[1] W. Liao, Z. Liu, M. Shen, R. Chen, X. Liu*(柳晓龙,通讯作者), APR-Net: Defense Against Adversarial Examples Based on Universal Adversarial Perturbation Removal Network, in IEEE Transactions on Artificial Intelligence, 2024, 1-11. doi: 10.1109/TAI.2024.3504478.
[2] J. Liang, Y. Liu, L. Gao, Z. Zhang, X. Liu*(柳晓龙,通讯作者), ISWP: Novel high-fidelity adversarial examples generated by incorporating invisible and secure watermark perturbations, Applied Intelligence, (2025) 55:40, 10.1007/s10489-024-05917-w
[3] Y. Kuang, Q. Wu, R. Chen, X. Liu*(柳晓龙,通讯作者), Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm, Computer Standards & Interfaces, Volume 93, 2025, 103981, https://doi.org/10.1016/j.csi.2025.103981.
[4] Y. Huang, Z. Liu, Q. Wu, X. Liu*(柳晓龙,通讯作者), Robust image steganography against JPEG compression based on DCT residual modulation, Signal Processing, Volume 219, 2024, 109431.
[6] J. Liang, Z. Feng, R. Chen, X. Liu*(柳晓龙,通讯作者). BHI:Embedded Invisible Watermark as Adversarial Examples Based on Basin Hopping Improvement, Information sciences, 2023, 640:119037.
[7] X. Liu(柳晓龙,第一作者), K. Muhammad, J. Lloret, Y. Chen, S. M. Yuan. Elastic and Cost-effective Data Carrier Architecture for Smart Contract in Blockchain. Future Generation Computer Systems. 2019. 100, 590-599.
[8] X. Liu(柳晓龙,第一作者), C. C. Lin, S. M. Yuan, “Blind dual watermarking for color image authentication and copyright protection,” IEEE Transactions on Circuits and Systems for Video Technology, 2018,28(5):1047-1055.
[9] X. Liu(柳晓龙,第一作者), J. Liang, D. Liu, R. Chen, S. Yuan, Weapon-target assignment inunreliable Peer-to-Peer architecture based on adapted artificial bee colony algorithm, Frontiers of. Computer. Science. 2022, 16, 161103.
[10] Zheng S, Liu C, Feng Z, R Chen, X Liu*(柳晓龙,通讯作者). Visual image encryption scheme based on vector quantization and content transform[J]. Multimedia Tools and Applications, 2022, 81(9): 12815-12832.
[11] Xiaolong Liu(柳晓龙,第一作者), Ruey-Kai Sheu, Win-Tsung Lo, Shyan-Ming Yuan, “Automatic Cloud Service Testing and Bottleneck Detection System with Scaling Recommendation,” Concurrency and Computation:Practice and Experience, 2019, e5161,1-14.
[12] X. L. Liu(柳晓龙,第一作者), R. K. Sheu, S. M. Yuan, Y. N. Wang, “A file-deduplicated private cloud storage service with CDMI standard,” Computer Standards & Interfaces, 2016, vol. 44, pp. 18-27.
[13] X. L. Liu(柳晓龙,第一作者), C. C. Lin, C. C. Chang, S. M. Yuan, “A high-payload, reversible data hiding scheme based on histogram modification in jpeg bitstream,”Imaging Science Journal, 2016, vol. 64, No. 7, pp.364-373.
[14] Qiwen Wu, Zijing Feng, Yingkai Huang, Jiehui Zhong, Xiaolong Liu*(柳晓龙,通讯作者): Covert Communication and Image Authentication Algorithm Based on Adversarial Examples. ISCIT 2022: 199-203.
[15] Zijing Feng,Chengyu Liu,Xiangmin Ji,Xiaolong Liu*(柳晓龙,通讯作者), A Survey of Adversarial Examples and Deep Learning Based Data Hiding[C]//International Symposium on Security and Privacy in Social Networks and Big Data. Springer, Singapore, 2021: 161-171.
[16] Liu C, Zheng S, Feng Z, R Chen,X Liu *(柳晓龙,通讯作者). Visual image encryption scheme based on BTC and LSB modification[C]//Journal of Physics: Conference Series. IOP Publishing, 2021, 1812(1): 012037.
[17] Sifei Zheng, Xiaolong Liu*(柳晓龙,通讯作者), Riqing Chen, Shyan-Ming Yuan, Chia-Chen Lin, LSB-based visual image encryption scheme in cloud environment, 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, (ISPA), pp.891-896.
[18] X. Liu(柳晓龙,第一作者), A. Juan, R. Chen, S. M. Yuan , Automated Testing Framework for Geographical Distributed Testing Environment,The 2019 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT).
[19] X. Liu*(柳晓龙,第一作者), C. Y. Ho, S. Zheng, S. M. Yuan, Comprehensive evaluation of large-scale parallel matrix factorization algorithms, 2019 IEEE 21st International Conference on High Performance Computing and Communications; (HPCC) :811-818.
[20] 邝应攀, 钟节辉, 吴启雯, 黄英恺, 柳晓龙*(通讯作者),基于区块链的物联网安全轻量级认证方案,计算机工程与设计, 2024, 11, 3225-3232.
[21] 郑思飞,冯子婧,刘成语,陈日清,柳晓龙*(通讯作者),云存储环境中基于矢量量化的图像伪装加密方法,计算机工程与科学,2022,44(6),1030-1036.
[22] 基于图像伪装与双向差值扩展的密文域可逆信息隐藏算法,廖文兴,刘成语,林松,柳晓龙*(通讯作者),计算机应用研究 2024,41-2, 596-601.
[23] 福建农林大学:柳晓龙,刘铸贤,基于对抗攻击的图像隐私保护系统V1.0,2025.1,登记号:2025SR0127759
[24] 福建农林大学:柳晓龙,刘铸贤,基于多头注意力的对抗图像隐写系统V1.0,2025.1,登记号:2025SR0127882
[25] 福建农林大学:柳晓龙,邝应攀,陈蒋豪,区块链增强的联邦学习安全系统V1.0,2025.1,登记号:2025SR0032622
[26] 福建农林大学:柳晓龙,严禹林,郑思飞,梁锦超,图像伪装加密网盘系统V1.0,2020.12,登记号:2020SR1707601
[27] 柳晓龙,梁锦超,冯子婧,基于最低有效位修改的不可见水印对抗样本生成方法,202210544556.1,2022.5.19
[28] 梁锦超,柳晓龙,陈日清,基于不可见水印的对抗样本生成方法及其应用和存储介质,ZL 2022 1 0611169.5,2024.