Showing results 1 to 20 of 121
next >
Issue Date | Title | Author(s) |
2009 | A ��1-based steganography by minimizing the distortion of first order statistics | Lu, Yifeng; Li, Xiaolong; Yang, Bin |
2015 | AN ADAPTIVE PEE-BASED REVERSIBLE DATA HIDING SCHEME EXPLOITING REFERENTIAL PREDICTION-ERRORS | Peng, Fei; Li, Xiaolong; Yang, Bin |
2015 | An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors | Peng, Fei; Li, Xiaolong; Yang, Bin |
2012 | Adaptive reversible data hiding scheme based on integer transform | Peng, Fei; Li, Xiaolong; Yang, Bin |
2010 | Alternating Minimization Method for Total Variation Based Wavelet Shrinkage Model | Zeng, Tieyong; Li, Xiaolong; Ng, Michael |
May-2020 | Bandgap tuning of two-dimensional materials by sphere diameter engineering | Zeng, Mengqi; Liu, Jinxin; Zhou, Lu; Mendes, Rafael G.; Dong, Yongqi; Zhang, Min-Ye; Cui, Zhi-Hao; Cai, Zhonghou; Zhang, Zhan; Zhu, Daming; Yang, Tieying; Li, Xiaolong; Wang, Jianqiang; Zhao, Liang; Chen, Guoxian; Jiang, Hong; Ruemmeli, Mark H.; Zhou, Hua; Fu, Lei |
2009 | Bilinear Coons patch and its application in security pattern design | Qi, Wenfa; Li, Xiaolong; Yang, Bin |
2018 | The binding of DCC-P3 motif and FAK-FAT domain mediates the initial step of netrin-1/DCC signaling for axon attraction | Xu, Shutong; Liu, Yiqiong; Li, Xiaolong; Liu, Ying; Meijers, Rob; Zhang, Yan; Wang, Jia-huai |
2014 | Blind median filtering detection based on histogram features | Gui, Xinlu; Li, Xiaolong; Qi, Wenfa; Yang, Bin |
2010 | Blind tampering identification by incorporating EFR and calibration | Cai, Kaiwei; Li, Xiaolong; Yang, Bin; Lu, Xiaoqing |
2014 | A brief review on reversible data hiding: Current techniques and future prospects | Li, Xiaolong; Zhang, Weiming; Ou, Bo; Yang, Bin |
2013 | Calibration based reliable detector for detecting LSB matching steganography | Peng, Fei; Li, Xiaolong; Yang, Bin |
2008 | A Character Segmentation Method without Character Verification | Qi, Wenfa; Li, Xiaolong; Yang, Bin |
1-Apr-2022 | Co-transport and co-release of Eu(III) with bentonite colloids in saturated porous sand columns: Controlling factors and governing mechanisms* | Xu, Zhen; Pan, Duoqiang; Tang, Qingfeng; Wei, Xiaoyan; Liu, Chunli; Li, Xiaolong; Chen, Ximeng; Wu, Wangsuo |
10-May-2021 | Colloidal stability and correlated migration of illite in the aquatic environment: The roles of pH, temperature, multiple cations and humic acid | Wei, Xiaoyan; Pan, Duoqiang; Xu, Zhen; Xian, Dongfan; Li, Xiaolong; Tan, Zhaoyi; Liu, Chunli; Wu, Wangsuo |
2009 | CONSTRUCTING SPECIFIC MATRIX FOR EFFICIENT MATRIX EMBEDDING | Gao, Yunkai; Li, Xiaolong; Yang, Bin |
2012 | A CONTENT-ADAPTIVE +/- 1-BASED STEGANOGRAPHY BY MINIMIZING THE DISTORTION OF FIRST ORDER STATISTICS | Gui, Xinlu; Li, Xiaolong; Yang, Bin |
2010 | A CONTENT-ADAPTIVE APPROACH FOR REDUCING EMBEDDING IMPACT IN STEGANOGRAPHY | Wang, Chao; Li, Xiaolong; Yang, Bin; Lu, Xiaoqing; Liu, Chengcheng |
2011 | A content-adaptive image steganography based on SDCS | Peng, Fei; Li, Xiaolong; Yang, Bin |
2023 | Creative destruction, human capital accumulation, and growth in a digital economy | Liao, Lewei; Qin, Xuezheng; Li, Xiaolong; Gong, Liutang |