Qingzhong Liu

Orcid: 0000-0002-2006-5413

According to our database1, Qingzhong Liu authored at least 91 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Detection of Web-Attack using DistilBERT, RNN, and LSTM.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Cyberbullying Detection on Social Media Using Machine Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Detection and Classification of Web Application Attacks.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Applications, 2023

Detecting Web-Based Attacks: A Comparative Analysis of Machine Learning and BERT Transformer Approaches.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Applications, 2023

Crime-Intent Sentiment Detection on Twitter Data Using Machine Learning.
Proceedings of the 8th International Conference on Automation, 2023

2022
A Survey of Deep Fake Detection for Trial Courts.
CoRR, 2022

Hybrid Analysis Based Cross Inspection Framework for Android Malware Detection.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022

A Comparison Study to Detect COVID-19 Chest X-Ray Images with SOTA Deep Learning Models.
Proceedings of the 1st Workshop on Healthcare AI and COVID-19, 2022

Walk This Way: Footwear Recognition Using Images & Neural Networks.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

MANAGE: A Novel Malware Evolution Model based on Digital Genes.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Large Feature Mining and Deep Learning in Multimedia Forensics.
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021

2019
An Improved Approach to Exposing JPEG Seam Carving Under Recompression.
IEEE Trans. Circuits Syst. Video Technol., 2019

Detect Video Forgery by Performing Transfer Learning on Deep Neural Network.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

Performance Evaluation of Transfer Learning for Pornographic Detection.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

Heat-Map Based Emotion and Face Recognition from Thermal Images.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Gun Identification Using Tensorflow.
Proceedings of the Machine Learning and Intelligent Communications, 2018

Detecting Digital Photo Tampering with Deep Learning.
Proceedings of the Machine Learning and Intelligent Communications, 2018

Detecting Phishing Websites with Random Forest.
Proceedings of the Machine Learning and Intelligent Communications, 2018

Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones.
Proceedings of the 2018 International Conference on Computing, 2018

2017
An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics.
Pattern Recognit., 2017

2016
Utilizing DTRS for Imbalanced Text Classification.
Proceedings of the Rough Sets - International Joint Conference, 2016

Sampling and Evaluating the Big Data for Knowledge Discovery.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Merging Permission and API Features for Android Malware Detection.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Exposing seam carving forgery under recompression attacks by hybrid large feature mining.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Exposing Inpainting Forgery in JPEG Images under Recompression Attacks.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

2015
Mobile Watermarking against Geometrical Distortions.
EAI Endorsed Trans. Security Safety, 2015

A Method to Detect AAC Audio Forgery.
EAI Endorsed Trans. Security Safety, 2015

A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Exposing Image Tampering with the Same Quantization Matrix.
Proceedings of the Multimedia Data Mining and Analytics - Disruptive Innovation, 2015

2014
Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images.
ACM Trans. Intell. Syst. Technol., 2014

A new statistical approach to combining p-values using gamma distribution and its application to genome-wide association study.
BMC Bioinform., 2014

Detecting differentially methylated loci for multiple treatments based on high-throughput methylation data.
BMC Bioinform., 2014

Mining the Big Data: The Critical Feature Dimension Problem.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

2013
MP3 audio steganalysis.
Inf. Sci., 2013

Detection of Double MPEG-2 Compression Based on Distributions of DCT coefficients.
Int. J. Pattern Recognit. Artif. Intell., 2013

Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation.
Appl. Intell., 2013

An improved approach to detecting content-aware scaling-based tampering in JPEG images.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Gene order computation using Alzheimer's DNA microarray gene expression data and the ant colony optimisation algorithm.
Int. J. Data Min. Bioinform., 2012

A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data.
Bioinform., 2012

Model evaluation of datasets using critical dimension model invariants.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Dependance of critical dimension on learning machines and ranking methods.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Identification of Smartphone-Image Source and Manipulation.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and Extensions.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Feature Selection for Improved Phishing Detection.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

A Comparison Study of Cost-Sensitive Classifier Evaluations.
Proceedings of the Brain Informatics - International Conference, 2012

Scalable Secure MJPEG Video Streaming.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Derivative-based audio steganalysis.
ACM Trans. Multim. Comput. Commun. Appl., 2011

Neighboring joint density-based JPEG steganalysis.
ACM Trans. Intell. Syst. Technol., 2011

Steganalysis of DCT-embedding based adaptive steganography and YASS.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

A Method to Detect JPEG-Based Double Compression.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

Determine the Critical dimension in data mining (experiments with bioinformatics datasets).
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

A JPEG-based statistically invisible steganography.
Proceedings of the ICIMCS 2011, 2011

Locating Information-hiding in MP3 Audio.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 1, 2011

2010
An improved approach to steganalysis of JPEG images.
Inf. Sci., 2010

Exposing Digital Video Logo-Removal Forgery by Inconsistency of Blur.
Int. J. Pattern Recognit. Artif. Intell., 2010

A Novel Source MPEG-2 Video Identification Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2010

Identifying Differentially Expressed Genes based on probe level data for GeneChip arrays.
Int. J. Comput. Biol. Drug Des., 2010

Detection of Double MP3 Compression.
Cogn. Comput., 2010

Revealing real quality of double compressed MP3 audio.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Predicting embedding strength in audio steganography.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

2009
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis.
IEEE Trans. Inf. Forensics Secur., 2009

Distance metric learning and support vector machines for classification of mass spectrometry proteomics data.
Int. J. Knowl. Eng. Soft Data Paradigms, 2009

Improved detection and evaluation for JPEG steganalysis.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Novel stream mining for audio steganalysis.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

A new approach for JPEG resize and image splicing detection.
Proceedings of the First ACM workshop on Multimedia in forensics, 2009

Spectrum Steganalysis of WAV Audio Streams.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Steganalysis of MP3Stego.
Proceedings of the International Joint Conference on Neural Networks, 2009

Feature Mining and Intelligent Computing for MP3 Steganalysis.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning.
Proceedings of the BIOSIGNALS 2009, 2009

2008
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images.
Pattern Recognit., 2008

Image complexity and feature mining for steganalysis of least significant bit matching steganography.
Inf. Sci., 2008

Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting.
Proceedings of the International Joint Conference on Neural Networks, 2008

Building resilient classifiers for LSB matching steganography.
Proceedings of the International Joint Conference on Neural Networks, 2008

Detecting information-hiding in WAV audios.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Learning Manifolds for Bankruptcy Analysis.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

2007
Predicting injection profiles using ANFIS.
Inf. Sci., 2007

A distribution free summarization method for Affymetrix GeneChip<sup>®</sup> arrays.
Bioinform., 2007

Obfuscated Malicious Executable Scanner.
J. Res. Pract. Inf. Technol., 2007

Behaviour Mining for Fraud Detection.
J. Res. Pract. Inf. Technol., 2007

Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images.
Proceedings of the IJCAI 2007, 2007

2006
Microarray Gene Expression Classification Based on Supervised Learning and Similarity Measures.
Proceedings of the IEEE International Conference on Systems, 2006

Recursive Feature Addition for Gene Selection.
Proceedings of the International Joint Conference on Neural Networks, 2006

Tree Based Behavior Monitoring for Adaptive Fraud Detection.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

2005
Fraud Detection System Based on Behavior Mining and Anomaly Detection.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

Online Fraud Detection System Based on Non-Stationery Anomaly Detection.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
JPEG Compression Immune Steganography Using Wavelet Transform.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Detecting Hidden Information in the Wavelet Domain.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2004


  Loading...