Follow
Xiao-Long Liu
Xiao-Long Liu
Fujian Agriculture and Forestry University
Verified email at nctu.edu.tw
Title
Cited by
Cited by
Year
Blind dual watermarking for color images’ authentication and copyright protection
XL Liu, CC Lin, SM Yuan
IEEE Transactions on Circuits and Systems for Video Technology 28 (5), 1047-1055, 2016
2352016
Eye Tracking Based Control System for Natural Human‐Computer Interaction
X Zhang, X Liu, SM Yuan, SF Lin
Computational intelligence and neuroscience 2017 (1), 5739301, 2017
1102017
A novel reversible data hiding scheme based on AMBTC compression technique
CC Lin, XL Liu, WL Tai, SM Yuan
Multimedia Tools and Applications 74 (11), 3823-3842, 2015
882015
Elastic and cost-effective data carrier architecture for smart contract in blockchain
X Liu, K Muhammad, J Lloret, YW Chen, SM Yuan
Future Generation Computer Systems 100, 590-599, 2019
742019
Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping
CC Lin, XL Liu, SM Yuan
Information Sciences 293, 314-326, 2015
592015
Off-chain data fetching architecture for ethereum smart contract
X Liu, R Chen, YW Chen, SM Yuan
2018 International Conference on Cloud Computing, Big Data and Blockchain …, 2018
392018
A complete system for analysis of video lecture based on eye tracking
X Zhang, SM Yuan, MD Chen, X Liu
Ieee Access 6, 49056-49066, 2018
362018
A reversible data hiding scheme for block truncation compressions based on histogram modification
CC Lin, XL Liu
2012 Sixth International Conference on Genetic and Evolutionary Computing …, 2012
172012
Joint data hiding and compression scheme based on modified BTC and image inpainting
X Liu, CC Lin, K Muhammad, F Al-Turjman, SM Yuan
IEEE Access 7, 116027-116037, 2019
162019
Content-based image copy detection using convolutional neural network
X Liu, J Liang, ZY Wang, YT Tsai, CC Lin, CC Chen
Electronics 9 (12), 2029, 2020
152020
Cloud resource management with turnaround time driven auto-scaling
X Liu, SM Yuan, GH Luo, HY Huang, P Bellavista
IEEE Access 5, 9831-9841, 2017
132017
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm
X Liu, J Liang, DY Liu, R Chen, SM Yuan
Frontiers of Computer Science 16, 1-9, 2022
122022
A file-deduplicated private cloud storage service with CDMI standard
XL Liu, RK Sheu, SM Yuan, YN Wang
Computer Standards & Interfaces 44, 18-27, 2016
112016
Biometrics-based RSA cryptosystem for securing real-time communication
X Liu, WB Lee, QA Bui, CC Lin, HL Wu
Sustainability 10 (10), 3588, 2018
102018
A Survey of Fragile Watermarking-based Image Authentication Techniques.
XL Liu, CC Lin, CC Chang, SM Yuan
J. Inf. Hiding Multim. Signal Process. 7 (6), 1282-1292, 2016
102016
Fragile watermarking-based authentication scheme for demosaicked images
CC Lin, CH Lin, XL Liu, SM Yuan
2015 International Conference on Intelligent Information Hiding and …, 2015
92015
Automatic cloud service testing and bottleneck detection system with scaling recommendation
X Liu, RK Sheu, WT Lo, SM Yuan
Concurrency and Computation: Practice and Experience 32 (1), e5161, 2020
72020
A high-payload, reversible data hiding scheme based on histogram modification in JPEG bitstream
XL Liu, CC Chang, CC Lin, SM Yuan
The Imaging Science Journal 64 (7), 364-373, 2016
72016
Eye movement analysis of digital learning content for educational innovation
X Liu, X Zhang, WW Chen, SM Yuan
Sustainability 12 (6), 2518, 2020
62020
An image authentication and recovery scheme based on turtle Shell algorithm and AMBTC-compression
CC Lin, X Liu, JJ Zhou, CY Tang
Multimedia Tools and Applications 81 (27), 39431-39452, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20