Qibin Sun

Orcid: 0000-0002-6789-7460

According to our database1, Qibin Sun authored at least 157 papers between 1998 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2011, "For contributions to multimedia security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks.
IEEE/ACM Trans. Netw., February, 2024

Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method.
IEEE Trans. Netw. Serv. Manag., February, 2024

Contactless Electrocardiogram Monitoring With Millimeter Wave Radar.
IEEE Trans. Mob. Comput., January, 2024

An Efficient Scheduling Scheme of Swapping and Purification Operations for End-to-End Entanglement Distribution in Quantum Networks.
IEEE Trans. Netw. Sci. Eng., 2024

Differentially Private Federated Learning With an Adaptive Noise Mechanism.
IEEE Trans. Inf. Forensics Secur., 2024

Boosting Diffusion Models with Moving Average Sampling in Frequency Domain.
CoRR, 2024

2023
DECC: Achieving Low Latency in Data Center Networks With Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., December, 2023

Swapping-Based Entanglement Routing Design for Congestion Mitigation in Quantum Networks.
IEEE Trans. Netw. Serv. Manag., December, 2023

Towards Domain-Independent and Real-Time Gesture Recognition Using mmWave Signal.
IEEE Trans. Mob. Comput., December, 2023

RLoc: Towards Robust Indoor Localization by Quantifying Uncertainty.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks.
IEEE Commun. Mag., December, 2023

EdAR: An Experience-Driven Multipath Scheduler for Seamless Handoff in Mobile Networks.
IEEE Trans. Wirel. Commun., October, 2023

SimQN: A Network-Layer Simulator for the Quantum Network Investigation.
IEEE Netw., September, 2023

A Stream-Aware MPQUIC Scheduler for HTTP Traffic in Mobile Networks.
IEEE Trans. Wirel. Commun., April, 2023

Secure Transmission by Leveraging Multiple Intelligent Reflecting Surfaces in MISO Systems.
IEEE Trans. Mob. Comput., April, 2023

Achieving Flexible and Lightweight Multipath Congestion Control Through Online Learning.
IEEE Trans. Netw. Serv. Manag., March, 2023

Radio-Assisted Human Detection.
IEEE Trans. Multim., 2023

Revisiting Single Image Reflection Removal In the Wild.
CoRR, 2023

Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions.
IEEE Commun. Surv. Tutorials, 2023

Fine-grained Lung Function Sensing based on Millimeter-Wave Radar.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

WiCo: Robust Indoor Localization via Spectrum Confidence Estimation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Robust Respiration Sensing with WiFi.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Cascade-LogoNet: Eliminating Classification Ambiguity with Cascaded Logo Detection.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2023

RF-based Multi-view Pose Machine for Multi-Person 3D Pose Estimation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Non-contact emotion analysis based on videos.
Proceedings of the 2023 8th International Conference on Intelligent Information Technology, 2023

Early Marking for Controllable Maximum Queue Length in Data Center Networks.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

STrack: Velocity Estimation Using Single Antenna WiFi Devices.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
IEACC: An Intelligent Edge-Aided Congestion Control Scheme for Named Data Networking With Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., December, 2022

CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking.
IEEE Trans. Netw. Serv. Manag., 2022

Fidelity-Guaranteed Entanglement Routing in Quantum Networks.
IEEE Trans. Commun., 2022

A Heuristic Remote Entanglement Distribution Algorithm on Memory-Limited Quantum Paths.
IEEE Trans. Commun., 2022

An Asynchronous Entanglement Distribution Protocol for Quantum Networks.
IEEE Netw., 2022

An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking.
J. Comput. Sci. Technol., 2022

Freeform Body Motion Generation from Speech.
CoRR, 2022

Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Pushing the Limit of Radar-based Vibration Measurement with Deep Learning.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

MMCamera: an imaging modality for future RF-based physiological sensing.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

WiFi-Based Human Pose Image Generation.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Accurate Human Pose Estimation using RF Signals.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

3-D Imaging Under Low-Rank Constraint With Radio Signals.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Single Image Shadow Detection via Complementary Mechanism.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Principled Knowledge Extrapolation with GANs.
Proceedings of the International Conference on Machine Learning, 2022

Real-Time Fall Detection Using Mmwave Radar.
Proceedings of the IEEE International Conference on Acoustics, 2022

A Dynamic Flow Table Management Method Based on Real-time Traffic Monitoring.
Proceedings of the 23rd IEEE International Conference on High Performance Switching and Routing, 2022

LLDM: Low-Latency DoS Attack Detection and Mitigation in SDN.
Proceedings of the 23rd IEEE International Conference on High Performance Switching and Routing, 2022

