6359248:9 (2017) - 2016
- [j7]Liping Zhao, Tao Lin, Kailun Zhou, Shuhui Wang, Xianyi Chen:
Pseudo 2D String Matching Technique for High Efficiency Screen Content Coding. IEEE Trans. Multim. 18(3): 339-350 (2016) - 2015
- [j6]Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li:
Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows. Comput. J. 58(4): 588-600 (2015) - [j5]Xianyi Chen, Xingming Sun, Huiyu Sun, Lingyun Xiang, Bin Yang:
Histogram shifting based reversible data hiding method using directed-prediction scheme. Multim. Tools Appl. 74(15): 5747-5765 (2015) - [j4]Shuhui Wang, Tao Lin, Kailun Zhou, Peijun Zhang, Xianyi Chen:
Pseudo-2D-matching based enhancement to high efficiency video coding for screen contents. Multim. Tools Appl. 74(18): 7753-7771 (2015) - [c5]Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun:
Coverless Image Steganography Without Embedding. ICCCS 2015: 123-132 - [c4]Xianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun:
Coverless Information Hiding Method Based on the Chinese Mathematical Expression. ICCCS 2015: 133-143 - 2014
- [j3]Zhili Zhou, Xingming Sun, Xianyi Chen, Cheng Chang, Zhangjie Fu:
A novel signature based on the combination of global and local signatures for image copy detection. Secur. Commun. Networks 7(11): 1702-1711 (2014) - [c3]Liping Zhao, Xianyi Chen, Tao Lin:
Mapping of intra string copy parameters for HEVC screen content coding. APSIPA 2014: 1-10 - 2013
- [j2]Xianyi Chen, Xingming Sun, Huiyu Sun, Zhili Zhou, Jianjun Zhang:
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 86(10): 2620-2626 (2013) - [j1]Tao Lin, Peijun Zhang, Shuhui Wang, Kailun Zhou, Xianyi Chen:
Mixed Chroma Sampling-Rate High Efficiency Video Coding for Full-Chroma Screen Content. IEEE Trans. Circuits Syst. Video Technol. 23(1): 173-185 (2013) - [c2]Tao Lin, Xianyi Chen, Shuhui Wang:
Pseudo-2D-matching based dual-coder architecture for screen contents coding. ICME Workshops 2013: 1-4 - [c1]Tao Lin, Kailun Zhou, Xianyi Chen, Shuhui Wang:
Arbitrary shape matching for screen content coding. PCS 2013: 369-372
2000 – 2009
- 2004
- [i1]Changda Wang, Xianyi Chen, Xibin Zhao, Shiguang Ju:
Design and Implementation of a General Decision-making Model in RoboCup Simulation. CoRR cs.RO/0411023 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint