Tong Qiao

According to our database1, Tong Qiao authored at least 50 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling.
Signal Process., 2021

Robust steganography resisting JPEG compression by improving selection of cover element.
Signal Process., 2021

Towards Face Presentation Attack Detection Based on Residual Color Texture Representation.
Secur. Commun. Networks, 2021

First step towards parameters estimation of image operator chain.
Inf. Sci., 2021

Individualism or Collectivism: A Reinforcement Learning Mechanism for Vaccination Decisions.
Inf., 2021

Optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms.
CoRR, 2021

Brief Industry Paper: optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

2020
Image Forgery Detection and Localization via a Reliability Fusion Map.
Sensors, 2020

JPEG quantization step estimation with coefficient histogram and spectrum analyses.
J. Vis. Commun. Image Represent., 2020

Identifying WeChat Message Types without Using Traditional Traffic.
Inf., 2020

Prototyping federated learning on edge computing systems.
Frontiers Comput. Sci., 2020

Adaptive and separable multiary reversible data hiding in encryption domain.
EURASIP J. Image Video Process., 2020

Measuring the Ocular Morphological Parameters of Guinea Pig Eye with Edge Detection and Curve Fitting.
Comput. Math. Methods Medicine, 2020

Objective object segmentation visual quality evaluation based on pixel-level and region-level characteristics.
Proceedings of the MMAsia 2020: ACM Multimedia Asia, 2020

2019
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019

Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
Sensors, 2019

Multiple human upper bodies detection via candidate-region convolutional neural network.
Multim. Tools Appl., 2019

Source camera identification via low dimensional PRNU features.
Multim. Tools Appl., 2019

Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images.
J. Univers. Comput. Sci., 2019

How to facilitate knowledge diffusion in complex networks: The roles of network structure, knowledge role distribution and selection rule.
Int. J. Inf. Manag., 2019

Robust Steganography by Modifying Sign of DCT Coefficients.
IEEE Access, 2019

Fuzzy Localization of Steganographic Flipped Bits via Modification Map.
IEEE Access, 2019

Deep Android Malware Classification with API-Based Feature Graph.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Joint bilateral filtering and spectral similarity-based sparse representation: A generic framework for effective feature extraction and data classification in hyperspectral imaging.
Pattern Recognit., 2018

Expose noise level inconsistency incorporating the inhomogeneity scoring strategy.
Multim. Tools Appl., 2018

Exposing image resampling forgery by using linear parametric model.
Multim. Tools Appl., 2018

A Novel Entropy-Based Centrality Approach for Identifying Vital Nodes in Weighted Networks.
Entropy, 2018

Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network.
IEEE Access, 2018

Identifying Individual Camera Device From RAW Images.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Using Machine Learning for Determining Network Robustness of Multi-Agent Systems Under Attacks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Resilient Consensus for Multi-agent Networks with Mobile Detectors.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Novel Framework of Robust Video Watermarking Based on Statistical Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Location Spoofing Detection Method for Social Networks (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Effective Denoising and Classification of Hyperspectral Images Using Curvelet Transform and Singular Spectrum Analysis.
IEEE Trans. Geosci. Remote. Sens., 2017

Individual camera device identification from JPEG images.
Signal Process. Image Commun., 2017

How to Identify the Most Powerful Node in Complex Networks? A Novel Entropy Centrality Approach.
Entropy, 2017

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017

A Novel File Carving Algorithm for EVTX Logs.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Android App Classification and Permission Usage Risk Assessment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Adaptive Carving Method for Live FLV Streaming.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

A Privacy Settings Prediction Model for Textual Posts on Social Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2015
Steganalysis of JSteg algorithm using hypothesis testing theory.
EURASIP J. Inf. Secur., 2015

Singular spectrum analysis for improving hyperspectral imaging based beef eating quality evaluation.
Comput. Electron. Agric., 2015

Source camera device identification based on raw images.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Hyperspectral imaging for food applications.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Statistical detection of Jsteg steganography using hypothesis testing theory.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Simplified Anti-Forensics of JPEG Compression.
J. Comput., 2013

Image authentication by statistical analysis.
Proceedings of the 21st European Signal Processing Conference, 2013


  Loading...