Content-Aware Routing based on Cached Content Prediction in Satellite Networks.
Proceedings of the IEEE Global Communications Conference, 2022

DI-Gesture: Domain-Independent and Real-Time Gesture Recognition with Millimeter-Wave Signals.
Proceedings of the IEEE Global Communications Conference, 2022

Bijective Mapping Network for Shadow Removal.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Temporal Complementarity-Guided Reinforcement Learning for Image-to-Video Person Re-Identification.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Blacktooth: Breaking through the Defense of Bluetooth in Silence.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Blockchain Based Secure Data Aggregation and Distributed Power Dispatching for Microgrids.
IEEE Trans. Smart Grid, 2021

Service Prioritization in Information Centric Networking With Heterogeneous Content Providers.
IEEE Trans. Netw. Serv. Manag., 2021

Calibrating Privacy Budgets for Locally Private Graph Neural Networks.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Flat and Shallow: Understanding Fake Image Detection Models by Architecture Profiling.
Proceedings of the MMAsia '21: ACM Multimedia Asia, Gold Coast, Australia, December 1, 2021

Spatial-Temporal Correlation and Topology Learning for Person Re-Identification in Videos.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Private and Fast Routing in Credit Networks.
Proceedings of the International Conference on Networking and Network Applications, 2020

FSDM: Fast Recovery Saturation Attack Detection and Mitigation Framework in SDN.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

2009
Generalized Butterfly Graph and Its Application to Video Stream Authentication.
IEEE Trans. Circuits Syst. Video Technol., 2009

2008
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication.
IEEE Trans. Circuits Syst. Video Technol., 2008

Exploiting generalized discriminative multiple instance learning for multimedia semantic concept detection.
Pattern Recognit., 2008

Quality-Optimized and Secure End-to-End Authentication for Media Delivery.
Proc. IEEE, 2008

Video Browsing on Handheld Devices—Interface Designs for the Next Generation of Mobile Video Players.
IEEE Multim., 2008

An interactive and secure user authentication scheme for mobile devices.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Multi-strategy object tracking in complex situation for video surveillance.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

A joint ECC based media error and authentication protection scheme.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Rate-Distortion-Authentication optimized streaming with Generalized Butterfly Graph authentication.
Proceedings of the International Conference on Image Processing, 2008

Recaptured photo detection using specularity distribution.
Proceedings of the International Conference on Image Processing, 2008

Performance analysis of locality preserving image hash.
Proceedings of the International Conference on Image Processing, 2008

2007
An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks.
IEEE Trans. Multim., 2007

Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks.
IEEE Trans. Multim., 2007

Improving Semantic Concept Detection Through Optimizing Ranking Function.
IEEE Trans. Multim., 2007

Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication.
Trans. Data Hiding Multim. Secur., 2007

Rate-Distortion-Authentication Optimized Streaming of Authenticated Video.
IEEE Trans. Circuits Syst. Video Technol., 2007

Overview and Future Trends of Multimedia Research for Content Access and Distribution.
Int. J. Semantic Comput., 2007

The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks.
EURASIP J. Inf. Secur., 2007

A more aggressive prefetching scheme for streaming media delivery over the Internet.
Proceedings of the Visual Communications and Image Processing 2007, 2007

A novel framework for improving bandwidth utilization for VBR video delivery over wide-area networks.
Proceedings of the Visual Communications and Image Processing 2007, 2007

Flexible Layered Authentication Graph for Multimedia Streaming.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

An integrated statistical model for multimedia evidence combination.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Joint Source-Channel-Authentication Resource Allocation for Multimedia overWireless Networks.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Hidden Maximum Entropy Approach for Visual Concept Modeling.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Stream Authentication Based on Generlized Butterfly Graph.
Proceedings of the International Conference on Image Processing, 2007

Robust Hash for Detecting and Localizing Image Tampering.
Proceedings of the International Conference on Image Processing, 2007

Propagating Image-Level Part Statistics to Enhance Object Detection.
Proceedings of the International Conference on Image Processing, 2007

Rate-Distortion-Authentication Optimized Streaming with Multiple Deadlines.
Proceedings of the IEEE International Conference on Acoustics, 2007

Exploiting Concept Association to Boost Multimedia Semantic Concept Detection.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Design and Analysis of a Scalable Watermarking Scheme for the Scalable Audio Coder.
IEEE Trans. Signal Process., 2006

New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization.
IEEE Trans. Multim., 2006

A Secure and Robust Authentication Scheme for Video Transcoding.
IEEE Trans. Circuits Syst. Video Technol., 2006

An Efficient Context-Based BPGC Scalable Image Coder.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

TRECVID 2006 by NUS-I2R.
Proceedings of the 2006 TREC Video Retrieval Evaluation, 2006

Music Genres Classification using Text Categorization Method.
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006

Error Resilient Image Authentication Using Feature Statistical and Spatial Properties.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

An Efficient Mechanism for Video Streaming over Wide-Area Networks.
Proceedings of the Eigth IEEE International Symposium on Multimedia (ISM 2006), 2006

Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

The emerging JPEG-2000 security (JPSEC) standard.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

Detecting Musical Sounds in Broadcast Audio Based on Pitch Tuning Analysis.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Classifier Optimization for Multimedia Semantic Concept Detection.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Rate-Distortion Optimized Streaming of Authenticated Video.
Proceedings of the International Conference on Image Processing, 2006

A Generalized Discriminative Muitiple Instance Learning for Multimedia Semantic Concept Detection.
Proceedings of the International Conference on Image Processing, 2006

An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
A Robust and Secure Media Signature Scheme for JPEG Images.
J. VLSI Signal Process., 2005

A secure and robust digital signature scheme for JPEG2000 image authentication.
IEEE Trans. Multim., 2005

A Crypto Signature Scheme For Image Authentication Over Wireless Channel.
Int. J. Image Graph., 2005

Understanding Multimedia Security.
IEEE Multim., 2005

A more precise model for web retrieval.
Proceedings of the 14th international conference on World Wide Web, 2005

A New Watermarking Scheme Robust to Print-and-Scan.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Music Identification Using Embedded HMM.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

A Framework for Sub-Window Shot Detection.
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005

Multimodal content-based structure analysis of karaoke music.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

Modeling Retrieval Parallelism in Web Content Delivery.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005

Error resilient content-based image authentication over wireless channel.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A New Bit-Plane Entropy Coder for Scalable Image Coding.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

A proposal of butterfly-graph based stream authentication over lossy networks.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Watermarking based Image Authentication using Feature Amplification.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

An adaptive scalable watermark scheme for high-quality audio archiving and streaming applications.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

A BPGC-based scalable image entropy coder resilient to errors.
Proceedings of the 2005 International Conference on Image Processing, 2005

A practical print-scan resilient watermarking scheme.
Proceedings of the 2005 International Conference on Image Processing, 2005

A Secure Image-Based Authentication Scheme for Mobile Devices.
Proceedings of the Advances in Intelligent Computing, 2005

A scalable watermarking scheme for the scalable audio coder.
Proceedings of IEEE International Conference on Communications, 2005

Exploiting Fine Grained Parallelism for Acceleration of Web Retrieval.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

Towards Media Semantics: An I2R Perspective.
Proceedings of the Image and Video Retrieval, 4th International Conference, 2005

2004
A Secure and Robust Object-Based Video Authentication System.
EURASIP J. Adv. Signal Process., 2004

Blind detection of photomontage using higher order statistics.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Feature difference analysis in video authentication system.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A Hybrid Watermarking Scheme for H.264/AVC Video.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A unified authentication framework for JPEG2000.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Error concealment for JPEG2000 images based on orthogonal edge directed filters.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Robust lossless image data hiding.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Hierarchical, non-uniform locality sensitive hashing and its application to video identification.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

A novel lossy-to-lossless watermarking scheme for JEPG2000 images.
Proceedings of the 2004 International Conference on Image Processing, 2004

Edge directed filter based error concealment for wavelet-based images.
Proceedings of the 2004 International Conference on Image Processing, 2004

A RST resilient object-based video watermarking scheme.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Content based error detection and concealment for image transmission over wireless channel.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A semi-fragile object based video authentication system.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A secure and robust approach to scalable video authentication.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

An object based watermarking solution for MPEG4 video authentication.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
New semifragile image authentication watermarking techniques using random bias and nonuniform quantization.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

A quantitative semi-fragile JPEG2000 image authentication system.
Proceedings of the 2002 International Conference on Image Processing, 2002

Semi-fragile image authentication using generic wavelet domain features and ECC.
Proceedings of the 2002 International Conference on Image Processing, 2002

A robust and secure media signature scheme for JPEG images.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
An Optical Watermarking Solution for Authenticating Printed Documents.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

2000
Audio registration and its application in digital watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

VQ-based digital signature scheme for multimedia content authentication.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

1999
Digital Image Compression Using a Genetic Algorithm.
Real Time Imaging, 1999

Recovering modified watermarked images with reference to the original image.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A robust digital audio watermarking technique.
Proceedings of the ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999

Digital audio watermarking and its application in multimedia database.
Proceedings of the ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999

1998
A robust approach to face and eyes detection from images with cluttered background.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

Face Detection Based on Color and Local Symmetry Information.
Proceedings of the 3rd International Conference on Face & Gesture Recognition (FG '98), 1998

Precise eye detection from image sequences.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...