default search action
Tong Qiao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Yingjie Qi, Jianlei Yang, Ao Zhou, Tong Qiao, Chunming Hu:
Architectural Implications of GNN Aggregation Programming Abstractions. IEEE Comput. Archit. Lett. 23(1): 125-128 (2024) - [j56]Weitong Hu, Di Zhou, Zhenxin Zhu, Tong Qiao, Ye Yao, Mahmoud Hassaballah:
Privacy-preserving face recognition method based on extensible feature extraction. J. Vis. Commun. Image Represent. 100: 104140 (2024) - [j55]Mohamed Abdel Hameed, M. Hassaballah, Tong Qiao:
IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks. Multim. Syst. 30(3): 129 (2024) - [j54]Tong Qiao, Shichuang Xie, Yanli Chen, Florent Retraint, Xiangyang Luo:
Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning. IEEE Trans. Pattern Anal. Mach. Intell. 46(7): 4654-4668 (2024) - [j53]Shengwang Xu, Tong Qiao, Ming Xu, Wei Wang, Ning Zheng:
Robust Adversarial Watermark Defending Against GAN Synthesization Attack. IEEE Signal Process. Lett. 31: 351-355 (2024) - [j52]Tong Qiao, Yuxing Chen, Xiaofei Zhou, Ran Shi, Hang Shao, Kunye Shen, Xiangyang Luo:
CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images. IEEE Trans. Cogn. Dev. Syst. 16(1): 369-379 (2024) - [j51]Tong Qiao, Hang Shao, Shichuang Xie, Ran Shi:
Unsupervised Generative Fake Image Detector. IEEE Trans. Circuits Syst. Video Technol. 34(9): 8442-8455 (2024) - [j50]Tong Qiao, Bin Zhao, Ran Shi, Meng Han, Mahmoud Hassaballah, Florent Retraint, Xiangyang Luo:
Scalable Universal Adversarial Watermark Defending Against Facial Forgery. IEEE Trans. Inf. Forensics Secur. 19: 8998-9011 (2024) - [j49]Tong Qiao, Shichuang Xie, Yanli Chen, Florent Retraint, Ran Shi, Xiangyang Luo:
Deepfake Detection Fighting Against Noisy Label Attack. IEEE Trans. Multim. 26: 9047-9059 (2024) - [i6]Ao Zhou, Jianlei Yang, Tong Qiao, Yingjie Qi, Zhi Yang, Weisheng Zhao, Chunming Hu:
Graph Neural Networks Automated Design and Deployment on Device-Edge Co-Inference Systems. CoRR abs/2404.05605 (2024) - [i5]Tong Qiao, Jianlei Yang, Yingjie Qi, Ao Zhou, Chen Bai, Bei Yu, Weisheng Zhao, Chunming Hu:
GNNavigator: Towards Adaptive Training of Graph Neural Networks via Automatic Guideline Exploration. CoRR abs/2404.09544 (2024) - [i4]Ao Zhou, Jianlei Yang, Yingjie Qi, Tong Qiao, Yumeng Shi, Cenlin Duan, Weisheng Zhao, Chunming Hu:
HGNAS: Hardware-Aware Graph Neural Architecture Search for Edge Devices. CoRR abs/2408.12840 (2024) - 2023
- [j48]Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu, Yanli Chen, Ming Xu, Xiangyang Luo:
A novel model watermarking for protecting generative adversarial network. Comput. Secur. 127: 103102 (2023) - [j47]Tong Qiao, Shengwang Xu, Shuai Wang, Xiaoshuai Wu, Bo Liu, Ning Zheng, Ming Xu, Binmin Pan:
Robust steganography in practical communication: a comparative study. EURASIP J. Image Video Process. 2023(1): 15 (2023) - [j46]Xin Cheng, Jingmei Zhou, Zhou Zhou, Xiangmo Zhao, Jianjin Gao, Tong Qiao:
An improved RRT-Connect path planning algorithm of robotic arm for automatic sampling of exhaust emission detection in Industry 4.0. J. Ind. Inf. Integr. 33: 100436 (2023) - [j45]Li Zhang, Tong Qiao, Ming Xu, Ning Zheng, Shichuang Xie:
