Browsing by Author Li, Xiaolong

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 121  next >
Issue DateTitleAuthor(s)
2009A ��1-based steganography by minimizing the distortion of first order statisticsLu, Yifeng; Li, Xiaolong; Yang, Bin
2015AN ADAPTIVE PEE-BASED REVERSIBLE DATA HIDING SCHEME EXPLOITING REFERENTIAL PREDICTION-ERRORSPeng, Fei; Li, Xiaolong; Yang, Bin
2015An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errorsPeng, Fei; Li, Xiaolong; Yang, Bin
2012Adaptive reversible data hiding scheme based on integer transformPeng, Fei; Li, Xiaolong; Yang, Bin
2010Alternating Minimization Method for Total Variation Based Wavelet Shrinkage ModelZeng, Tieyong; Li, Xiaolong; Ng, Michael
May-2020Bandgap tuning of two-dimensional materials by sphere diameter engineeringZeng, Mengqi; Liu, Jinxin; Zhou, Lu; Mendes, Rafael G.; Dong, Yongqi; Zhang, Min-Ye; Cui, Zhi-Hao; Cai, Zhonghou; Zhang, Zhan; Zhu, Daming; Yang, Tieying; Li, Xiaolong; Wang, Jianqiang; Zhao, Liang; Chen, Guoxian; Jiang, Hong; Ruemmeli, Mark H.; Zhou, Hua; Fu, Lei
2009Bilinear Coons patch and its application in security pattern designQi, Wenfa; Li, Xiaolong; Yang, Bin
2018The binding of DCC-P3 motif and FAK-FAT domain mediates the initial step of netrin-1/DCC signaling for axon attractionXu, Shutong; Liu, Yiqiong; Li, Xiaolong; Liu, Ying; Meijers, Rob; Zhang, Yan; Wang, Jia-huai
2014Blind median filtering detection based on histogram featuresGui, Xinlu; Li, Xiaolong; Qi, Wenfa; Yang, Bin
2010Blind tampering identification by incorporating EFR and calibrationCai, Kaiwei; Li, Xiaolong; Yang, Bin; Lu, Xiaoqing
2014A brief review on reversible data hiding: Current techniques and future prospectsLi, Xiaolong; Zhang, Weiming; Ou, Bo; Yang, Bin
2013Calibration based reliable detector for detecting LSB matching steganographyPeng, Fei; Li, Xiaolong; Yang, Bin
2008A Character Segmentation Method without Character VerificationQi, Wenfa; Li, Xiaolong; Yang, Bin
1-Apr-2022Co-transport and co-release of Eu(III) with bentonite colloids in saturated porous sand columns: Controlling factors and governing mechanisms*Xu, Zhen; Pan, Duoqiang; Tang, Qingfeng; Wei, Xiaoyan; Liu, Chunli; Li, Xiaolong; Chen, Ximeng; Wu, Wangsuo
10-May-2021Colloidal stability and correlated migration of illite in the aquatic environment: The roles of pH, temperature, multiple cations and humic acidWei, Xiaoyan; Pan, Duoqiang; Xu, Zhen; Xian, Dongfan; Li, Xiaolong; Tan, Zhaoyi; Liu, Chunli; Wu, Wangsuo
2009CONSTRUCTING SPECIFIC MATRIX FOR EFFICIENT MATRIX EMBEDDINGGao, Yunkai; Li, Xiaolong; Yang, Bin
2012A CONTENT-ADAPTIVE +/- 1-BASED STEGANOGRAPHY BY MINIMIZING THE DISTORTION OF FIRST ORDER STATISTICSGui, Xinlu; Li, Xiaolong; Yang, Bin
2010A CONTENT-ADAPTIVE APPROACH FOR REDUCING EMBEDDING IMPACT IN STEGANOGRAPHYWang, Chao; Li, Xiaolong; Yang, Bin; Lu, Xiaoqing; Liu, Chengcheng
2011A content-adaptive image steganography based on SDCSPeng, Fei; Li, Xiaolong; Yang, Bin
2023Creative destruction, human capital accumulation, and growth in a digital economyLiao, Lewei; Qin, Xuezheng; Li, Xiaolong; Gong, Liutang