Zheng Qin

Orcid: 0000-0003-0877-3887

Affiliations:
  • Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China
  • Michigan State University, East Lansing, MI, USA (2010 - 2011)
  • Chongqing University, Department of computer software and theory, China (PhD 2001)


According to our database1, Zheng Qin authored at least 125 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS.
IEEE Trans. Computers, March, 2024

FTODefender: An efficient flow table overflow attacks defending system in SDN.
Expert Syst. Appl., March, 2024

Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces.
CoRR, 2024

Multi-Prompts Learning with Cross-Modal Alignment for Attribute-Based Person Re-identification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics.
IEEE Trans. Cogn. Commun. Netw., December, 2023

Traffic Flow Video Image Recognition and Analysis Based on Multi-Target Tracking Algorithm and Deep Learning.
IEEE Trans. Intell. Transp. Syst., August, 2023

Identification of image global processing operator chain based on feature decoupling.
Inf. Sci., August, 2023

Optimizing Keyword Search Over Federated RDF Systems.
IEEE Trans. Big Data, June, 2023

An Attribute-Based Keyword Search Scheme for Multiple Data Owners in Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Ind. Informatics, April, 2023

A Cost-Driven Top-K Queries Optimization Approach on Federated RDF Systems.
IEEE Trans. Big Data, April, 2023

SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks.
J. Netw. Comput. Appl., April, 2023

SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023

Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds.
IEEE Trans. Dependable Secur. Comput., 2023

An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT.
IEEE Internet Things J., 2023

Artificial Intelligence Security: Threats and Countermeasures.
ACM Comput. Surv., 2023

Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces.
CoRR, 2023

Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection.
CoRR, 2023

DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection.
CoRR, 2023

FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023

Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm.
IEEE Trans. Serv. Comput., 2022

Revocable Attribute-Based Data Storage in Mobile Clouds.
IEEE Trans. Serv. Comput., 2022

Moment is Important: Language-Based Video Moment Retrieval via Adversarial Learning.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features.
IEEE Trans. Dependable Secur. Comput., 2022

Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN.
IEEE J. Sel. Areas Commun., 2022

Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing.
IEEE Internet Things J., 2022

Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022

An approach for detecting LDoS attack based on cloud model.
Frontiers Comput. Sci., 2022

A novel LDoS attack detection method based on reconstruction anomaly.
Clust. Comput., 2022

FInfer: Frame Inference-Based Deepfake Detection for High-Visual-Quality Videos.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing.
IEEE Trans. Veh. Technol., 2021

FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack.
IEEE Trans. Reliab., 2021

A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services.
IEEE Trans. Emerg. Top. Comput., 2021

An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing.
IEEE Trans. Dependable Secur. Comput., 2021

Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services.
IEEE Trans. Dependable Secur. Comput., 2021

Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2021

Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2021

Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services.
IEEE Trans. Computers, 2021

Reversible data hiding based on multiple histograms modification and deep neural networks.
Signal Process. Image Commun., 2021

Identifying tampering operations in image operator chains based on decision fusion.
Signal Process. Image Commun., 2021

Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., 2021

Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems.
IEEE Internet Things J., 2021

FedAggs: Optimizing Aggregate Queries Evaluation in Federated RDF Systems.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

LDoS Attack Detection Based on ASNNC-OFA Algorithm.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing.
Proceedings of the ICC 2021, 2021

A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains.
Proceedings of the IEEE International Conference on Acoustics, 2021

NREngine: A Graph-Based Query Engine for Network Reachability.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2021 International Workshops, 2021

FedTopK: Top-K Queries Optimization over Federated RDF Systems.
Proceedings of the Database Systems for Advanced Applications, 2021

Multi-Modal Relational Graph for Cross-Modal Video Moment Retrieval.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Millimeter Wave Wireless Hadamard Image Transmission for MIMO Enabled 5G and Beyond.
IEEE Wirel. Commun., 2020

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020

A New Payload Partition Strategy in Color Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

Hashtag our stories: Hashtag recommendation for micro-videos via harnessing multiple modalities.
Knowl. Based Syst., 2020

Reversible data hiding in JPEG bitstream using optimal VLC mapping.
J. Vis. Commun. Image Represent., 2020

A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing.
J. Parallel Distributed Comput., 2020

