Qindong Sun
Orcid: 0000-0003-2019-7886
According to our database1,
Qindong Sun
authored at least 64 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Adaptive and flexible ℓ <sub>1</sub>-norm graph embedding for unsupervised feature selection.
Appl. Intell., November, 2024
Subspace clustering via adaptive-loss regularized representation learning with latent affinities.
Pattern Anal. Appl., March, 2024
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain.
ACM Trans. Priv. Secur., 2024
IEEE Trans. Instrum. Meas., 2024
Robust auto-weighted and dual-structural representation learning for image clustering.
J. Electronic Imaging, 2024
Multi-domain awareness for compressed deepfake videos detection over social networks guided by common mechanisms between artifacts.
Comput. Vis. Image Underst., 2024
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
2023
Joint Dual-Structural Constrained and Non-negative Analysis Representation Learning for Pattern Classification.
Appl. Artif. Intell., December, 2023
Class-oriented and label embedding analysis dictionary learning for pattern classification.
Multim. Tools Appl., July, 2023
A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme.
IET Inf. Secur., 2023
2022
ACM Trans. Sens. Networks, 2022
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection.
IEEE Trans. Inf. Forensics Secur., 2022
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Comput. Soc. Syst., 2022
Rating behavior evaluation and abnormality forensics analysis for injection attack detection.
J. Intell. Inf. Syst., 2022
Trans. Emerg. Telecommun. Technol., 2022
ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
Entropy, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management.
IEEE Trans. Intell. Transp. Syst., 2021
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors.
IEEE Trans. Inf. Forensics Secur., 2021
Open J. Internet Things, 2021
Mob. Networks Appl., 2021
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021
2020
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2020
J. Intell. Fuzzy Syst., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020
2019
Signal Process. Image Commun., 2019
Multim. Tools Appl., 2019
IEEE Internet Things J., 2019
Clust. Comput., 2019
Proceedings of the 33rd International Conference on Information Networking, 2019
2018
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems.
IEEE Trans. Comput. Soc. Syst., 2018
Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD.
J. Vis. Commun. Image Represent., 2018
J. Biomed. Informatics, 2018
Improving the security and quality of real-time multimedia transmission in cyber-physical-social systems.
Int. J. Distributed Sens. Networks, 2018
EURASIP J. Wirel. Commun. Netw., 2018
A loss prevention methodology for catering industry based on operation data analysis.
Clust. Comput., 2018
Evaluating Prediction Error for Anomaly Detection by Exploiting Matrix Factorization in Rating Systems.
IEEE Access, 2018
Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding.
IEEE Access, 2018
Proceedings of the 5th International Conference on Systems and Informatics, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
2017
Data Min. Knowl. Discov., 2017
2016
Int. J. Pattern Recognit. Artif. Intell., 2016
Int. J. Pattern Recognit. Artif. Intell., 2016
Node importance evaluation method in wireless sensor network based on energy field model.
EURASIP J. Wirel. Commun. Netw., 2016
2015
J. Comput. Methods Sci. Eng., 2015
2014
J. Softw., 2014
Modeling for user interaction by influence transfer effect in online social networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2010
IEEE Netw., 2010
J. Convergence Inf. Technol., 2010
2009
Proceedings of the Fifth International Conference on Networking and Services, 2009
2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
2007
A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006