Tong Qiao

Orcid: 0009-0009-0542-8595

According to our database1, Tong Qiao authored at least 85 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HGNAS: Hardware-Aware Graph Neural Architecture Search for Edge Devices.
IEEE Trans. Computers, December, 2024

Unsupervised Generative Fake Image Detector.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks.
Multim. Syst., June, 2024

CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images.
IEEE Trans. Cogn. Dev. Syst., February, 2024

Deepfake Detection Fighting Against Noisy Label Attack.
IEEE Trans. Multim., 2024

Scalable Universal Adversarial Watermark Defending Against Facial Forgery.
IEEE Trans. Inf. Forensics Secur., 2024

Robust Adversarial Watermark Defending Against GAN Synthesization Attack.
IEEE Signal Process. Lett., 2024

Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning.
IEEE Trans. Pattern Anal. Mach. Intell., 2024

Privacy-preserving face recognition method based on extensible feature extraction.
J. Vis. Commun. Image Represent., 2024

Architectural Implications of GNN Aggregation Programming Abstractions.
IEEE Comput. Archit. Lett., 2024

No-Reference Image Quality Assessment via Local and Global Multi-Scale Feature Integration.
Proceedings of the 3rd Workshop on Quality of Experience in Visual Multimedia Applications, 2024

Banding Detection via Adaptive Global Frequency Domain Analysis.
Proceedings of the 3rd Workshop on Quality of Experience in Visual Multimedia Applications, 2024

Graph Neural Networks Automated Design and Deployment on Device-Edge Co-Inference Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

GNNavigator: Towards Adaptive Training of Graph Neural Networks via Automatic Guideline Exploration.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
Robust steganography in practical communication: a comparative study.
EURASIP J. Image Video Process., December, 2023

A novel model watermarking for protecting generative adversarial network.
Comput. Secur., April, 2023

Unsupervised Learning-Based Framework for Deepfake Video Detection.
IEEE Trans. Multim., 2023

FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing.
IEEE Trans. Multim., 2023

An improved RRT-Connect path planning algorithm of robotic arm for automatic sampling of exhaust emission detection in Industry 4.0.
J. Ind. Inf. Integr., 2023

Hardware-Aware Graph Neural Network Automated Design for Edge Computing Platforms.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Objective Object Segmentation Visual Quality Evaluation: Quality Measure and Pooling Method.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Efficient Privacy-Preserving Forensic Method for Camera Model Identification.
IEEE Trans. Inf. Forensics Secur., 2022

Deepfake Video Detection Based on MesoNet with Preprocessing Module.
Symmetry, 2022

Image splicing forgery detection using simplified generalized noise model.
Signal Process. Image Commun., 2022

Sign steganography revisited with robust domain selection.
Signal Process., 2022

Classifying between computer generated and natural images: An empirical study from RAW to JPEG format.
J. Vis. Commun. Image Represent., 2022

Towards DeepFake video forensics based on facial textural disparities in multi-color channels.
Inf. Sci., 2022

Encrypted Image Visual Security Index via Non-Local Recognizable Degree Evaluation.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021

Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling.
Signal Process., 2021

Robust steganography resisting JPEG compression by improving selection of cover element.
Signal Process., 2021

Towards Face Presentation Attack Detection Based on Residual Color Texture Representation.
Secur. Commun. Networks, 2021

Distinguishing between natural and recolored images via lateral chromatic aberration.
J. Vis. Commun. Image Represent., 2021

Geographical position spoofing detection based on camera sensor fingerprint.
J. Vis. Commun. Image Represent., 2021

First step towards parameters estimation of image operator chain.
Inf. Sci., 2021

Individualism or Collectivism: A Reinforcement Learning Mechanism for Vaccination Decisions.
Inf., 2021

A novel file carving algorithm for docker container logs recorded by json-file logging driver.
Digit. Investig., 2021

Optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms.
CoRR, 2021

Brief Industry Paper: optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

Robust Feature Matching Using Motion Consistency and Geometrical Constraint for UAV Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
Image Forgery Detection and Localization via a Reliability Fusion Map.
Sensors, 2020

JPEG quantization step estimation with coefficient histogram and spectrum analyses.
J. Vis. Commun. Image Represent., 2020

Identifying WeChat Message Types without Using Traditional Traffic.
Inf., 2020

Prototyping federated learning on edge computing systems.
Frontiers Comput. Sci., 2020

Adaptive and separable multiary reversible data hiding in encryption domain.
EURASIP J. Image Video Process., 2020

Measuring the Ocular Morphological Parameters of Guinea Pig Eye with Edge Detection and Curve Fitting.
Comput. Math. Methods Medicine, 2020

Objective object segmentation visual quality evaluation based on pixel-level and region-level characteristics.
Proceedings of the MMAsia 2020: ACM Multimedia Asia, 2020

2019
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019

Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
Sensors, 2019

Multiple human upper bodies detection via candidate-region convolutional neural network.
Multim. Tools Appl., 2019

Source camera identification via low dimensional PRNU features.
Multim. Tools Appl., 2019

Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images.
J. Univers. Comput. Sci., 2019

How to facilitate knowledge diffusion in complex networks: The roles of network structure, knowledge role distribution and selection rule.
Int. J. Inf. Manag., 2019

Robust Steganography by Modifying Sign of DCT Coefficients.
IEEE Access, 2019

Fuzzy Localization of Steganographic Flipped Bits via Modification Map.
IEEE Access, 2019

Deep Android Malware Classification with API-Based Feature Graph.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Joint bilateral filtering and spectral similarity-based sparse representation: A generic framework for effective feature extraction and data classification in hyperspectral imaging.
Pattern Recognit., 2018

Expose noise level inconsistency incorporating the inhomogeneity scoring strategy.
Multim. Tools Appl., 2018

Exposing image resampling forgery by using linear parametric model.
Multim. Tools Appl., 2018

A Novel Entropy-Based Centrality Approach for Identifying Vital Nodes in Weighted Networks.
Entropy, 2018

Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network.
IEEE Access, 2018

Identifying Individual Camera Device From RAW Images.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Using Machine Learning for Determining Network Robustness of Multi-Agent Systems Under Attacks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Resilient Consensus for Multi-agent Networks with Mobile Detectors.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Novel Framework of Robust Video Watermarking Based on Statistical Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Location Spoofing Detection Method for Social Networks (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Effective Denoising and Classification of Hyperspectral Images Using Curvelet Transform and Singular Spectrum Analysis.
IEEE Trans. Geosci. Remote. Sens., 2017

Individual camera device identification from JPEG images.
Signal Process. Image Commun., 2017

How to Identify the Most Powerful Node in Complex Networks? A Novel Entropy Centrality Approach.
Entropy, 2017

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017

A Novel File Carving Algorithm for EVTX Logs.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Android App Classification and Permission Usage Risk Assessment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Adaptive Carving Method for Live FLV Streaming.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

A Privacy Settings Prediction Model for Textual Posts on Social Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Statistical detection for digital image forensics. (Détection statistique pour la criminalistique des images numériques).
PhD thesis, 2016

2015
Steganalysis of JSteg algorithm using hypothesis testing theory.
EURASIP J. Inf. Secur., 2015

Singular spectrum analysis for improving hyperspectral imaging based beef eating quality evaluation.
Comput. Electron. Agric., 2015

Source camera device identification based on raw images.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Hyperspectral imaging for food applications.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Statistical detection of Jsteg steganography using hypothesis testing theory.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Simplified Anti-Forensics of JPEG Compression.
J. Comput., 2013

Image authentication by statistical analysis.
Proceedings of the 21st European Signal Processing Conference, 2013


  Loading...