Unsupervised Learning-Based Framework for Deepfake Video Detection. IEEE Trans. Multim. 25: 4785-4799 (2023) - [j44]Tong Qiao, Jiasheng Wu, Ning Zheng, Ming Xu, Xiangyang Luo:
FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing. IEEE Trans. Multim. 25: 7350-7363 (2023) - [c21]Shichuang Xie, Jiasheng Wu, Yanli Chen, Meng Han, Ting Wu, Tong Qiao:
Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion. APSIPA ASC 2023: 1435-1442 - [c20]Ao Zhou, Jianlei Yang, Yingjie Qi, Yumeng Shi, Tong Qiao, Weisheng Zhao, Chunming Hu:
Hardware-Aware Graph Neural Network Automated Design for Edge Computing Platforms. DAC 2023: 1-6 - [i3]Ao Zhou, Jianlei Yang, Yingjie Qi, Yumeng Shi, Tong Qiao, Weisheng Zhao, Chunming Hu:
Hardware-Aware Graph Neural Network Automated Design for Edge Computing Platforms. CoRR abs/2303.10875 (2023) - [i2]Yingjie Qi, Jianlei Yang, Ao Zhou, Tong Qiao, Chunming Hu:
Architectural Implications of GNN Aggregation Programming Abstractions. CoRR abs/2310.12184 (2023) - 2022
- [j43]Zhiming Xia, Tong Qiao, Ming Xu, Ning Zheng, Shichuang Xie:
Towards DeepFake video forensics based on facial textural disparities in multi-color channels. Inf. Sci. 607: 654-669 (2022) - [j42]Tong Qiao, Xiangyang Luo, Hongwei Yao, Ran Shi:
Classifying between computer generated and natural images: An empirical study from RAW to JPEG format. J. Vis. Commun. Image Represent. 85: 103506 (2022) - [j41]Xiaoshuai Wu, Tong Qiao, Yanli Chen, Ming Xu, Ning Zheng, Xiangyang Luo:
Sign steganography revisited with robust domain selection. Signal Process. 196: 108522 (2022) - [j40]Yanli Chen, Florent Retraint, Tong Qiao:
Image splicing forgery detection using simplified generalized noise model. Signal Process. Image Commun. 107: 116785 (2022) - [j39]Zhiming Xia, Tong Qiao, Ming Xu, Xiaoshuai Wu, Li Han, Yunzhi Chen:
Deepfake Video Detection Based on MesoNet with Preprocessing Module. Symmetry 14(5): 939 (2022) - [j38]Yanli Chen, Tong Qiao, Florent Retraint, Gengran Hu:
Efficient Privacy-Preserving Forensic Method for Camera Model Identification. IEEE Trans. Inf. Forensics Secur. 17: 2378-2393 (2022) - [j37]Ran Shi, Jing Ma, King Ngi Ngan, Jian Xiong, Tong Qiao:
Objective Object Segmentation Visual Quality Evaluation: Quality Measure and Pooling Method. ACM Trans. Multim. Comput. Commun. Appl. 18(3): 73:1-73:19 (2022) - [c19]Ran Shi, Jian Xiong, Tong Qiao:
Encrypted Image Visual Security Index via Non-Local Recognizable Degree Evaluation. ICASSP 2022: 2994-2998 - 2021
- [j36]Song Ge, Ming Xu, Tong Qiao, Ning Zheng:
A novel file carving algorithm for docker container logs recorded by json-file logging driver. Digit. Investig. 39: 301272 (2021) - [j35]Chaohao Wu, Tong Qiao, Hongjun Qiu, Benyun Shi, Qing Bao:
Individualism or Collectivism: A Reinforcement Learning Mechanism for Vaccination Decisions. Inf. 12(2): 66 (2021) - [j34]Xin Liao, Zihang Huang, Lin Peng, Tong Qiao:
First step towards parameters estimation of image operator chain. Inf. Sci. 575: 231-247 (2021) - [j33]Yangxin Yu, Ning Zheng, Tong Qiao, Ming Xu, Jiasheng Wu:
Distinguishing between natural and recolored images via lateral chromatic aberration. J. Vis. Commun. Image Represent. 80: 103295 (2021) - [j32]Tong Qiao, Qianru Zhao, Ning Zheng, Ming Xu, Li Zhang:
