Zheng Qin
Orcid: 0000-0003-0877-3887Affiliations:
- Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
- Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China
- Michigan State University, East Lansing, MI, USA (2010 - 2011)
- Chongqing University, Department of computer software and theory, China (PhD 2001)
According to our database1,
Zheng Qin
authored at least 153 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks.
ACM Comput. Surv., April, 2025
Weakly-supervised spatial-temporal video grounding via spatial-temporal annotation on a single frame.
Knowl. Based Syst., 2025
Privacy-Preservation Enhanced and Efficient Attribute-Based Access Control for Smart Health in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2025
2024
TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM Emanations.
IEEE Trans. Mob. Comput., December, 2024
ACM Trans. Sens. Networks, November, 2024
IEEE Internet Things J., November, 2024
IEEE Trans. Intell. Transp. Syst., August, 2024
IEEE Trans. Knowl. Data Eng., July, 2024
An Angle-Oriented Approach to Transferring Speech to Gesture for Highly Anthropomorphized Embodied Conversational Agents.
Int. J. Comput. Intell. Appl., June, 2024
TPGraph: A Spatial-Temporal Graph Learning Framework for Accurate Traffic Prediction on Arterial Roads.
IEEE Trans. Intell. Transp. Syst., May, 2024
Exploring Intercity Mobility in Urban Agglomeration: Evidence from Private Car Trajectory Data.
IEEE Trans. Comput. Soc. Syst., April, 2024
QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS.
IEEE Trans. Computers, March, 2024
Expert Syst. Appl., March, 2024
Pedestrian Trajectory Prediction Based on Social Interactions Learning With Random Weights.
IEEE Trans. Multim., 2024
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2024
RDP: Ranked Differential Privacy for Facial Feature Protection in Multiscale Sparsified Subspace.
CoRR, 2024
Comput. Networks, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Multi-Prompts Learning with Cross-Modal Alignment for Attribute-Based Person Re-identification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Cogn. Commun. Netw., December, 2023
Traffic Flow Video Image Recognition and Analysis Based on Multi-Target Tracking Algorithm and Deep Learning.
IEEE Trans. Intell. Transp. Syst., August, 2023
Identification of image global processing operator chain based on feature decoupling.
Inf. Sci., August, 2023
IEEE Trans. Big Data, June, 2023
An Attribute-Based Keyword Search Scheme for Multiple Data Owners in Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Ind. Informatics, April, 2023
IEEE Trans. Big Data, April, 2023
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks.
J. Netw. Comput. Appl., April, 2023
SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., February, 2023
Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Internet Things J., 2023
ACM Comput. Surv., 2023
Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces.
CoRR, 2023
Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection.
CoRR, 2023
DeepfakeMAE: Facial Part Consistency Aware Masked Autoencoder for Deepfake Video Detection.
CoRR, 2023
FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Locality Sensitive Hashing for Data Placement to Optimize Parallel Subgraph Query Evaluation.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
2022
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Detecting Compressed Deepfake Videos in Social Networks Using Frame-Temporality Two-Stream Convolutional Network.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE J. Sel. Areas Commun., 2022
Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing.
IEEE Internet Things J., 2022
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022
Frontiers Comput. Sci., 2022
Clust. Comput., 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Reliab., 2021
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services.
IEEE Trans. Dependable Secur. Comput., 2021
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2021
IEEE Trans. Cloud Comput., 2021
Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services.
IEEE Trans. Computers, 2021
Reversible data hiding based on multiple histograms modification and deep neural networks.
Signal Process. Image Commun., 2021
Signal Process. Image Commun., 2021
IEEE Internet Things J., 2021
Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems.
IEEE Internet Things J., 2021
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing.
Proceedings of the ICC 2021, 2021
A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains.
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the Database Systems for Advanced Applications. DASFAA 2021 International Workshops, 2021
Proceedings of the Database Systems for Advanced Applications, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
IEEE Wirel. Commun., 2020
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Hashtag our stories: Hashtag recommendation for micro-videos via harnessing multiple modalities.
Knowl. Based Syst., 2020
J. Vis. Commun. Image Represent., 2020
A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing.
J. Parallel Distributed Comput., 2020
Privacy-preserving range query over multi-source electronic health records in public clouds.
J. Parallel Distributed Comput., 2020
Inf. Sci., 2020
Singular Spectrum Analysis for Local Differential Privacy of Classifications in the Smart Grid.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm.
Int. J. Comput. Sci. Eng., 2020
A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations.
Int. J. Bifurc. Chaos, 2020
IEEE Access, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
STRONG: Spatio-Temporal Reinforcement Learning for Cross-Modal Video Moment Localization.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
2019
IEEE Internet Things J., 2019
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners.
Future Gener. Comput. Syst., 2019
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding.
Comput. Secur., 2019
Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Web Information Systems Engineering, 2019
Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Distributed Landmark Selection for Lower Bound Estimation of Distances in Large Graphs.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019
Proceedings of the Web and Big Data - Third International Joint Conference, 2019
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019
2018
IEEE/ACM Trans. Netw., 2018
IEEE Trans. Multi Scale Comput. Syst., 2018
Signal Process. Image Commun., 2018
Secur. Commun. Networks, 2018
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
Cybersecur., 2018
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the Computer Vision - ACCV 2018, 2018
2017
Signal Process. Image Commun., 2017
A query privacy-enhanced and secure search scheme over encrypted data in cloud computing.
J. Comput. Syst. Sci., 2017
Inf. Sci., 2017
Inf. Syst., 2017
Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
A image texture and BP neural network basec malicious files detection technique for cloud storage systems.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Android Malware Detection Using Local Binary Pattern and Principal Component Analysis.
Proceedings of the Data Science, 2017
2016
Comput. Networks, 2016
A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the 19th ACM International Conference on Modeling, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm.
Proceedings of the 12th International Conference on Natural Computation, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
2015
A Dominating Error Region Strategy for Improving the Bit-Flipping LDPC Decoder of SSDs.
IEEE Trans. Circuits Syst. II Express Briefs, 2015
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
A Personalized Recommendation Approach Based on Content Similarity Calculation in Large-Scale Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2013
IEEE Trans. Inf. Forensics Secur., 2013
TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Netw. Syst. Manag., 2013
SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
2012
2010
Comput. Commun., 2010
2007
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.
Proceedings of the Computational Science and Its Applications, 2007
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
2004
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004