Privacy-preserving range query over multi-source electronic health records in public clouds.
J. Parallel Distributed Comput., 2020

Singular Spectrum Analysis for Local Differential Privacy of Classifications in the Smart Grid.
IEEE Internet Things J., 2020

A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT.
IEEE Internet Things J., 2020

A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm.
Int. J. Comput. Sci. Eng., 2020

A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations.
Int. J. Bifurc. Chaos, 2020

Gradient-Guided Residual Learning for Inverse Halftoning and Image Expanding.
IEEE Access, 2020

Optimizing Distance Computation in Distributed Graph Systems.
IEEE Access, 2020

Adversarial Video Moment Retrieval by Jointly Modeling Ranking and Localization.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

STRONG: Spatio-Temporal Reinforcement Learning for Cross-Modal Video Moment Localization.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Efficient and Privacy-preserving Outsourced Image Retrieval in Public Clouds.
Proceedings of the IEEE Global Communications Conference, 2020

Keyword Search over Federated RDF Systems.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
HCIC: Hardware-Assisted Control-Flow Integrity Checking.
IEEE Internet Things J., 2019

Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners.
Future Gener. Comput. Syst., 2019

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding.
Comput. Secur., 2019

Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps.
IEEE Access, 2019

A Novel Approach to Rule Placement in Software-Defined Networks Based on OPTree.
IEEE Access, 2019

A Large-Scale Urban Vehicular Network Framework for IoT in Smart Cities.
IEEE Access, 2019

NRGQP: A Graph-Based Query Platform for Network Reachability.
Proceedings of the Web Information Systems Engineering, 2019

Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Distributed Landmark Selection for Lower Bound Estimation of Distances in Large Graphs.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

FMQO: A Federated RDF System Supporting Multi-query Optimization.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements.
IEEE/ACM Trans. Netw., 2018

On-Line Anomaly Detection With High Accuracy.
IEEE/ACM Trans. Netw., 2018

Frequency Offset-Based Ring Oscillator Physical Unclonable Function.
IEEE Trans. Multi Scale Comput. Syst., 2018

Tailoring reversible data hiding for 3D synthetic images.
Signal Process. Image Commun., 2018

An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
Secur. Commun. Networks, 2018

Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
Cybersecur., 2018

Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features.
IEEE Access, 2018

An Optimal Pufferfish Privacy Mechanism for Temporally Correlated Trajectories.
IEEE Access, 2018

Divide and Conquer for Fast SRLG Disjoint Routing.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Gradient-Guided DCNN for Inverse Halftoning and Image Expanding.
Proceedings of the Computer Vision - ACCV 2018, 2018

2017
Data embedding in digital images using critical functions.
Signal Process. Image Commun., 2017

A query privacy-enhanced and secure search scheme over encrypted data in cloud computing.
J. Comput. Syst. Sci., 2017

An efficient privacy-preserving compressive data gathering scheme in WSNs.
Inf. Sci., 2017

Answering top-K query combined keywords and structural queries on RDF graphs.
Inf. Syst., 2017

Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2017

Toward Complex Search for Encrypted Cloud Data via Blind Index Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A image texture and BP neural network basec malicious files detection technique for cloud storage systems.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Android Malware Detection Using Local Binary Pattern and Principal Component Analysis.
Proceedings of the Data Science, 2017

2016
Minimizing datacenter flow completion times with server-based flow scheduling.
Comput. Networks, 2016

A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

An Approach to Rule Placement in Software-Defined Networks.
Proceedings of the 19th ACM International Conference on Modeling, 2016

IRMD: Malware Variant Detection Using Opcode Image Recognition.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Multi-User Location Correlation Protection with Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Topological ordering based iterative TCAM rule compression using bi-partite graphs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm.
Proceedings of the 12th International Conference on Natural Computation, 2016

Malware Variant Detection Using Opcode Image Recognition with Small Training Sets.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Unequal Failure Protection Coding Technology for Cloud Storage Systems.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs.
IEEE Trans. Circuits Syst. II Express Briefs, 2015

A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Netw. Syst. Manag., 2013

2012
Towards high performance security policy evaluation.
J. Supercomput., 2012

2010
Accelerating the bit-split string matching algorithm using Bloom filters.
Comput. Commun., 2010

2007
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.
Proceedings of the Computational Science and Its Applications, 2007

2005
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2004
WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004


  Loading...