Qindong Sun

Orcid: 0000-0003-2019-7886

According to our database1, Qindong Sun authored at least 58 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Subspace clustering via adaptive-loss regularized representation learning with latent affinities.
Pattern Anal. Appl., March, 2024

Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain.
ACM Trans. Priv. Secur., 2024

2023
Joint Dual-Structural Constrained and Non-negative Analysis Representation Learning for Pattern Classification.
Appl. Artif. Intell., December, 2023

Class-oriented and label embedding analysis dictionary learning for pattern classification.
Multim. Tools Appl., July, 2023

2022
A Secure and Anonymous Communicate Scheme over the Internet of Things.
ACM Trans. Sens. Networks, 2022

Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations.
IEEE Trans. Dependable Secur. Comput., 2022

SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control.
IEEE Trans. Comput. Soc. Syst., 2022

Rating behavior evaluation and abnormality forensics analysis for injection attack detection.
J. Intell. Inf. Syst., 2022

Privacy-preserving dish-recommendation for food nutrition through edging computing.
Trans. Emerg. Telecommun. Technol., 2022

ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
Entropy, 2022

2021
Image Source Identification Using Convolutional Neural Networks in IoT Environment.
Wirel. Commun. Mob. Comput., 2021

Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021

Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors.
IEEE Trans. Inf. Forensics Secur., 2021

Video Source Forensics for IoT Devices Based on Convolutional Neural Networks.
Open J. Internet Things, 2021

Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment.
Mob. Networks Appl., 2021

Multi-scale skip-connection network for image super-resolution.
Multim. Syst., 2021

Locality Constrained Analysis Dictionary Learning via K-SVD Algorithm.
CoRR, 2021

Low-Rank Orthonormal Analysis Dictionary Learning for Image Classification.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

2020
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2020

(<i>k</i>, <i>n</i>) scalable secret image sharing with multiple decoding options.
J. Intell. Fuzzy Syst., 2020

Fined-grained Aspect Extraction from Online Reviews for Decision Support.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Optimizing Scoring and Sorting Operations for Faster WAND Processing.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

2019
Enhanced embedding capacity for the SMSD-based data-hiding method.
Signal Process. Image Commun., 2019

Threshold changeable secret image sharing scheme based on interpolation polynomial.
Multim. Tools Appl., 2019

Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems.
IEEE Internet Things J., 2019

IoT Forensics: Amazon Echo as a Use Case.
IEEE Internet Things J., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

Video-Aware Multipath Network Coding over Multi-Hop Wireless Networks.
Proceedings of the 33rd International Conference on Information Networking, 2019

2018
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems.
IEEE Trans. Comput. Soc. Syst., 2018

Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.
J. Vis. Commun. Image Represent., 2018

Local spatial obesity analysis and estimation using online social network sensors.
J. Biomed. Informatics, 2018

Uncovering anomalous rating behaviors for rating systems.
Neurocomputing, 2018

Improving the security and quality of real-time multimedia transmission in cyber-physical-social systems.
Int. J. Distributed Sens. Networks, 2018

(k, n) secret image sharing scheme capable of cheating detection.
EURASIP J. Wirel. Commun. Netw., 2018

A loss prevention methodology for catering industry based on operation data analysis.
Clust. Comput., 2018

Evaluating Prediction Error for Anomaly Detection by Exploiting Matrix Factorization in Rating Systems.
IEEE Access, 2018

Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding.
IEEE Access, 2018

The Crowding Mechanism Genetic Algorithm for Solving Job Scheduling Problem.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Quality Improvement of Real-Time Video in Mobile Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Forensic Analysis of Digital Images over Smart Devices and Online Social Networks.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Industrial wireless sensor networks 2016.
Int. J. Distributed Sens. Networks, 2017

Detecting cooperative and organized spammer groups in micro-blogging community.
Data Min. Knowl. Discov., 2017

2016
Identification of Influential Online Social Network Users Based on Multi-Features.
Int. J. Pattern Recognit. Artif. Intell., 2016

An Edge Detection Method Based on Adjacent Dispersion.
Int. J. Pattern Recognit. Artif. Intell., 2016

Node importance evaluation method in wireless sensor network based on energy field model.
EURASIP J. Wirel. Commun. Netw., 2016

2015
A method of image segmentation based on the JPEG file stream.
J. Comput. Methods Sci. Eng., 2015

2014
A Large-scale Trojans Control Model Based on Layered and P2P Structure.
J. Softw., 2014

Industrial Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Modeling for user interaction by influence transfer effect in online social networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

A Multi-users Searchable Encryption Scheme with Proxy Re-encryption.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2010
Group dynamics in discussing incidental topics over online social networks.
IEEE Netw., 2010

Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network.
J. Convergence Inf. Technol., 2010

2009
Analysis and Computing of Association Degree of SMS Feature Words.
Proceedings of the Fifth International Conference on Networking and Services, 2009

2008
Accuracy of an Icing On-line Monitoring System.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

2007
A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006


  Loading...