Qing Qian

Orcid: 0000-0002-8411-777X

Affiliations:
  • Guizhou University of Finance and Economics, School of Information, Guiyang, China
  • Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China (PhD 2018)


According to our database1, Qing Qian authored at least 28 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Robust copy-move detection and localization of digital audio based CFCC feature.
Multim. Tools Appl., March, 2025

2024
A music watermarking method based on the multi-band power distribution of copyright owner's speech.
Multim. Tools Appl., August, 2024

MT-EPTNet: Multi-task Acoustic Scene Classification with Efficient Parameter Tuning.
Proceedings of the Neural Information Processing - 31st International Conference, 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement Learning.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

2022
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT.
IEEE Internet Things J., 2022

An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms.
Int. J. Distributed Sens. Networks, 2022

Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022

VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Towards DDoS detection mechanisms in Software-Defined Networking.
J. Netw. Comput. Appl., 2021

ADVICE: Towards adaptive scheduling for data collection and DDoS detection in SDN.
J. Inf. Secur. Appl., 2021

METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
REPAIR: fragile watermarking for encrypted speech authentication with recovery ability.
Telecommun. Syst., 2020

LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2019
A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2019

2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018

An efficient fingerprint identification algorithm based on minutiae and invariant moment.
Pers. Ubiquitous Comput., 2018

Norm ratio-based audio watermarking scheme in DWT domain.
Multim. Tools Appl., 2018

2017
A passive authentication scheme for copy-move forgery based on package clustering algorithm.
Multim. Tools Appl., 2017

2016
A dual fragile watermarking scheme for speech authentication.
Multim. Tools Appl., 2016

Speech Authentication and Recovery Scheme in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Identification of Electronic Disguised Voices in the Noisy Environment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Privacy Protection of Digital Speech Based on Homomorphic Encryption.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An efficient content authentication scheme in encrypted speech based on integer wavelet transform.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

2011
Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011


  Loading...