Geographical position spoofing detection based on camera sensor fingerprint. J. Vis. Commun. Image Represent. 81: 103320 (2021) - [j31]Yuting Du, Tong Qiao, Ming Xu, Ning Zheng:
Towards Face Presentation Attack Detection Based on Residual Color Texture Representation. Secur. Commun. Networks 2021: 6652727:1-6652727:16 (2021) - [j30]Tong Qiao, Shuai Wang, Xiangyang Luo, Zhiqiang Zhu:
Robust steganography resisting JPEG compression by improving selection of cover element. Signal Process. 183: 108048 (2021) - [j29]Xiaoshuai Wu, Tong Qiao, Ming Xu, Ning Zheng:
Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling. Signal Process. 188: 108200 (2021) - [j28]Tong Qiao, Xiangyang Luo, Ting Wu, Ming Xu, Zhenxing Qian:
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images. IEEE Trans. Dependable Secur. Comput. 18(6): 2736-2751 (2021) - [c18]Tong Qiao, Hanjiang Xiong, Xianwei Zheng:
Robust Feature Matching Using Motion Consistency and Geometrical Constraint for UAV Images. IGARSS 2021: 2254-2257 - [c17]Ao Zhou, Jianlei Yang, Yeqi Gao, Tong Qiao, Yingjie Qi, Xiaoyi Wang, Yunli Chen, Pengcheng Dai, Weisheng Zhao, Chunming Hu:
Brief Industry Paper: optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms. RTAS 2021: 445-448 - [i1]Ao Zhou, Jianlei Yang, Yeqi Gao, Tong Qiao, Yingjie Qi, Xiaoyi Wang, Yunli Chen, Pengcheng Dai, Weisheng Zhao, Chunming Hu:
Optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms. CoRR abs/2104.03058 (2021) - 2020
- [j27]Yue Di, Ying Huang, Ya-jing Yang, Xing-Tao Zhou, Wenting Luo, Haiyun Ye, Zhong-bao Qiao, Na Lu, Tong Qiao:
Measuring the Ocular Morphological Parameters of Guinea Pig Eye with Edge Detection and Curve Fitting. Comput. Math. Methods Medicine 2020: 6689023:1-6689023:13 (2020) - [j26]Mingji Yu, Yuchen Liu, Hu Sun, Heng Yao, Tong Qiao:
Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP J. Image Video Process. 2020(1): 16 (2020) - [j25]Jianlei Yang, Yixiao Duan, Tong Qiao, Huanyu Zhou, Jingyuan Wang, Weisheng Zhao:
Prototyping federated learning on edge computing systems. Frontiers Comput. Sci. 14(6): 146318 (2020) - [j24]Qiang Zhang, Ming Xu, Ning Zheng, Tong Qiao, Yaru Wang:
Identifying WeChat Message Types without Using Traditional Traffic. Inf. 11(1): 18 (2020) - [j23]Heng Yao, Hongbin Wei, Tong Qiao, Chuan Qin:
JPEG quantization step estimation with coefficient histogram and spectrum analyses. J. Vis. Commun. Image Represent. 69: 102795 (2020) - [j22]Hongwei Yao, Ming Xu, Tong Qiao, Yiming Wu, Ning Zheng:
Image Forgery Detection and Localization via a Reliability Fusion Map. Sensors 20(22): 6668 (2020) - [c16]Ran Shi, Jian Xiong, Tong Qiao:
Objective object segmentation visual quality evaluation based on pixel-level and region-level characteristics. MMAsia 2020: 52:1-52:7
2010 – 2019
- 2019
- [j21]Quanqi Liu, Tong Qiao, Ming Xu, Ning Zheng:
Fuzzy Localization of Steganographic Flipped Bits via Modification Map. IEEE Access 7: 74157-74167 (2019) - [j20]Zhiqiang Zhu, Ning Zheng, Tong Qiao, Ming Xu:
Robust Steganography by Modifying Sign of DCT Coefficients. IEEE Access 7: 168613-168628 (2019) - [j19]Tong Qiao, Wei Shan, Mingli Zhang, Chen Liu:
How to facilitate knowledge diffusion in complex networks: The roles of network structure, knowledge role distribution and selection rule. Int. J. Inf. Manag. 47: 152-167 (2019) - [j18]Mingying Huang, Ming Xu, Tong Qiao, Ting Wu, Ning Zheng:
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images. J. Univers. Comput. Sci. 25(9): 1151-0 (2019) - [j17]Yihua Zhao, Ning Zheng, Tong Qiao, Ming Xu:
Source camera identification via low dimensional PRNU features. Multim. Tools Appl. 78(7): 8247-8269 (2019) - [j16]Aichun Zhu, Tian Wang, Tong Qiao:
Multiple human upper bodies detection via candidate-region convolutional neural network. Multim. Tools Appl. 78(12): 16077-16096 (2019) - [j15]Yaru Wang, Ning Zheng, Ming Xu, Tong Qiao, Qiang Zhang, Feipeng Yan, Jian Xu:
Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App. Sensors 19(14): 3052 (2019) - [j14]Tong Qiao, Ran Shi, Xiangyang Luo, Ming Xu, Ning Zheng, Yiming Wu:
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication. IEEE Trans. Multim. 21(5): 1077-1092 (2019) - [c15]Na Huang, Ming Xu, Ning Zheng, Tong Qiao, Kim-Kwang Raymond Choo:
Deep Android Malware Classification with API-Based Feature Graph. TrustCom/BigDataSE 2019: 296-303 - 2018
- [j13]Hongwei Yao, Tong Qiao, Ming Xu, Ning Zheng:
Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network. IEEE Access 6: 24973-24982 (2018) - [j12]Tong Qiao, Florent Retraint:
Identifying Individual Camera Device From RAW Images. IEEE Access 6: 78038-78054 (2018) - [j11]Tong Qiao, Wei Shan, Ganjun Yu, Chen Liu:
A Novel Entropy-Based Centrality Approach for Identifying Vital Nodes in Weighted Networks. Entropy 20(4): 261 (2018) - [j10]Tong Qiao, Aichun Zhu, Florent Retraint:
Exposing image resampling forgery by using linear parametric model. Multim. Tools Appl. 77(2): 1501-1523 (2018) - [j9]Heng Yao, Fang Cao, Zhenjun Tang, Jinwei Wang, Tong Qiao:
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multim. Tools Appl. 77(14): 18139-18161 (2018) - [j8]Tong Qiao, Zhijing Yang, Jinchang Ren, Peter W. T. Yuen, Huimin Zhao, Genyun Sun, Stephen Marshall, Jón Atli Benediktsson:
Joint bilateral filtering and spectral similarity-based sparse representation: A generic framework for effective feature extraction and data classification in hyperspectral imaging. Pattern Recognit. 77: 316-328 (2018) - [c14]Chaoping Ding, Ting Wu, Tong Qiao, Ning Zheng, Ming Xu, Yiming Wu, Wenjing Xia:
A Location Spoofing Detection Method for Social Networks (Short Paper). CollaborateCom 2018: 138-150 - [c13]Li Li, Xin Li, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang:
A Novel Framework of Robust Video Watermarking Based on Statistical Model. ICCCS (4) 2018: 160-172 - [c12]Haofeng Yan, Yiming Wu, Ming Xu, Ting Wu, Jian Xu, Tong Qiao:
Resilient Consensus for Multi-agent Networks with Mobile Detectors. ICONIP (7) 2018: 291-302 - [c11]Guang Wang, Ming Xu, Yiming Wu, Ning Zheng, Jian Xu, Tong Qiao:
Using Machine Learning for Determining Network Robustness of Multi-Agent Systems Under Attacks. PRICAI 2018: 491-498 - [c10]Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng, Kim-Kwang Raymond Choo:
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic. TrustCom/BigDataSE 2018: 1426-1432 - 2017
- [j7]Kai Shi, Ming Xu, Haoxia Jin, Tong Qiao, Xue Yang, Ning Zheng, Jian Xu, Kim-Kwang Raymond Choo:
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics. Digit. Investig. 23: 11-21 (2017) - [j6]Tong Qiao, Wei Shan, Chang Zhou:
How to Identify the Most Powerful Node in Complex Networks? A Novel Entropy Centrality Approach. Entropy 19(11): 614 (2017) - [j5]Tong Qiao, Florent Retraint, Rémi Cogranne, Thanh Hai Thai:
Individual camera device identification from JPEG images. Signal Process. Image Commun. 52: 74-86 (2017) - [j4]Tong Qiao, Jinchang Ren, Zheng Wang, Jaime Zabalza, Meijun Sun, Huimin Zhao, Shutao Li, Jón Atli Benediktsson, Qingyun Dai, Stephen Marshall:
Effective Denoising and Classification of Hyperspectral Images Using Curvelet Transform and Singular Spectrum Analysis. IEEE Trans. Geosci. Remote. Sens. 55(1): 119-133 (2017) - [c9]Haidong Ge, Ning Zheng, Lin Cai, Ming Xu, Tong Qiao, Tao Yang, Jinkai Sun, Sudeng Hu:
Adaptive Carving Method for Live FLV Streaming. CollaborateCom 2017: 554-566 - [c8]Yidong Shen, Ming Xu, Ning Zheng, Jian Xu, Wenjing Xia, Yiming Wu, Tong Qiao, Tao Yang:
Android App Classification and Permission Usage Risk Assessment. CollaborateCom 2017: 567-577 - [c7]Lijun Chen, Ming Xu, Xue Yang, Ning Zheng, Yiming Wu, Jian Xu, Tong Qiao, Hongbin Liu:
A Privacy Settings Prediction Model for Textual Posts on Social Networks. CollaborateCom 2017: 578-588 - [c6]Ming Xu, Jinkai Sun, Ning Zheng, Tong Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang:
A Novel File Carving Algorithm for EVTX Logs. ICDF2C 2017: 97-105 - 2016
- [b1]Tong Qiao:
Statistical detection for digital image forensics. (Détection statistique pour la criminalistique des images numériques). University of Technology of Troyes, France, 2016 - 2015
- [j3]Tong Qiao, Jinchang Ren, Cameron Craigie, Jaime Zabalza, Charlotte Maltin, Stephen Marshall:
Singular spectrum analysis for improving hyperspectral imaging based beef eating quality evaluation. Comput. Electron. Agric. 115: 21-25 (2015) - [j2]Tong Qiao, Florent Retraint, Rémi Cogranne, Cathel Zitzmann:
Steganalysis of JSteg algorithm using hypothesis testing theory. EURASIP J. Inf. Secur. 2015: 2 (2015) - [c5]Stephen Marshall, Timothy Kelman, Tong Qiao, Paul Murray, Jaime Zabalza:
Hyperspectral imaging for food applications. EUSIPCO 2015: 2854-2858 - [c4]Tong Qiao, Florent Retraint, Rémi Cogranne, Thanh Hai Thai:
Source camera device identification based on raw images. ICIP 2015: 3812-3816 - 2014
- [c3]Tong Qiao, Cathel Zitzmann, Florent Retraint, Rémi Cogranne:
Statistical detection of Jsteg steganography using hypothesis testing theory. ICIP 2014: 5517-5521 - [c2]Tong Qiao, Cathel Zitzmann, Rémi Cogranne, Florent Retraint:
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters. IH&MMSec 2014: 3-13 - 2013
- [j1]Zhenxing Qian, Tong Qiao:
Simplified Anti-Forensics of JPEG Compression. J. Comput. 8(10): 2483-2488 (2013) - [c1]Tong Qiao, Florent Retraint, Rémi Cogranne:
Image authentication by statistical analysis. EUSIPCO 2013: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint